7,331 research outputs found

    Computing the Affective-Aesthetic Potential of Literary Texts

    Get PDF
    In this paper, we compute the affective-aesthetic potential (AAP) of literary texts by using a simple sentiment analysis tool called SentiArt. In contrast to other established tools, SentiArt is based on publicly available vector space models (VSMs) and requires no emotional dictionary, thus making it applicable in any language for which VSMs have been made available (>150 so far) and avoiding issues of low coverage. In a first study, the AAP values of all words of a widely used lexical databank for German were computed and the VSM’s ability in representing concrete and more abstract semantic concepts was demonstrated. In a second study, SentiArt was used to predict ~2800 human word valence ratings and shown to have a high predictive accuracy (R2 > 0.5, p < 0.0001). A third study tested the validity of SentiArt in predicting emotional states over (narrative) time using human liking ratings from reading a story. Again, the predictive accuracy was highly significant: R2adj = 0.46, p < 0.0001, establishing the SentiArt tool as a promising candidate for lexical sentiment analyses at both the micro- and macrolevels, i.e., short and long literary materials. Possibilities and limitations of lexical VSM-based sentiment analyses of diverse complex literary texts are discussed in the light of these results

    Formation of Subgap States in Carbon Nanotubes Due to a Local Transverse Electric Field

    Get PDF
    We introduce two simple models to study the effect of a spatially localized transverse electric field on the low-energy electronic structure of semiconducting carbon nanotubes. Starting from the Dirac Hamiltonian for the low energy states of a carbon nanotube, we use scattering theory to show that an arbitrarily weak field leads to the formation of localized electronic states inside the free nanotube band gap. We study the binding energy of these subgap states as a function of the range and strength of the electrostatic potential. When the range of the potential is held constant and the strength is varied, the binding energy shows crossover behavior: the states lie close to the free nanotube band edge until the potential exceeds a threshold value, after which the binding energy increases rapidly. When the potential strength is held constant and the range is varied, we find resonant behavior: the binding energy passes through a maximum as the range of the potential is increased. Large electric fields confined to a small region of the nanotube are required to create localized states far from the band edge.Comment: 15 pages + 5 figures, 1 table in RevTe

    Beyond Bullets and Bombs: Fixing the U.S. Approach to Development in Pakistan

    Get PDF
    Explains the rationale for a clear U.S. strategy for Pakistan's development, ways to improve planning and implementation, and policy recommendations for supporting the private sector through trade and investment and targeting aid for long-term impact

    Nonradiative Recombination of Excitons in Carbon Nanotubes Mediated by Free Charge Carriers

    Get PDF
    Free electrons or holes can mediate the nonradiative recombination of excitons in carbon nanotubes. Kinematic constraints arising from the quasi one-dimensional nature of excitons and charge carriers lead to a thermal activation barrier for the process. However, a model calculation suggests that the rate for recombination mediated by a free electron is the same order of magnitude as that of two-exciton recombination. Small amounts of doping may contribute to the short exciton lifetimes and low quantum yields observed in carbon nanotubes.Comment: 18 pages, 4 figures. Submitted to Physical Review

    An interference refractometer for gases and liquids

    Get PDF

    Hypertesting:The Case for Automated Testing of Hyperproperties

    Get PDF
    Abstract. Proof systems give absolute guarantees but are notoriously difficult to use for non-experts. Bug-finding tools make no completeness guarantees but offer a high degree of automation and are relatively easy to use for developers. For safety properties, the effectiveness of automatic test generation and bug finding is well established. For security properties like non-interference, which cannot be expressed as properties of a single program execution (i.e., hyperproperties), methods for testing and bug finding are in their infancy. In general, violations of hyperproperties cannot be expressed with a single test case like safety properties, so existing bug finding methods do not apply. This paper takes the position that we should fill this gap in the arsenal of ver-ification technology and outlines concepts and tools for the next generation of bug finding systems. In particular, we aim to establish a generalized concept for the generation of “hypertests”, sets of tests that either provide some level of con-fidence in the system or give counterexamples to hyperproperties. As concrete instances of hypertesting, we foresee automated testing for violations of secure information flow and of numeric and cryptographic properties of programs.

    Guerrilla‐style Defensive Architecture in D etroit: A Self‐provisioned Security Strategy in a Neoliberal Space of Disinvestment

    Full text link
    Self‐provisioning has long been an important component of urban political economic processes. However, it has recently become a central feature of grassroots urban governance strategies as well. In tumultuous cities of the twenty‐first century, with governments either unwilling or unable to effectively enforce zoning laws, police neighborhoods or manage infrastructure, some householders have begun performing these services instead. This article examines one subset of self‐provisioning practices that has emerged in southwest D etroit where residents have taken steps to secure abandoned housing as a means of exerting social control over their living environment. These actions embody many contradictions and ethical dilemmas, and the intimate scale of action has left the structural production of disinvestment in places like D etroit largely unchecked. Nevertheless, these guerilla‐style spatial interventions have emerged as critically important response strategies helping residents reduce their vulnerability and stabilize their blocks even as other nearby areas continue to experience decline.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/108307/1/ijur12158.pd
    • 

    corecore