3,114 research outputs found

    National Survey of Adult Skills in Wales 2010

    Get PDF

    Inverse Magnetic Catalysis in Bottom-Up Holographic QCD

    Full text link
    We explore the effect of magnetic field on chiral condensation in QCD via a simple bottom up holographic model which inputs QCD dynamics through the running of the anomalous dimension of the quark bilinear. Bottom up holography is a form of effective field theory and we use it to explore the dependence on the coefficients of the two lowest order terms linking the magnetic field and the quark condensate. In the massless theory, we identify a region of parameter space where magnetic catalysis occurs at zero temperature but inverse magnetic catalysis at temperatures of order the thermal phase transition. The model shows similar non-monotonic behaviour in the condensate with B at intermediate T as the lattice data. This behaviour is due to the separation of the meson melting and chiral transitions in the holographic framework. The introduction of quark mass raises the scale of B where inverse catalysis takes over from catalysis until the inverse catalysis lies outside the regime of validity of the effective description leaving just catalysis.Comment: 9 pages, 8 figure

    High-order regularized regression in Electrical Impedance Tomography

    Full text link
    We present a novel approach for the inverse problem in electrical impedance tomography based on regularized quadratic regression. Our contribution introduces a new formulation for the forward model in the form of a nonlinear integral transform, that maps changes in the electrical properties of a domain to their respective variations in boundary data. Using perturbation theory the transform is approximated to yield a high-order misfit unction which is then used to derive a regularized inverse problem. In particular, we consider the nonlinear problem to second-order accuracy, hence our approximation method improves upon the local linearization of the forward mapping. The inverse problem is approached using Newton's iterative algorithm and results from simulated experiments are presented. With a moderate increase in computational complexity, the method yields superior results compared to those of regularized linear regression and can be implemented to address the nonlinear inverse problem

    Postwar Serbian Nationalism and the Limits of Invention

    Get PDF
    Serbs have rarely drawn the attention of theorists of nationalism. Nonetheless, even if they have not been christened this or that sort of nationalist by theorists, they have emerged from the 1990S with two sets of descriptors attached to them by journalists, scholars and politicians, and those descriptors conform to the general outlines of current theoretical discourse. Serbs are either the captives of \u27ancient hatreds\u27 or the manipulated victims of modern state-builders. By now most of us no doubt laugh at the notion that ancient hatreds were the catalyst of the wars in Yugoslaviain the 1990S and nod approvingly at the suggestion that nationalism was merely a piece of Slobodan Milošević\u27s strategy in his consolidation of power in Serbia during the 1980s. Thus for most of us the Serbian nationalist movement of the 1980s and 1990S confirms the position of the \u27modernists\u27 among nationalism theorists, who argue that nationalism and national identity are functions of the actions of modern states. Using a case study drawn from my research, I shall argue in this article that we should neither uncritically accept modernist conclusions regarding Serbian nationalism nor dismiss out of hand variations on the disreputable \u27ancient hatreds\u27 (or in theoretical terms, primordialist) approach. Instead, I shall argue, modern Serbian nationalism cannot be explained by or contained within a single theoretical model

    Intonation in neurogenic foreign accent syndrome

    Get PDF
    Foreign accent syndrome (FAS) is a motor speech disorder in which changes to segmental as well as suprasegmental aspects lead to the perception of a foreign accent in speech. This paper focuses on one suprasegmental aspect, namely that of intonation. It provides an in-depth analysis of the intonation system of four speakers with FAS with the aim of establishing the intonational changes that have taken place as well as their underlying origin. Using the autosegmental-metrical framework of intonational analysis, four different levels of intonation, i.e. inventory, distribution, realisation and function, were examined. Results revealed that the speakers with FAS had the same structural inventory at their disposal as the control speakers, but that they differed from the latter in relation to the distribution, implementation and functional use of their inventory. In contrast to previous findings, the current results suggest that these intonational changes cannot be entirely attributed to an underlying intonation deficit but also reflect secondary manifestations of physiological constraints affecting speech support systems and compensatory strategies. These findings have implications for the debate surrounding intonational deficits in FAS, advocating a reconsideration of current assumptions regarding the underlying nature of intonation impairment in FAS

    DIGITAL VEHICLE KEY ACCESS FOR PROVIDING RESTRICTED VEHICLE USAGE

    Get PDF
    A third party (e.g., a valet, a parking service, a vehicle rental customer, an acquaintance, etc.) may receive an anonymous digital key for operating a vehicle (e.g., an automobile, a motorcycle, a bus, etc.) owned by another person. For example, the owner of the vehicle may use a computing device (e.g., a cellular phone, a smartphone, a laptop computer, a tablet computer, etc.) to provide ownership information (e.g., an original digital key) to a computing system (e.g., a remote cloud server having a pre-negotiated certification with the vehicle manufacturer). Responsive to confirming ownership of the vehicle, the computing system may generate or otherwise provide an anonymous digital key for operating the vehicle. The third party may use a computing device to access the anonymous digital key and operate the vehicle. The anonymous digital key may be configured with various geographic restrictions, performance restrictions, time restrictions, etc., which may limit what an operator using the anonymous digital key may do with the vehicle. The anonymous digital key may expire (e.g., after a predetermined amount of time) and, once expired, the anonymous digital key may no longer be used to operate the vehicle

    Straightening Curved Traffic Lanes in Video

    Get PDF
    Video based vehicle sensing from uncalibrated cameras providesuseful traffic information to modern Intelligent Transportation Systems(ITS). This requires vehicle tracking and Turning MovementCounts (TMCs). Traffic scenes contain vehicle motion constrainedalong possibly curved traffic lanes which can be normalized intostraight lines. A simple interpolation scheme is presented whichprojects to image sequences where vehicles always appear to movestraight horizontally for simplified vehicle tracking

    Dense Galactic Superclusters Add New Structural Details to the Universe

    Get PDF
    At the American Astronomical Society meeting in Austin, Texas, Thursday, January 7, 1999, astronomers David Batuski and Chris Miller of the University of Maine, presented evidence of two relatively rare types of galaxy superclusters in a single colossal complex in the southern part of the constellation Aquarius. The complex consists of two long filaments, one of which is the longest such object yet seen, and a dense knot of clusters. These findings add significantly to the emerging picture of large-scale structure in the present-day universe and provide some well-defined examples of structure that must be explained by processes in the fireball of the Big Bang. Future analysis of the knot of clusters, when studied in detail with three other similar clumps of clusters, may prove that some vast objects may be collapsing within our otherwise expanding universe
    corecore