2,320 research outputs found

    High-temperature expansion of the magnetic susceptibility and higher moments of the correlation function for the two-dimensional XY model

    Full text link
    We calculate the high-temperature series of the magnetic susceptibility and the second and fourth moments of the correlation function for the XY model on the square lattice to order β33\beta^{33} by applying the improved algorithm of the finite lattice method. The long series allow us to estimate the inverse critical temperature as βc=1.1200(1)\beta_c=1.1200(1), which is consistent with the most precise value given previously by the Monte Carlo simulation. The critical exponent for the multiplicative logarithmic correction is evaluated to be θ=0.054(10)\theta=0.054(10), which is consistent with the renormalization group prediction of θ=1/16\theta={1/16}.Comment: 13 pages, 8 Postscript figure

    Bethe lattice solution of a model of SAW's with up to 3 monomers per site and no restriction

    Full text link
    In the multiple monomers per site (MMS) model, polymeric chains are represented by walks on a lattice which may visit each site up to K times. We have solved the unrestricted version of this model, where immediate reversals of the walks are allowed (RA) for K = 3 on a Bethe lattice with arbitrary coordination number in the grand-canonical formalism. We found transitions between a non-polymerized and two polymerized phases, which may be continuous or discontinuous. In the canonical situation, the transitions between the extended and the collapsed polymeric phases are always continuous. The transition line is partly composed by tricritical points and partially by critical endpoints, both lines meeting at a multicritical point. In the subspace of the parameter space where the model is related to SASAW's (self-attracting self-avoiding walks), the collapse transition is tricritical. We discuss the relation of our results with simulations and previous Bethe and Husimi lattice calculations for the MMS model found in the literature.Comment: 25 pages, 9 figure

    Expanding Navigation Systems by Integrating It with Advanced Technologies

    Get PDF
    Navigation systems provide the optimized route from one location to another. It is mainly assisted by external technologies such as Global Positioning System (GPS) and satellite-based radio navigation systems. GPS has many advantages such as high accuracy, available anywhere, reliable, and self-calibrated. However, GPS is limited to outdoor operations. The practice of combining different sources of data to improve the overall outcome is commonly used in various domains. GIS is already integrated with GPS to provide the visualization and realization aspects of a given location. Internet of things (IoT) is a growing domain, where embedded sensors are connected to the Internet and so IoT improves existing navigation systems and expands its capabilities. This chapter proposes a framework based on the integration of GPS, GIS, IoT, and mobile communications to provide a comprehensive and accurate navigation solution. In the next section, we outline the limitations of GPS, and then we describe the integration of GIS, smartphones, and GPS to enable its use in mobile applications. For the rest of this chapter, we introduce various navigation implementations using alternate technologies integrated with GPS or operated as standalone devices

    A New Twist in the War on Drugs: The Constitutional Right of a Mentally Ill Criminal Defendant to Refuse Antipsychotic Medication That Would Make Him Competent to Stand Trial

    Get PDF
    The purpose of this Note is to analyze what right, if any exists for a mentally ill criminal defendant to refuse the administration of antipsychotic drugs to gain competence to stand trial. Focusing mainly on the trial context of the right to refuse is not to suggest that there is not overlap between the right of a criminal defendant to refuse and the right of a civilly committed patient to refuse. Indeed, it is often unclear why an individual is brought to the emergency room of a general hospital and eventually committed, rather than being arrested and booked and later found incompetent to stand trial. The constitutional analysis of the right of a mentally ill defendant to refuse antipsychotic drugs is informed by the existence of a similar right in the civil commitment area, although the state interests in these two areas differ; while the state interest in forcibly medicating a defendant for the purpose of standing trial is that of trying those accused in good faith of violating its laws, the interests in coercing antipsychotic drug treatment in the civil commitment area are patient contro, treatment, and fiscal concerns. This Note first analyzes the relationship between competency and ability and then presents the arguments supporting the view that a defendant should have no meaningful right to refuse medication. After presenting the legal analysis supporting the right to refuse antipsychotic drugs in the trial setting, the Note proceeds to consider several possible alternatives to forced drugging as a means toward achieving the state\u27s goal of a fair trial and concludes that these alternatives, while arguably less effective than medication, are preferable to forced drugging since they more adequately address the legitimate concerns of both the state and the mentally ill criminal defendant

