31,347 research outputs found

    A disintegrating cosmic string

    Get PDF
    We present a simple sandwich gravitational wave of the Robinson-Trautman family. This is interpreted as representing a shock wave with a spherical wavefront which propagates into a Minkowski background minus a wedge. (i.e. the background contains a cosmic string.) The deficit angle (the tension) of the string decreases through the gravitational wave, which then ceases. This leaves an expanding spherical region of Minkowski space behind it. The decay of the cosmic string over a finite interval of retarded time may be considered to generate the gravitational wave.Comment: 3 pages, 1 figure, to appear in Class. Quantum Gra

    From adolescent to adult gambling: an analysis of longitudinal gambling patterns in South Australia [forthcoming]

    Get PDF
    Although there are many cross-sectional studies of adolescent gambling, very few longitudinal investigations have been undertaken. As a result, little is known about the individual stability of gambling behaviour and the extent to which behaviour measured during adolescence is related to adult behaviour. In this paper, we report the results of a 4-wave longitudinal investigation of gambling behaviour in a probability sample of 256 young people (50% male, 50% female) who were interviewed in 2005 at the age of 16-18 years and then followed through to the age of 20-21 years. The results indicated that young people showed little stability in their gambling. Relatively few reported gambling on the same individual activities consistently over time. Gambling participation rates increased rapidly as young people made the transition from adolescence to adulthood and then were generally more stable. Gambling at 15-16 years was generally not associated with gambling at age 20-21 years. These results highlight the importance of individual-level analyses when examining gambling patterns over time

    Consistent Quantum Counterfactuals

    Get PDF
    An analysis using classical stochastic processes is used to construct a consistent system of quantum counterfactual reasoning. When applied to a counterfactual version of Hardy's paradox, it shows that the probabilistic character of quantum reasoning together with the ``one framework'' rule prevents a logical contradiction, and there is no evidence for any mysterious nonlocal influences. Counterfactual reasoning can support a realistic interpretation of standard quantum theory (measurements reveal what is actually there) under appropriate circumstances.Comment: Minor modifications to make it agree with published version. Latex 8 pages, 2 figure

    Introduction to Arithmetic Mirror Symmetry

    Full text link
    We describe how to find period integrals and Picard-Fuchs differential equations for certain one-parameter families of Calabi-Yau manifolds. These families can be seen as varieties over a finite field, in which case we show in an explicit example that the number of points of a generic element can be given in terms of p-adic period integrals. We also discuss several approaches to finding zeta functions of mirror manifolds and their factorizations. These notes are based on lectures given at the Fields Institute during the thematic program on Calabi-Yau Varieties: Arithmetic, Geometry, and Physics

    Beyond BRIC: offshoring in non-BRIC countries: Egypt – a new growth market: an LSE Outsourcing Unit report January 2009

    Get PDF
    This report was commissioned as an independently researched report by Hill & Knowlton, acting for the Information Technology Industry Development Agency (ITIDA) of Egypt. The global offshore outsourcing market for IT and business services exceeded $55 billion USD in 2008, and some estimates suggest an annual growth rate of 20% over the next five years. It is common to talk of Brazil, Russia, India and China as the BRIC inheritors of globalisation, offering both offshore IT and back-office services, and also, with their vast populations and developing economies, huge potential markets. This report, however, which was commissioned by the Information Technology Industry Development Agency (ITIDA) of Egypt, set out to investigate to what extent, within this context, non-BRIC countries could also be seen to be potential inheritors of globalisation. A representative sample of 14 countries drawn from Central and Eastern Europe, the African Mediterranean, the Americas and Asia Pacific, where the main active non-BRIC economies can be found, provided the focus for the systematic comparison of their relative competitiveness from which a benchmarking index could be developed. Setting out the long-term context and trends through which these countries are emerging as IT and business service 'hot spots', and identifying the global sourcing trends and pressures that are likely to develop in the next five years and their implications for these non-BRIC countries, the report turns in its final chapters to consider Egypt in more detail to assess its current positioning, the future path that it can take, and the challenges it faces as well as actions needed for it to get there

