907 research outputs found

    The Hierarchy Principle and the Large Mass Limit of the Linear Sigma Model

    Get PDF
    In perturbation theory we study the matching in four dimensions between the linear sigma model in the large mass limit and the renormalized nonlinear sigma model in the recently proposed flat connection formalism. We consider both the chiral limit and the strong coupling limit of the linear sigma model. Our formalism extends to Green functions with an arbitrary number of pion legs,at one loop level,on the basis of the hierarchy as an efficient unifying principle that governs both limits. While the chiral limit is straightforward, the matching in the strong coupling limit requires careful use of the normalization conditions of the linear theory, in order to exploit the functional equation and the complete set of local solutions of its linearized form.Comment: Latex, 41 pages, corrected typos, final version accepted by IJT

    A Quick Review of On-Disk Layout of Some Popular Disk File Systems

    Get PDF
    Disk file systems are being researched since the inception of first magnetic disk in 1956 by IBM. As such, many good disk file system designs have been drafted and implemented. Every file system design addressed a problem at the time of its development and efficiently mitigated it. The augmented or new designs rectified the flaws in previous designs or provided a new concept in file system design. As such, there are many file systems that have been successfully d in operating systems. Among these designs, some file systems have made an influential impact on the file system design because of their capability to cope up with change in hardware technology and/or user requirements or because of their innovation in file system ign or because time favored them which allowed them to find space in popular operating systems. In this paper, we vide a quick review of on-disk layout of some popular disk file systems across many popular platforms like Windows, Linu

    IO Bound Property: A System Perspective Evaluation

    Get PDF
    File systems have been mostly benchmarked as per the application perspective. This approach hides all the underlying complexities of the system including the actual I/O being done with the secondary storage device like magnetic disk. The IO bound property of a file system is necessarily to be evaluated because the most dominant performance limiting factor of a file system is its I/O operation with secondary storage device. This IO bound property of file system dictates the quantity and frequency of IO that a file system does with secondary storage device. In this paper, we argue system perspective of file system benchmarks and develop a benchmark to evaluate some common disk file systems for IO bound property. The goal of this paper is to better understand the behavior of file systems and unveil the low level complexities faced by file systems

    Comments on the Equivalence between Chern-Simons Theory and Topological Massive Yang-Mills Theory in 3D

    Get PDF
    The classical formal equivalence upon a redefinition of the gauge connection between Chern-Simons theory and topological massive Yang-Mills theory in three-dimensional Euclidean space-time is analyzed at the quantum level within the BRST formulation of the Equivalence Theorem. The parameter controlling the change in the gauge connection is the inverse λ\lambda of the topological mass. The BRST differential associated with the gauge connection redefinition is derived and the corresponding Slavnov-Taylor (ST) identities are proven to be anomaly-free. The Green functions of local operators constructed only from the (λ\lambda-dependent) transformed gauge connection, as well as those of BRST invariant operators, are shown to be independent of the parameter λ\lambda, as a consequence of the validity of the ST identities. The relevance of the antighost-ghost fields, needed to take into account at the quantum level the Jacobian of the change in the gauge connection, is analyzed. Their role in the identification of the physical states of the model within conventional perturbative gauge theory is discussed.Comment: 19 pages, LATEX, to appear in Journal of High Energy Physic

    Protein contain in Cyprinus carpio (Ham.) of experimental and control fishes due to administration of ovaprim, ovatide and pituitary gland extract at Fish Seed Production Centre, Paithan, Aurangabad, Maharashtra State, India

    Get PDF
    Protein contain is a cornerstone mechanism and form part and parcel of nutritive value in particular rely on season, food intake, breeding and spawning capacity. The protein contain in the fish body constitute as a firsthand source of energy for physiological functions incorporating reproduction. Present investigation display that variations in the protein is observed from the mature fishes of Indian major carps such as Cyprinus carpio comprises 20 to 50cm selected for the estimation of protein study considered as experimental and control fishes upon administration of PGE, ovaprim and ovatide synthetic hormonal doses to the male and female sex ratio separately. Protein in the liver of female major carps may be because of vitellogenin, a lipoprotein which is synthesized in the liver and is transported to the ovary (Wallace, 1985). Moreover, gonadal protein enhanced with maturation amongst these fishes. Protein estimation represents the variations throughout the study period amongst the muscle, gonad and liver. After hormonal injections are given then fishes are kept in the breeding pool at the Fish Seed Production Centres (FSPC) located near Paithan barrage. The protein is estimated upon satisfactory administration of hormonal doses Pituitary Gland Extract and by other two synthetic hormonal doses viz. Ovaprim and Ovatide. Study is conducted during 2013 to 2014

