2,400 research outputs found

    A Regularized Boundary Element Formulation for Contactless SAR Evaluations within Homogeneous and Inhomogeneous Head Phantoms

    Get PDF
    This work presents a Boundary Element Method (BEM) formulation for contactless electromagnetic field assessments. The new scheme is based on a regularized BEM approach that requires the use of electric measurements only. The regularization is obtained by leveraging on an extension of Calderon techniques to rectangular systems leading to well-conditioned problems independent of the discretization density. This enables the use of highly discretized Huygens surfaces that can be consequently placed very near to the radiating source. In addition, the new regularized scheme is hybridized with both surfacic homogeneous and volumetric inhomogeneous forward BEM solvers accelerated with fast matrix-vector multiplication schemes. This allows for rapid and effective dosimetric assessments and permits the use of inhomogeneous and realistic head phantoms. Numerical results corroborate the theory and confirms the practical effectiveness of all newly proposed formulations

    Economic Efficiency, Distributive Justice and Liability Rules

    Get PDF
    The main purpose of this paper is to show that the conflict between the considerations involving economic efficiency and those of distributive justice, in the context of assigning liability, is not as sharp as is generally believed to be the case. The condition of negligence liability which characterizes efficiency in the context of liability rules has an all-or-none character. Negligence liability requires that if one party is negligent and the other is not then the liability for the entire accident loss must fall on the negligent party. Thus within the framework of standard liability rules efficiency requirements preclude any non-efficiency considerations in cases where one party is negligent and the other is not. In this paper it is shown that a part of accident loss plays no part in providing appropriate incentives to the parties for taking due care and can therefore be apportioned on non-efficiency considerations. For a systematic analysis of efficiency requirements, a notion more general than that of a liability rule, namely, that of a decomposed liability rule is introduced. A complete characterization of efficient decomposed liability rules is provided in the paper. One important implication of the characterization theorems of this paper is that by decomposing accident loss in two parts, the scope for distributive considerations can be significantly broadened without sacrificing economic efficiency.Tort Law, Liability Rules, Decomposed liability Rules, Efficient Rules, Nash Equilibria, Negligence Liability, Distributive Justice

    The Belief-Function Approach to Aggregating Audit Evidence

    Get PDF
    This is the peer reviewed version of the following article: Srivastava, R. P., "The Belief-Function Approach to Aggregating Audit Evidence" International Journal of Intelligent Systems, Vol. 10, No. 3, March 1995, pp. 329-356., which has been published in final form at http://doi.org/10.1002/int.4550100304. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving.In this article, we present the belief-function approach to aggregating audit evidence. The approach uses an evidential network to represent the structure of audit evidence. In turn, it allows us to treat all types of dependencies and relationships among accounts and items of evidence, and thus the approach should help the auditor conduct an efficient and effective audit. Aggregation of evidence is equivalent to propagation of beliefs in an evidential network. The paper describes in detail the three major steps involved in the propagation process. The first step deals with drawing the evidential network representing the connections among variables and items of evidence, based on the experience and judgment of the auditor. We then use the evidential network to determine the clusters of variables over which we have belief functions. The second step deals with constructing a Markov tree from the clusters of variables determined in step one. The third step deals with the propagation of belief functions in the Markov tree. We use a moderately complex example to illustrate the details of the aggregation process

    Image processing using a two-dimensional digital convolution filter.

    Get PDF

    Theoretical investigation of energy-trapping mechanism by atomic systems

    Get PDF
    © 1978 The American Physical SocietyThe theoretical results are presented here in detail for the atomic device proposed earlier by the author. This device absorbs energy from a continuous radiation source and stores some of it with atoms in metastable states for a long time without any loss. At a later time, when the energy is required, the system can be "triggered" by an external perturbing field to release the energy in the form of a strong pulse of radiation

    Alternative Form of Dempster's Rule for Binary Variables

    Get PDF
    This is the author's final draft. The publisher's official version is available electronically from: .This article develops an alternative form of Dempster’s rule of combination for binary variables. This alternative form does not only provide a closed form formulae for efficient computation but also enables researchers to develop closed form analytical formulae for assessing risks such as information security risk, fraud risk, audit risk, independence risk, etc., involved in assurance services. We demonstrate the usefulness of the alternative form in calculating the overall information security risk and also in developing an analytical model for assessing fraud risk
    • …
    corecore