29,839 research outputs found

    Comment on "Scaling feature of magnetic field induced Kondo-peak splittings"

    Full text link
    In a recent work Zhang and coworkers (PRB 82, 075111 (2010)) studied the Zeeman splitting of the Kondo resonance for the single impurity Anderson model in a finite magnetic field BB with the numerical renormalization group (NRG) method. There, it was found that with increasing magnetic field BB the position of the Kondo resonance in the total spectral function \textit{does not} approach its position in the spin resolved spectral function. Additionally, the position of the Kondo maximum exceeded the Zeeman energy for B/TK≳5−10B/ T_K\gtrsim 5-10, where TKT_K is the low energy Kondo scale of the model (g=2g=2, ÎŒB=kB=ℏ=1\mu_B=k_B=\hbar=1). In this comment we argue that both these findings are produced by an improper choice of NRG parameter values. However, we reproduce the crossover in the splitting from Kondo-like behavior to a non-universal splitting larger than the Zeeman energy, but this crossover occurs at much larger fields of the order of the charge scale.Comment: Minor revisions; same version as publishe

    New public management reform in European countries: The retreat of the state from telecommunication services

    Get PDF
    In the post war period, telecommunications - being services of 'general economic interest' - were initially managed by public administrative bodies in many Western European countries. With the rise of New Public Management (NPM) in the 1980s, these bodies were often transformed into public corporations or joint stock companies. Following corporatisation, the provision and the management of these services of general economic interest was gradually transferred to private actors. This paper analyses whether privatisation, as part of NPM reforms, has benefited the consumer. We have, therefore, compiled data on privatisation in the telecommunication sector for 15 European countries from 1980 to 2006. The data set covers the corporatisation process, as well as the transfer of the service provision to the private sector. Three empirical findings stand out: first, the reform processes have differed widely from each other. Second, it's not just the transfer of ownership to the private sector that has ensured efficiency gains and increased consumer benefits; corporatisation has done this as well. Third, efficiency gains have been transferred to the consumer, especially at the beginning of the reform process. -- In der Nachkriegszeit wurden Telekommunikationsdienstleistungen in vielen westeuropĂ€ischen LĂ€ndern zumeist von Verwaltungseinheiten bereitgestellt. Mit dem Aufkommen des New Public Managements (NPMs) in den 1980er Jahren wurden diese Verwaltungseinheiten in öffentlich-rechtliche Unternehmen oder Aktiengesellschaften umgewandelt (=formelle Privatisierung) und anschließend stĂŒckweise an private Akteure ĂŒbertragen (=materielle Privatisierung). Dieser Beitrag untersucht, ob die Konsumenten von diesen Privatisierungsmaßnahmen profitieren konnten. Zur Beantwortung dieser Frage wurde ein vollstĂ€ndig neuer Paneldatensatz zusammengestellt, mit dem die Privatisierung im Telekommunikationssektor fĂŒr 15 europĂ€ische LĂ€nder von 1980 bis 2006 abgebildet werden kann. Der Datensatz umfasst erstmals sowohl formelle als auch materielle Privatisierungsschritte. Drei empirische Ergebnisse sind besonders hervorzuheben. Erstens, der Privatisierungsprozess unterscheidet sich teilweise erheblich zwischen den LĂ€ndern. Zweitens, die Konsumenten konnten nicht nur vom Verkauf von Unternehmensanteilen profitieren, sondern auch von formellen Privatisierungsmaßnahmen. Drittens, Effizienzgewinne wurden insbesondere am Anfang des Reformprozesses an die Konsumenten weitergegeben.

    Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis

    Full text link
    Key management in wireless sensor networks faces several new challenges. The scale, resource limitations, and new threats such as node capture necessitate the use of an on-line key generation by the nodes themselves. However, the cost of such schemes is high since their secrecy is based on computational complexity. Recently, several research contributions justified that the wireless channel itself can be used to generate information-theoretic secure keys. By exchanging sampling messages during movement, a bit string can be derived that is only known to the involved entities. Yet, movement is not the only possibility to generate randomness. The channel response is also strongly dependent on the frequency of the transmitted signal. In our work, we introduce a protocol for key generation based on the frequency-selectivity of channel fading. The practical advantage of this approach is that we do not require node movement. Thus, the frequent case of a sensor network with static motes is supported. Furthermore, the error correction property of the protocol mitigates the effects of measurement errors and other temporal effects, giving rise to an agreement rate of over 97%. We show the applicability of our protocol by implementing it on MICAz motes, and evaluate its robustness and secrecy through experiments and analysis.Comment: Submitted to IEEE Transactions on Dependable and Secure Computin

    Sentiment Analysis on New York Times Articles Data

    Get PDF
    Sentiment Analysis on New York Times Coverage Data Departmental Affiliation: Data Science/ Political Science College of Arts and Sciences The extant political science literature examines media coverage of immigration and assesses the effect of that coverage on partisanship in the United States. Immigration is believed to be a unique factor that induces large- scale changes in partisanship based on race and ethnicity. The negative tone of media coverage pushes non-Latino Whites into the Republican Party, while Latinos trend toward the Democratic Party. The aim for this project is to look at New York time data in order to identify how much immigration is covered in newspaper outlets, specifically Latino immigration, and to determine the overall tone of these stories. In this research, we seek to determine individual articles take a positive, neutral or negative stance. We achieve this using a dictionary-based approach, meaning we look at individual words to assess if it has a positive, neutral or negative connotation. We train our data using publicly accessible sentiment dictionaries such as VADER (Valence Aware Dictionary and Sentiment Reasoner). However, this task can be difficult because certain words can be dynamic and may pertain to a positive or negative sentiment in context of the article. In order to resolve this issue, we use reliability measures to ensure that the words of high frequencies are in the correct sphere of negative, neutral, and positive light. Information about the Author(s): Faculty Sponsor(s): Professor Gregg B. Johnson and Professor Karl Schmitt Student Contact: Gabriel Carvajal – [email protected]

    An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks

    Full text link
    Numerous studies showed that concurrent transmissions can boost wireless network performance despite collisions. While these works provide empirical evidence that concurrent transmissions may be received reliably, existing signal capture models only partially explain the root causes of this phenomenon. We present a comprehensive mathematical model that reveals the reasons and provides insights on the key parameters affecting the performance of MSK-modulated transmissions. A major contribution is a closed-form derivation of the receiver bit decision variable for arbitrary numbers of colliding signals and constellations of power ratios, timing offsets, and carrier phase offsets. We systematically explore the root causes for successful packet delivery under concurrent transmissions across the whole parameter space of the model. We confirm the capture threshold behavior observed in previous studies but also reveal new insights relevant for the design of optimal protocols: We identify capture zones depending not only on the signal power ratio but also on time and phase offsets.Comment: Accepted for publication in the IEEE Transactions on Wireless Communications under the title "On the Reception of Concurrent Transmissions in Wireless Sensor Networks.

    Fe XIII coronal line emission in cool M dwarfs

    Full text link
    We report on a search for the Fe xiii forbidden coronal line at 3388.1 \AA in a sample of 15 M-type dwarf stars covering the whole spectral class as well as different levels of activity. A clear detection was achieved for LHS 2076 during a major flare and for CN Leo, where the line had been discovered before. For some other stars the situation is not quite clear. For CN Leo we investigated the timing behaviour of the Fe xiii line and report a high level of variability on a timescale of hours which we ascribe to microflare heating.Comment: 13 pages, 10 figure
    • 

    corecore