    Systematic Series Expansions for Processes on Networks

    Full text link
    We use series expansions to study dynamics of equilibrium and non-equilibrium systems on networks. This analytical method enables us to include detailed non-universal effects of the network structure. We show that even low order calculations produce results which compare accurately to numerical simulation, while the results can be systematically improved. We show that certain commonly accepted analytical results for the critical point on networks with a broad degree distribution need to be modified in certain cases due to disassortativity; the present method is able to take into account the assortativity at sufficiently high order, while previous results correspond to leading and second order approximations in this method. Finally, we apply this method to real-world data.Comment: 4 pages, 3 figure

    I Shot the Sheriff, but Only My Analyst Knows: Shrinking the Psychotherapist-Patient Privilege

    Get PDF
    This Note will discuss the psychotherapist-patient privileges as it relates to past crimes and will use the Menendez facts to analyze different problems associated with the privilege. First, privileges law in general will be described with an emphasis on the public policy rationales supporting the specific privileges; ample space will then be devoted exclusively to the psychotherapist -patient privilege, especially the unique problems associated with having any exceptions which allow testimony of psychotherapeutic communications. The Note will then discuss the recognized exceptions to the psychotherapist privilege to see if a case can be made for an exception relating to past crimes. Empirical studies have shown the futility in using the expectations of a reasonable patient about his or her confidences in determining the reasonableness of an exception to the privilege. Therefore, this Note argues for adoption of a not unreasonable standard in analyzing the psychotherapist-patient privilege exceptions to conclude that courts should define (and legislatures should adopt) clearly worded psychotherapist-patient privilege rules with a homicide exception for past crimes. The current existence of the judicial discretion approach to privilege exception problems underscores the need for clearer and more uniform standards

    I Shot the Sheriff, but Only My Analyst Knows: Shrinking the Psychotherapist-Patient Privilege

    Get PDF
    This Note will discuss the psychotherapist-patient privileges as it relates to past crimes and will use the Menendez facts to analyze different problems associated with the privilege. First, privileges law in general will be described with an emphasis on the public policy rationales supporting the specific privileges; ample space will then be devoted exclusively to the psychotherapist -patient privilege, especially the unique problems associated with having any exceptions which allow testimony of psychotherapeutic communications. The Note will then discuss the recognized exceptions to the psychotherapist privilege to see if a case can be made for an exception relating to past crimes. Empirical studies have shown the futility in using the expectations of a reasonable patient about his or her confidences in determining the reasonableness of an exception to the privilege. Therefore, this Note argues for adoption of a not unreasonable standard in analyzing the psychotherapist-patient privilege exceptions to conclude that courts should define (and legislatures should adopt) clearly worded psychotherapist-patient privilege rules with a homicide exception for past crimes. The current existence of the judicial discretion approach to privilege exception problems underscores the need for clearer and more uniform standards

    Wearable Devices and their Implementation in Various Domains

    Get PDF
    Wearable technologies are networked devices that collect data, track activities and customize experiences to users? needs and desires. They are equipped, with microchips sensors and wireless communications. All are mounted into consumer electronics, accessories and clothes. They use sensors to measure temperature, humidity, motion, heartbeat and more. Wearables are embedded in various domains, such as healthcare, sports, agriculture and navigation systems. Each wearable device is equipped with sensors, network ports, data processor, camera and more. To allow monitoring and synchronizing multiple parameters, typical wearables have multi-sensor capabilities and are configurable for the application purpose. For the wearer?s convenience, wearables are lightweight, modest shape and multifunctional. Wearables perform the following tasks: sense, analyze, store, transmit and apply. The processing may occur on the wearer or at a remote location. For example, if dangerous gases are detected, the data are processed, and an alert is issued. It may be transmitted to a remote location for testing and the results can be communicated in real-time to the user. Each scenario requires personalized mobile information processing, which transforms the sensory data to information and then to knowledge that will be of value to the individual responding to the situation

    An Adaptive Lightweight Security Framework Suited for IoT

    Get PDF
    Standard security systems are widely implemented in the industry. These systems consume considerable computational resources. Devices in the Internet of Things [IoT] are very limited with processing capacity, memory and storage. Therefore, existing security systems are not applicable for IoT. To cope with it, we propose downsizing of existing security processes. In this chapter, we describe three areas, where we reduce the required storage space and processing power. The first is the classification process required for ongoing anomaly detection, whereby values accepted or generated by a sensor are classified as valid or abnormal. We collect historic data and analyze it using machine learning techniques to draw a contour, where all streaming values are expected to fall within the contour space. Hence, the detailed collected data from the sensors are no longer required for real-time anomaly detection. The second area involves the implementation of the Random Forest algorithm to apply distributed and parallel processing for anomaly discovery. The third area is downsizing cryptography calculations, to fit IoT limitations without compromising security. For each area, we present experimental results supporting our approach and implementation
    • …
    corecore