    Donut Shaped Ultra wideband Antenna for Cognitive Radio Application

    Get PDF
    In the last few decades there have been significant use of Cognitive radio and UWB technologies. These technologies are used for efficient use of Spectrum for short range wireless communications. In 2002, FCC has released a wideband of 7.5 GHz (From 3.1GHz to 10.6GHz) as unlicensed to use it . UWB antennas proves to be a suitable candidate for spectrum sensing in cognitive radio and in UWB transceiver. Since antenna dimensions are frequency dependent, designing an antenna for wideband is a tough job. This paper discusses the gradual techniques to obtain ultra wide bandwidth (2.23GHz-11.4GHz) from narrowband patch antenna. Also the various antenna parameters of proposed antenna design and its simulated results are analysed

    EOAODV: Routing Protocol for Cognitive Radio Network

    Get PDF
    Cognitive Radio (CR) technology provides promising and a new solution to improve the spectrum utilization. In recent years, cognitive radio technology (CR) has been proposed to allow unlicensed secondary users (SUs) to opportunistically access the channels unused by primary users (PU). This paper focuses on designing Enhancement of Opportunistic Ad-hoc On Demand Distance Vector (EOAODV) routing protocol that uses shortest distance, Expected Transmissions Count (ETC) and residual energy as a parameter to select the most reliable link and the next forwarding node. The selection of route in the network by the traditional AODV is based on hop count. It is proposed to achieve a gain of Opportunistic Routing (OR) with AODV for cognitive radio wireless sensor networks (CRWSN) to improve its efficiency. In the OR work the nexthop node selection was based on only Expected Transmission Count (ETC). In this case if the same node is selected as nexthop for many times, energy of that node is drained and node may be dead. To overcome this problem, a technique is contributed that is energy based nexthop selection ie. EOAODV. The ETC is computed based on the quantized value of RSSI of the links with residue energy in the forwarding node. Using ETC the reliable link is computed and stored in routing table. The packets are tranmitted to the destination using channel details and the next hop, available in the routing table. The next hop selection is based on high energy in the nodes, shortest distance and least ETC

    Mastodon Content Warnings: Inappropriate Contents in a Microblogging Platform

    Get PDF
    Our social communications and the expression of our beliefs and thoughts are becoming increasingly mediated and diffused by online social media. Beyond countless other advantages, this democratization and freedom of expression is also entailing the transfer of unpleasant offline behaviors to the online life, such as cyberbullying, sexting, hate speech and, in general, any behavior not suitable for the online community people belong to. To mitigate or even remove these threats from their platforms, most of the social media providers are implementing solutions for the automatic detection and filtering of such inappropriate contents. However, the data they use to train their tools are not publicly available. In this context, we release a dataset gathered from Mastodon, a distribute online social network which is formed by communities that impose the rules of publication, and which allows its users to mark their posts inappropriate if they perceived them not suitable for the community they belong to. The dataset consists of all the posts with public visibility published by users hosted on servers which support the English language. These data have been collected by implementing an ad-hoc tool for downloading the public timelines of the servers, namely instances, that form the Mastodon platform, along with the meta-data associated to them. The overall corpus contains over 5 million posts, spanning the entire life of Mastodon. We associate to each post a label indicating whether or not its content is inappropriate, as perceived by the user who wrote it. Moreover, we also provide the full description of each instance. Finally, we present some basic statistics about the production of inappropriate posts and the characteristics of their associated textual content

    Psychometric Properties and Validation of the Arabic Academic Performance Rating Scale

    Get PDF
    To validate the Arabic version of Academic Performance Rating Scale. Method. Translation and test-retest reliability were computed. Exploratory factor analysis and Rasch analysis were conducted to report on the validity. EFA factor structures were evaluated using a Scree plot and the standard multiple criteria included eigenvalue greater than 1. Average measures and step measures were ordered and themean-square outfit statistic for each category was also evaluated. Results. Cronbach’s Alpha value of 0.90 was obtained. No differences across category of educational levels were seen
    corecore