809 research outputs found

    A regional model of endogenous growth with creative destruction

    Get PDF
    We consider a two region growth model with vertical innovations where technical externalities in R&D lead to a technology leading region being the most attractive location for innovative firms. Innovations are produced in the form of quality improvements building on available knowledge and firms choose a technologically advanced location to maximise the productivity of R&D and maintain their niche monopoly. The partial nature of spillovers causes an additional force for agglomeration: the clustering effect. Agglomerated locations have the benefit of local inter-varietal knowledge spillovers for growth while peripheral locations depend on trade and regional knowledge spillovers

    Cluster evolution as a probe of primordial density fluctuations

    Get PDF
    Although COBE's detection of large angle microwave background anisotropies fixes the amplitude of density fluctuations on length scales k exp -1 approximately = (300-6000) h(exp -1)Mpc, what is crucial for the level of large scale clustering is the amplitude of density fluctuations on scales (5-50) h(exp -1)Mpc. The level of dynamical clustering is usually parameterized by the size of the mass fluctuations in 8 h exp -1 Mpc spheres, sigma sub 8. For the cold dark matter model, COBE gives sigma sub 8 approximately = 1, while models with extra large scale power give sigma sub 8 approximately = 1/2. The most massive clusters of galaxies (greater than or approximately = 10 exp 15 solar mass) form from rare 'peak patches' found in the initial mass density distribution. Their abundance as a function of redshift is a sensitive probe of the wave number band k(exp -1) approx. (3-8) h(exp -1)Mpc, hence of sigma sub 8, and so cluster evolution can discriminate among models allowed by the COBE results. We use our Hierarchical Peaks Method, which accurately reproduces the results of P3M N-body simulations, to calculate the evolution of cluster x-ray flux counts, luminosity, and temperature functions as a function of sigma sub 8 for CDM models and those with more large scale power. We find that the EMSS and Edge et al. cluster samples support sigma sub 8 in the range from approx. 0.6-0.9, and that models with more large scale power (and hence flatter fluctuation spectra in the cluster regime) fit the x-ray bright end better

    Primeval galaxies in the sub-mm and mm

    Get PDF
    Although the results of COBE's FIRAS experiment 1 constrain the deviation in energy from the CMB blackbody in the 500-5000 micron range to be delta E/E, sub cmb less than 0.005, primeval galaxies can still lead to a brilliant sub-mm sky of non-Gaussian sources that are detectable at 10 inch resolution from planned arrays such as SCUBA on the James Clerk Maxwell Telescope and, quite plausibly, at sub-arcsecond resolution in planned mm and sub-mm interferometers. Here, we apply our hierarchical peaks method to a CDM model to construct sub-mm and mm maps of bursting PG's appropriate for these instruments with minimum contours chosen to correspond to realistic observational parameters for them and which pass the FIRAS limits

    “R.C.”: Rosicrucianism and Cartesianism in Joyce and Beckett

    Get PDF
    Nous observerons dans cet article les possibles implications théosophiques et philosophiques de l'usage récurrent par James Joyce des initiales “R. C.” dans Ulysse et Finnegans Wake. Historiquement, les initiales ont servi, d'une part, de sceau à La Fraternité Rosicrucienne, et de l'autre, de paraphe à René Descartes (René des Cartes). Nous considérerons ces deux hypothèses théoriques comme des points de références probables dans l'usage que fait Joyce des initiales, ceci en nous appuyant sur les premiers écrits de Beckett.This paper explores the possible theosophical and philosophical implications of James Joyce’s recurrent use of the initials “R. C.” in Ulysses and Finnegans Wake. Historically, the initials have been used both as the seal of the Rosicrucian Brotherhood and as the cachet of René Descartes (René des Cartes). We consider both of these theoretical frameworks as likely reference points for Joyce, making extensive use of the early works of Samuel Beckett in arguing for each case

    Innovation and Growth: Theoretical Models and Analytical Simulations of Spatial, Clustering and Competition Effects

    Get PDF
    This thesis expands upon endogenous growth theory to incorporate a more detailed understanding of innovation. The similarities in modelling techniques between endogenous growth theory and the New Economic Geography (NEG) in the existing literature creates an opportunity to incorporate features of innovation within a model of both geography and growth. The thesis explores three key areas. Firstly, innovation is based on knowledge spillovers. But knowledge spillovers are also subject to spatial characteristics in its transfer between firms, locations, regions and nations. Similarly, knowledge is used by innovators in many sectors, not just the sector where the knowledge was originally developed. As a result, innovating firms have an incentive to agglomerate alongside other innovators to benefit from each other’s knowledge. The geographic constraints of knowledge spillovers are incorporated into a regional model of growth with creative destruction. However, spillovers between industries are not equal. Industries or firms producing products which are closely related have a strong incentive to locate in close proximity to benefit from related-technology spillovers. Some of these related innovation clusters could potentially be isolated, but sustainable due to knowledge transfer between related firms within the cluster. It is this innovation clustering which could provide the opportunity for distant or isolated economies to sustain high levels of productivity. Lastly, the thesis considers a way in which firms enter a market such that entry is not necessarily available to all potential entrants. This limit on the market supplied by innovating firms is characterised by discrete instead of free entry. Entry by discrete firms allows entering firms to invest in innovation in response to actual (instead of potential) competitors. They are able to escape competition by sustaining incremental innovations. Greater competition in larger markets has greater investment in innovation by all participants. This thesis provides new insights for endogenous growth theory, emphasising the need for policies regarding innovation and economic growth that are industry and location specific

