17,454 research outputs found
Trends in social capital: Membership of associations in Great Britain, 1991–98
This Note uses the British Household Panel Study (BHPS) to consider the changing volume and distribution of voluntary association membership (and hence social capital) in Great Britain. We aim to supplement Hall's study of trends in social capital published in this Journal with more recent and longitudinal data. This allows us to show that whilst the volume of social capital is not declining, it is becoming increasingly class specific, and that its relative aggregate stability masks considerable turnover at the individual level. These findings are significant for current debates on social capital
Costs and Benefits to Business of Adopting Work Life Balance Working Practices: A Literature Review
Quantum Hall Ferromagnets: Induced Topological term and electromagnetic interactions
The quantum Hall ground state in materials like GaAs is well known
to be ferromagnetic in nature. The exchange part of the Coulomb interaction
provides the necessary attractive force to align the electron spins
spontaneously. The gapless Goldstone modes are the angular deviations of the
magnetisation vector from its fixed ground state orientation. Furthermore, the
system is known to support electrically charged spin skyrmion configurations.
It has been claimed in the literature that these skyrmions are fermionic owing
to an induced topological Hopf term in the effective action governing the
Goldstone modes. However, objections have been raised against the method by
which this term has been obtained from the microscopics of the system. In this
article, we use the technique of the derivative expansion to derive, in an
unambiguous manner, the effective action of the angular degrees of freedom,
including the Hopf term. Furthermore, we have coupled perturbative
electromagnetic fields to the microscopic fermionic system in order to study
their effect on the spin excitations. We have obtained an elegant expression
for the electromagnetic coupling of the angular variables describing these spin
excitations.Comment: 23 pages, Plain TeX, no figure
Recommended from our members
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search. Such attribute enabled searchable encryption is most suitable for applications where the changing of privileges is done once in a while. However, to date, no efficient and secure scheme is available in the literature that is suitable for these applications where changing privileges are done frequently. In this paper our contributions are twofold. Firstly, we propose a new PEKS scheme for string search, which, unlike the previous constructions, is free from bi-linear mapping and is efficient by 97% compared to PEKS for string search proposed by Ray et.al in TrustCom 2017. Secondly, we introduce role based access control (RBAC) to multi-user PEKS, where an arbitrary group of users can search and access the encrypted files depending upon roles. We termed this integrated scheme as R-PEKS. The efficiency of R-PEKS over the PEKS scheme is up to 90%. We provide formal security proofs for the different components of R-PEKS and validate these schemes using a commercial dataset
Susceptibilities and speed of sound from PNJL model
We present the Taylor expansion coefficients of the pressure in quark number
chemical potential , for the strongly interacting
matter as described by the PNJL model for two light degenerate flavours of
quarks u and d. The expansion has been done upto eighth order in , and
the results are consistent with recent estimates from Lattice. We have further
obtained the specific heat , squared speed of sound and the
conformal measure \cC.Comment: 13 pages, 8 figures, References added, some discussions on Fig. 4
modified, one table added, results unchanged, version to appear in Phys. Rev.
Recommended from our members
Privacy-Preserving iVector-Based Speaker Verification
This paper introduces an efficient algorithm to develop a privacy-preserving voice verification based on iVector and linear discriminant analysis techniques. This research considers a scenario in which users enrol their voice biometric to access different services (i.e., banking). Once enrolment is completed, users can verify themselves using their voice print instead of alphanumeric passwords. Since a voice print is unique for everyone, storing it with a third-party server raises several privacy concerns. To address this challenge, this paper proposes a novel technique based on randomization to carry out voice authentication, which allows the user to enrol and verify their voice in the randomized domain. To achieve this, the iVector-based voice verification technique has been redesigned to work on the randomized domain. The proposed algorithm is validated using a well-known speech dataset. The proposed algorithm neither compromises the authentication accuracy nor adds additional complexity due to the randomization operations
Electron paramagnetic resonance, optical absorption and Raman spectral studies on a pyrite/chalcopyrite mineral
Pyrite and chalcopyrite mineral samples from Mangampet barite mine, Kadapa, Andhra Pradesh, India are used in the present study. XRD data indicate that the pyrite mineral has a face centered cubic lattice structure with lattice constant 5.4179 Ã…. Also it possesses an average particle size of 91.9 nm. An EPR study on the powdered samples confirms the presence of iron in pyrite and iron and Mn(II) in chalcopyrite. The optical absorption spectrum of chalcopyrite indicates presence of copper which is in a distorted octahedral environment. NIR results confirm the presence of water fundamentals and Raman spectrum reveals the presence of water and sulfate ions
- …