313 research outputs found
The AKLT model on a hexagonal chain is gapped
In 1987, Affleck, Kennedy, Lieb, and Tasaki introduced the AKLT spin chain
and proved that it has a spectral gap above the ground state. Their concurrent
conjecture that the two-dimensional AKLT model on the hexagonal lattice is also
gapped remains open. In this paper, we show that the AKLT Hamiltonian
restricted to an arbitrarily long chain of hexagons is gapped. The argument is
based on explicitly verifying a finite-size criterion which is tailor-made for
the system at hand. We also discuss generalizations of the method to the full
hexagonal lattice.Comment: 17 pages; 4 figures; 2 tables -- comments welcom
A History of Rural, Economic, and Social Policies in China
This report reviews major rural, social, and economic policies in China over the past century. These policies are discussed in historical context with a focus on how they responded to social, economic, and cultural changes at each stage. Assessment and analysis of these policies and their implications are provided by the author
Securing Real-Time Internet-of-Things
Modern embedded and cyber-physical systems are ubiquitous. A large number of
critical cyber-physical systems have real-time requirements (e.g., avionics,
automobiles, power grids, manufacturing systems, industrial control systems,
etc.). Recent developments and new functionality requires real-time embedded
devices to be connected to the Internet. This gives rise to the real-time
Internet-of-things (RT-IoT) that promises a better user experience through
stronger connectivity and efficient use of next-generation embedded devices.
However RT- IoT are also increasingly becoming targets for cyber-attacks which
is exacerbated by this increased connectivity. This paper gives an introduction
to RT-IoT systems, an outlook of current approaches and possible research
challenges towards secure RT- IoT frameworks
The Power of Words in Crowdfunding
In this chapter, the authors first provide an overview of the crowdfunding phenomenon. Through the literature review of crowdfunding success factors in the four models, the authors then summarize that the current entrepreneurial research focused on success factors has failed to sufficiently examine how the power of words would affect crowdfunding. Therefore, the authors propose that non-verbal and verbal cues are crucial to entrepreneurial financing success. Based on the insufficient research related with those cues, especially the non-verbal ones, the authors open an area of study on non-verbal and verbal cues in the entrepreneurial financing process by conducting and writing this chapter
Opportunity Finding by Nascent Entrepreneurs: Accidental or Purposeful?
Purpose: This research studies an important, but relatively unexplored entrepreneurial aspect: motivation and aspiration on opportunity finding/discovery.
Design/Methodology/Approach: This study surveyed 230 nascent entrepreneurs on their opportunity finding behavior. A poisson regression and a logistic analysis were conducted to discover the relationship between motivation/aspiration and opportunity search behavior.
Findings: Motivation and aspiration interact to influence active search in a positive way. However, only willingness to become an entrepreneur is found to search for opportunities purposefully. Research Limitations/Implications: Participants of the research are from a Midwest state in United States. Future research may collect sample from more and larger areas.
Practical Implications: Bankers may use entrepreneurial opportunity search behavior as one criterion determining if to fund a person or not.
Originality/Value: This article answers the call to study motivation/aspiration on opportunity finding (Yitshaki and Kropp, 2018; Murnieks et al., 2020). It is one of the first studies to explore the above relationship
Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks
In this paper, we propose a framework called Contego-TEE to secure
Internet-of-Things (IoT) edge devices with timing requirements from control
spoofing attacks where an adversary sends malicious control signals to the
actuators. We use a trusted computing base available in commodity processors
(such as ARM TrustZone) and propose an invariant checking mechanism to ensure
the security and safety of the physical system. A working prototype of
Contego-TEE was developed using embedded Linux kernel. We demonstrate the
feasibility of our approach for a robotic vehicle running on an ARM-based
platform.Comment: 2nd Workshop on the Internet of Things Security and Privacy - Iot
S&P'19, November 15, 2019, London, United Kingdom. ACM ISBN:
978-1-4503-6838-4/19/1
- …