21,579 research outputs found

    Interpreting aggregate wage growth

    Get PDF
    This paper analyzes the relationship between aggregate wages and individual wages when there is time series variation in employment and in the dispersion of wages. A new and easily implementable framework for the empirical analysis of aggregation biases is developed. Aggregate real wages are shown to contain three important bias terms: one associated with the dispersion of individual wages, a second reflecting the distribution of working hours, and a third deriving from compositional changes in the (selected) sample of workers. Noting the importance of these issues for recent experience in Britain, data on real wages and participation for British male workers over the period 1978-1996 are studied. A close correspondence between the estimated biases and the patterns of differences shown by aggregate wages is established. This is shown to have important implications for the interpretation of real wage growth over this period

    Partnership research with older people: moving towards making the rhetoric a reality

    Get PDF
    As nursing develops closer partnerships with older people in delivering care, it also needs to develop partnerships in order to create the knowledge base for practice in a way that challenges professional hegemony and empowers older people. However, the process of developing partnerships in research takes place against a background of academic research traditions and norms, which can present obstacles to collaboration. This paper is a reflection on the issues that have arisen in three projects where older people were involved in research at different levels, from sources of data to independent researchers. It points to some of the areas that need further exploration and development

    Vulnerability of LTE to Hostile Interference

    Full text link
    LTE is well on its way to becoming the primary cellular standard, due to its performance and low cost. Over the next decade we will become dependent on LTE, which is why we must ensure it is secure and available when we need it. Unfortunately, like any wireless technology, disruption through radio jamming is possible. This paper investigates the extent to which LTE is vulnerable to intentional jamming, by analyzing the components of the LTE downlink and uplink signals. The LTE physical layer consists of several physical channels and signals, most of which are vital to the operation of the link. By taking into account the density of these physical channels and signals with respect to the entire frame, as well as the modulation and coding schemes involved, we come up with a series of vulnerability metrics in the form of jammer to signal ratios. The ``weakest links'' of the LTE signals are then identified, and used to establish the overall vulnerability of LTE to hostile interference.Comment: 4 pages, see below for citation. M. Lichtman, J. Reed, M. Norton, T. Clancy, "Vulnerability of LTE to Hostile Interference'', IEEE Global Conference on Signal and Information Processing (GlobalSIP), Dec 201

    A new result on the Klein-Gordon equation in the background of a rotating black hole

    Full text link
    This short paper should serve as basis for further analysis of a previously found new symmetry of the solutions of the wave equation in the gravitational field of a Kerr black hole. Its main new result is the proof of essential self-adjointness of the spatial part of a reduced normalized wave operator of the Kerr metric in a weighted L^2-space. As a consequence, it leads to a purely operator theoretic proof of the well-posedness of the initial value problem of the reduced Klein-Gordon equation in that field in that L^2-space and in this way generalizes a corresponding result of Kay (1985) in the case of the Schwarzschild black hole. It is believed that the employed methods are applicable to other separable wave equations

    Long-Time Dynamics of Variable Coefficient mKdV Solitary Waves

    Full text link
    We study the Korteweg-de Vries-type equation dt u=-dx(dx^2 u+f(u)-B(t,x)u), where B is a small and bounded, slowly varying function and f is a nonlinearity. Many variable coefficient KdV-type equations can be rescaled into this equation. We study the long time behaviour of solutions with initial conditions close to a stable, B=0 solitary wave. We prove that for long time intervals, such solutions have the form of the solitary wave, whose centre and scale evolve according to a certain dynamical law involving the function B(t,x), plus an H^1-small fluctuation.Comment: 19 page

    Edge Currents for Quantum Hall Systems, I. One-Edge, Unbounded Geometries

    Full text link
    Devices exhibiting the integer quantum Hall effect can be modeled by one-electron Schroedinger operators describing the planar motion of an electron in a perpendicular, constant magnetic field, and under the influence of an electrostatic potential. The electron motion is confined to unbounded subsets of the plane by confining potential barriers. The edges of the confining potential barrier create edge currents. In this, the first of two papers, we prove explicit lower bounds on the edge currents associated with one-edge, unbounded geometries formed by various confining potentials. This work extends some known results that we review. The edge currents are carried by states with energy localized between any two Landau levels. These one-edge geometries describe the electron confined to certain unbounded regions in the plane obtained by deforming half-plane regions. We prove that the currents are stable under various potential perturbations, provided the perturbations are suitably small relative to the magnetic field strength, including perturbations by random potentials. For these cases of one-edge geometries, the existence of, and the estimates on, the edge currents imply that the corresponding Hamiltonian has intervals of absolutely continuous spectrum. In the second paper of this series, we consider the edge currents associated with two-edge geometries describing bounded, cylinder-like regions, and unbounded, strip-like, regions.Comment: 68 page

    A parallel VLSI architecture for a digital filter of arbitrary length using Fermat number transforms

    Get PDF
    A parallel architecture for computation of the linear convolution of two sequences of arbitrary lengths using the Fermat number transform (FNT) is described. In particular a pipeline structure is designed to compute a 128-point FNT. In this FNT, only additions and bit rotations are required. A standard barrel shifter circuit is modified so that it performs the required bit rotation operation. The overlap-save method is generalized for the FNT to compute a linear convolution of arbitrary length. A parallel architecture is developed to realize this type of overlap-save method using one FNT and several inverse FNTs of 128 points. The generalized overlap save method alleviates the usual dynamic range limitation in FNTs of long transform lengths. Its architecture is regular, simple, and expandable, and therefore naturally suitable for VLSI implementation

    A VLSI pipeline design of a fast prime factor DFT on a finite field

    Get PDF
    A conventional prime factor discrete Fourier transform (DFT) algorithm is used to realize a discrete Fourier-like transform on the finite field, GF(q sub n). A pipeline structure is used to implement this prime factor DFT over GF(q sub n). This algorithm is developed to compute cyclic convolutions of complex numbers and to decode Reed-Solomon codes. Such a pipeline fast prime factor DFT algorithm over GF(q sub n) is regular, simple, expandable, and naturally suitable for VLSI implementation. An example illustrating the pipeline aspect of a 30-point transform over GF(q sub n) is presented

    Passive control of wing/store flutter

    Get PDF
    Results are presented for a passive flutter suppression approach known as the decoupler pylon. The decoupler pylon dynamically isolates the wing from store pitch inertia effects by means of soft spring/damper elements assisted by a low frequency feedback control system which minimizes static pitch deflections of the store because of maneuvers and changing flight conditions. Wind tunnel tests and analyses show that this relatively simple pylon suspension system provides substantial increases in flutter speed and reduces the sensitivity of flutter to changes in store inertia and center of gravity. Flutter characteristics of F-16 and YF-17 flutter models equipped with decoupler pylon mounted stores are presented and compared with results obtained on the same model configuration with active flutter suppression systems. These studies show both passive and active concepts to be effective in suppressing wing/store flutter. Also presented are data showing the influence of pylon stiffness nonlinearities on wing/store flutter
    • …
    corecore