    Taste or Addiction?: Using Play Logs to Infer Song Selection Motivation

    Full text link
    Online music services are increasing in popularity. They enable us to analyze people's music listening behavior based on play logs. Although it is known that people listen to music based on topic (e.g., rock or jazz), we assume that when a user is addicted to an artist, s/he chooses the artist's songs regardless of topic. Based on this assumption, in this paper, we propose a probabilistic model to analyze people's music listening behavior. Our main contributions are three-fold. First, to the best of our knowledge, this is the first study modeling music listening behavior by taking into account the influence of addiction to artists. Second, by using real-world datasets of play logs, we showed the effectiveness of our proposed model. Third, we carried out qualitative experiments and showed that taking addiction into account enables us to analyze music listening behavior from a new viewpoint in terms of how people listen to music according to the time of day, how an artist's songs are listened to by people, etc. We also discuss the possibility of applying the analysis results to applications such as artist similarity computation and song recommendation.Comment: Accepted by The 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2017

    Love me, love my lectures?

    Get PDF

    Image scoring in ad-hoc networks : an investigation on realistic settings

    Get PDF
    Encouraging cooperation in distributed Multi-Agent Systems (MAS) remains an open problem. Emergent application domains such as Mobile Ad-hoc Networks (MANETs) are characterised by constraints including sparse connectivity and a lack of direct interaction history. Image scoring, a simple model of reputation proposed by Nowak and Sigmund, exhibits low space and time complexity and promotes cooperation through indirect reciprocity, in which an agent can expect cooperation in the future without repeat interactions with the same partners. The low overheads of image scoring make it a promising technique for ad-hoc networking domains. However, the original investigation of Nowak and Sigmund is limited in that it (i) used a simple idealised setting, (ii) did not consider the effects of incomplete information on the mechanism’s efficacy, and (iii) did not consider the impact of the network topology connecting agents. We address these limitations by investigating more realistic values for the number of interactions agents engage in, and show that incomplete information can cause significant errors in decision making. As the proportion of incorrect decisions rises, the efficacy of image scoring falls and selfishness becomes more dominant. We evaluate image scoring on three different connection topologies: (i) completely connected, which closely approximates Nowak and Sigmund’s original setup, (ii) random, with each pair of nodes connected with a constant probability, and (iii) scale-free, which is known to model a number of real world environments including MANETs

    Optimal Eavesdropping in Quantum Cryptography. II. Quantum Circuit

    Full text link
    It is shown that the optimum strategy of the eavesdropper, as described in the preceding paper, can be expressed in terms of a quantum circuit in a way which makes it obvious why certain parameters take on particular values, and why obtaining information in one basis gives rise to noise in the conjugate basis.Comment: 7 pages, 1 figure, Latex, the second part of quant-ph/970103

    Quantum Locality?

    Full text link
    Robert Griffiths has recently addressed, within the framework of a 'consistent quantum theory' that he has developed, the issue of whether, as is often claimed, quantum mechanics entails a need for faster-than-light transfers of information over long distances. He argues that the putative proofs of this property that involve hidden variables include in their premises some essentially classical-physics-type assumptions that are fundamentally incompatible with the precepts of quantum physics. One cannot logically prove properties of a system by establishing, instead, properties of a system modified by adding properties alien to the original system. Hence Griffiths' rejection of hidden-variable-based proofs is logically warranted. Griffiths mentions the existence of a certain alternative proof that does not involve hidden variables, and that uses only macroscopically described observable properties. He notes that he had examined in his book proofs of this general kind, and concluded that they provide no evidence for nonlocal influences. But he did not examine the particular proof that he cites. An examination of that particular proof by the method specified by his 'consistent quantum theory' shows that the cited proof is valid within that restrictive version of quantum theory. An added section responds to Griffiths' reply, which cites general possibilities of ambiguities that make what is to be proved ill-defined, and hence render the pertinent 'consistent framework' ill defined. But the vagaries that he cites do not upset the proof in question, which, both by its physical formulation and by explicit identification, specify the framework to be used. Griffiths confirms the validity of the proof insofar as that framework is used. The section also shows, in response to Griffiths' challenge, why a putative proof of locality that he has described is flawed.Comment: This version adds a response to Griffiths' reply to my original. It notes that Griffiths confirms the validity of my argument if one uses the framework that I use. Griffiths' objection that other frameworks exist is not germaine, because I use the unique one that satisfies the explicitly stated conditions that the choices be macroscopic choices of experiments and outcomes in a specified orde
    corecore