1,188 research outputs found
SEROLOGICAL INVESTIGATION OF CYTOMEGALOVIRUS ANTIBODY DISTRIBUTION AMONG PEOPLE OF DIFFERENT AGE
No abstrac
On the crossing relation in the presence of defects
The OPE of local operators in the presence of defect lines is considered both
in the rational CFT and the Virasoro (Liouville) theory. The duality
transformation of the 4-point function with inserted defect operators is
explicitly computed. The two channels of the correlator reproduce the
expectation values of the Wilson and 't Hooft operators, recently discussed in
Liouville theory in relation to the AGT conjecture.Comment: TEX file with harvmac; v3: JHEP versio
Conformal Field Theories, Graphs and Quantum Algebras
This article reviews some recent progress in our understanding of the
structure of Rational Conformal Field Theories, based on ideas that originate
for a large part in the work of A. Ocneanu. The consistency conditions that
generalize modular invariance for a given RCFT in the presence of various types
of boundary conditions --open, twisted-- are encoded in a system of integer
multiplicities that form matrix representations of fusion-like algebras. These
multiplicities are also the combinatorial data that enable one to construct an
abstract ``quantum'' algebra, whose - and -symbols contain essential
information on the Operator Product Algebra of the RCFT and are part of a cell
system, subject to pentagonal identities. It looks quite plausible that the
classification of a wide class of RCFT amounts to a classification of ``Weak
- Hopf algebras''.Comment: 23 pages, 12 figures, LateX. To appear in MATHPHYS ODYSSEY 2001
--Integrable Models and Beyond, ed. M. Kashiwara and T. Miwa, Progress in
Math., Birkhauser. References and comments adde
On the Classification of Bulk and Boundary Conformal Field Theories
The classification of rational conformal field theories is reconsidered from
the standpoint of boundary conditions. Solving Cardy's equation expressing the
consistency condition on a cylinder is equivalent to finding integer valued
representations of the fusion algebra. A complete solution not only yields the
admissible boundary conditions but also gives valuable information on the bulk
properties.Comment: 7 pages, LaTeX; minor correction
Decreased recall of primacy words predicts cognitive decline.
One of the cognitive changes associated with Alzheimer's disease is a diminution of the primacy effect, i.e., the tendency toward better recall of items studied early on a list compared with the rest. We examined whether learning and recall of primacy words predicted subsequent cognitive decline in 204 elderly subjects who were non-demented and cognitively intact when first examined. Our results show that poorer primacy performance in the Rey Auditory Verbal Learning Test delayed recall trials, but not in immediate recall trials, is an effective predictor of subsequent decline in general cognitive function. This pattern of performance can be interpreted as evidence that failure to consolidate primacy items is a marker of cognitive decline
Spectrum of a duality-twisted Ising quantum chain
The Ising quantum chain with a peculiar twisted boundary condition is
considered. This boundary condition, first introduced in the framework of the
spin-1/2 XXZ Heisenberg quantum chain, is related to the duality
transformation, which becomes a symmetry of the model at the critical point.
Thus, at the critical point, the Ising quantum chain with the duality-twisted
boundary is translationally invariant, similar as in the case of the usual
periodic or antiperiodic boundary conditions. The complete energy spectrum of
the Ising quantum chain is calculated analytically for finite systems, and the
conformal properties of the scaling limit are investigated. This provides an
explicit example of a conformal twisted boundary condition and a corresponding
generalised twisted partition function.Comment: LaTeX, 7 pages, using IOP style
The Virtue of Defects in 4D Gauge Theories and 2D CFTs
We advance a correspondence between the topological defect operators in
Liouville and Toda conformal field theories - which we construct - and loop
operators and domain wall operators in four dimensional N=2 supersymmetric
gauge theories on S^4. Our computation of the correlation functions in
Liouville/Toda theory in the presence of topological defect operators, which
are supported on curves on the Riemann surface, yields the exact answer for the
partition function of four dimensional gauge theories in the presence of
various walls and loop operators; results which we can quantitatively
substantiate with an independent gauge theory analysis. As an interesting
outcome of this work for two dimensional conformal field theories, we prove
that topological defect operators and the Verlinde loop operators are different
descriptions of the same operators.Comment: 59 pages, latex; v2 corrections to some formula
Recommended from our members
Schools and Terrorism: Global Trends, Impacts, and Lessons for Resilience
This study characterizes trends in the frequency and characteristics of terrorist attacks in child-serving educational institutions around the world, examining the specific vulnerabilies of children and schools with regard to terrorist violence, as well as the various impacts that violence has on children, communities, and societies. Following the analysis of available data on terrorist attacks against educational institutions, vulnerabilities, and impacts, the study concludes with a discussion of what still needs to be understood in the intersection of child vulnerability and terrorism, and provides recommendations for improving resilience to terrorist attacks against child-serving educational institutions.
One would like to think that certain truths or values would be universally understood as rules of engagement, formally declared or otherwise. The sanctity of children's well-being should be unquestioned, regardless of the issues at stake in the larger conflict. Sadly, history shows that this understanding is neither universally shared nor uniformly valued.
—Irwin Redlener, Americans at Risk, 2007
Since the violent attack on School Number One in Beslan, Russia in 2004, the perceived threat of massive terror attacks targeting schoolchildren has loomed in the public consciousness. In recent years, attacks against educational institutions worldwide have increasingly been reported and documented. The kidnapping of 276 schoolgirls by Boko Haram in Nigeria and the massacre of at least 150 students and staff in a Peshawar school by the Pakistani Taliban in 2014 are still fresh in the minds of the public. These attacks serve as reminders of the vulnerability that children in schools face, being “soft targets” whose symbolic value has the capacity of invoking mayhem at the largest possible scale. They also demonstrate the urgency with which this emerging trend in violence must be systemically recorded, analyzed, and mitigated.
The following article will discuss the vulnerability of children with regard to terrorist violence, exploring the literature on what makes children and educational institutions particularly desirable targets. Trends in the frequency and characteristics of terrorist attacks against child-serving educational institutions around the world will be examined, paying particular attention to potential school level and gendered disparities. Finally, a critical analysis on what can be learned from the available data and what still needs to be researched in the nexus of child vulnerability and terrorism will be provided
Recommended from our members
Acts of terrorism and mass violence targeting schools : Analysis and implications for preparedness in the USA
To enhance the preparedness of US schools to acts of terrorism and mass violence, the landscape of threats against schools must first be understood. This includes exploring the global trends of acts of terrorism against schools, as well as looking specifically at the history of terrorism and acts of mass violence against schools domestically. This paper conducts a review of two databases in order to look at the trends in acts of terrorism and mass violence carried out against schools, and provides recommendations for domestic school preparedness based on this information
The Boundary Conformal Field Theories of the 2D Ising critical points
We present a new method to identify the Boundary Conformal Field Theories
(BCFTs) describing the critical points of the Ising model on the strip. It
consists in measuring the low-lying excitation energies spectra of its quantum
spin chain for different boundary conditions and then to compare them with
those of the different boundary conformal field theories of the
minimal model.Comment: 7 pages, no figures. Talk given at the XXth International Conference
on Integrable Systems and Quantum Symmetries (ISQS-20). Prague, June 201
- …