    Chip and Skim: cloning EMV cards with the pre-play attack

    Full text link
    EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. We have discovered that some EMV implementers have merely used counters, timestamps or home-grown algorithms to supply this number. This exposes them to a "pre-play" attack which is indistinguishable from card cloning from the standpoint of the logs available to the card-issuing bank, and can be carried out even if it is impossible to clone a card physically (in the sense of extracting the key material and loading it into another card). Card cloning is the very type of fraud that EMV was supposed to prevent. We describe how we detected the vulnerability, a survey methodology we developed to chart the scope of the weakness, evidence from ATM and terminal experiments in the field, and our implementation of proof-of-concept attacks. We found flaws in widely-used ATMs from the largest manufacturers. We can now explain at least some of the increasing number of frauds in which victims are refused refunds by banks which claim that EMV cards cannot be cloned and that a customer involved in a dispute must therefore be mistaken or complicit. Pre-play attacks may also be carried out by malware in an ATM or POS terminal, or by a man-in-the-middle between the terminal and the acquirer. We explore the design and implementation mistakes that enabled the flaw to evade detection until now: shortcomings of the EMV specification, of the EMV kernel certification process, of implementation testing, formal analysis, or monitoring customer complaints. Finally we discuss countermeasures

    RecDroid: a resource access permission control portal and recommendation service for smartphone users

    Get PDF
    The rapid growth of the smartphone applications market raises security concerns regarding untrusted applications. Studies have shown that most apps in markets request to collect data irrelevant to the main functions of the apps. Traditional Android permission control design based on one-time decisions on installation has been proven to be ineffective in protecting users’ privacy and poorly utilizes scarce mobile resources (e.g. battery). RecDroid is designed to help protect user data in a market where unauthorized data collection is prevalent in most applications. With RecDroid’s recommendation feature, which is based on expert analysis, the user will be able to avoid unnecessary privacy breach while retaining safe functionalities of many third party applications. RecDroid’s implementation consists of three distinct components: Application, OS modifications, and Recommendation Server. Firstly, RecDroid is exposed to the user as an application that allows them to manage permissions for installed applications and provides recommended permissions for new installations. In order to accomplish this, the Android OS needed to be modified to add two key functions to make our application work: editing the PackageManager class to handle user set permissions and to add a probation installation setting to let RecDroid know what applications to monitor. The last core component required for the RecDroid application is a server that collects participating users’ decisions sent by the application, makes recommendations based on stored decisions, and provides recommendations to the application. When RecDroid is fully implemented and has a sufficient user base, we expect to have a fully functional application that can effectively protect user data from dishonest applications that seek to overstep their essential reach. The server will continuously collect more data and recruit new users, which will correspondingly increase the confidence level and accuracy of RecDroid recommendations.https://scholarscompass.vcu.edu/capstone/1034/thumbnail.jp

    Optimizing Collection of Trace Biological Samples from Vehicle Headrests

    Get PDF
    Tape-lifting and swabbing are two methods commonly used for collecting biological samples in the United Kingdom and United States to investigate vehicle crimes. Determining the optimal collection method may lead to an increase in generating DNA profiles and crime-solving. The objective of this study is to evaluate the efficiency of adhesive tape and the double-swab collection methods for investigating vehicle crimes with possible touch DNA samples. Two experiments were conducted to evaluate the use of tape-lifts and swabs on spiked common vehicle fabric materials. The efficiency of recovery between the two collection methods was performed using qPCR. The results from the collection of fabric materials indicated tape-lifts outperformed swabbing on cloth and vinyl substrates, while swabbing resulted in comparable recovery on leather substrates. By optimizing sample collection techniques, we aim to aid not only investigations involving vehicles but also other crimes with touch DNA evidence present

    ErythropoieSIS stimulating agent (ESA) use is increased following missed dialysis sessions

    Get PDF
    Missed dialysis sessions can have a cascading effect on patient clinical outcomes. In addition to missing the dialysis itself, patients fail to receive medications—such as ESAs—that are dosed at each session. This analysis assessed ESA dose changes following missed session episodes in order to evaluate “catch-up dosing.”In a retrospective analysis, we assessed missed session and epoetin alfa (EPO) utilization data in 2010 from adult (≥ 18 yrs old), hemodialysis (HD) patients. Consecutive misses were considered part of a missed session “episode.” All misses were included (even if patient was hospitalized). Differences in EPO utilization in the periods 14 days, 30 days and 31-60 days before and after missed session episodes were calculated and stratified by length of episode, and whether additional sessions were missed in the before/after periods. Total monthly EPO dose was also calculated and stratified by number of missed sessions.Patients used significantly more EPO after a missed session episode, and differences in per session EPO dose were generally greater the longer the episode. For missed session episodes with no additional misses in the 30 day before/after period, increases of 18% to 30% per session were seen, depending on episode length. For longer episodes, usually due to hospitalization, differences were sustained over 60 days. Analyses which included additional missed sessions in the before/after period showed similar patterns. Beyond these per-session associations, the total amount of EPO used in a month increased with number of missed sessions (through up to 5 missed sessions), even though these patients (by definition) were not receiving as many administrations of EPO.Missed session episodes result in significant increases in ESA utilization in the post-miss period, and also in total monthly ESA use. Such increases should be considered in any assessment of impact of missed sessions: both clinical and economic
    corecore