313 research outputs found

    The AKLT model on a hexagonal chain is gapped

    Full text link
    In 1987, Affleck, Kennedy, Lieb, and Tasaki introduced the AKLT spin chain and proved that it has a spectral gap above the ground state. Their concurrent conjecture that the two-dimensional AKLT model on the hexagonal lattice is also gapped remains open. In this paper, we show that the AKLT Hamiltonian restricted to an arbitrarily long chain of hexagons is gapped. The argument is based on explicitly verifying a finite-size criterion which is tailor-made for the system at hand. We also discuss generalizations of the method to the full hexagonal lattice.Comment: 17 pages; 4 figures; 2 tables -- comments welcom

    A History of Rural, Economic, and Social Policies in China

    Get PDF
    This report reviews major rural, social, and economic policies in China over the past century. These policies are discussed in historical context with a focus on how they responded to social, economic, and cultural changes at each stage. Assessment and analysis of these policies and their implications are provided by the author

    Securing Real-Time Internet-of-Things

    Full text link
    Modern embedded and cyber-physical systems are ubiquitous. A large number of critical cyber-physical systems have real-time requirements (e.g., avionics, automobiles, power grids, manufacturing systems, industrial control systems, etc.). Recent developments and new functionality requires real-time embedded devices to be connected to the Internet. This gives rise to the real-time Internet-of-things (RT-IoT) that promises a better user experience through stronger connectivity and efficient use of next-generation embedded devices. However RT- IoT are also increasingly becoming targets for cyber-attacks which is exacerbated by this increased connectivity. This paper gives an introduction to RT-IoT systems, an outlook of current approaches and possible research challenges towards secure RT- IoT frameworks

    The Power of Words in Crowdfunding

    Get PDF
    In this chapter, the authors first provide an overview of the crowdfunding phenomenon. Through the literature review of crowdfunding success factors in the four models, the authors then summarize that the current entrepreneurial research focused on success factors has failed to sufficiently examine how the power of words would affect crowdfunding. Therefore, the authors propose that non-verbal and verbal cues are crucial to entrepreneurial financing success. Based on the insufficient research related with those cues, especially the non-verbal ones, the authors open an area of study on non-verbal and verbal cues in the entrepreneurial financing process by conducting and writing this chapter

    Opportunity Finding by Nascent Entrepreneurs: Accidental or Purposeful?

    Get PDF
    Purpose: This research studies an important, but relatively unexplored entrepreneurial aspect: motivation and aspiration on opportunity finding/discovery. Design/Methodology/Approach: This study surveyed 230 nascent entrepreneurs on their opportunity finding behavior. A poisson regression and a logistic analysis were conducted to discover the relationship between motivation/aspiration and opportunity search behavior. Findings: Motivation and aspiration interact to influence active search in a positive way. However, only willingness to become an entrepreneur is found to search for opportunities purposefully. Research Limitations/Implications: Participants of the research are from a Midwest state in United States. Future research may collect sample from more and larger areas. Practical Implications: Bankers may use entrepreneurial opportunity search behavior as one criterion determining if to fund a person or not. Originality/Value: This article answers the call to study motivation/aspiration on opportunity finding (Yitshaki and Kropp, 2018; Murnieks et al., 2020). It is one of the first studies to explore the above relationship

    Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks

    Full text link
    In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT) edge devices with timing requirements from control spoofing attacks where an adversary sends malicious control signals to the actuators. We use a trusted computing base available in commodity processors (such as ARM TrustZone) and propose an invariant checking mechanism to ensure the security and safety of the physical system. A working prototype of Contego-TEE was developed using embedded Linux kernel. We demonstrate the feasibility of our approach for a robotic vehicle running on an ARM-based platform.Comment: 2nd Workshop on the Internet of Things Security and Privacy - Iot S&P'19, November 15, 2019, London, United Kingdom. ACM ISBN: 978-1-4503-6838-4/19/1
    • …
    corecore