1,640 research outputs found

    Optimal progressive taxation in a model with endogenous skill supply

    Get PDF
    No abstract available

    CP, T and CPT Violations in the K^0 - bar{K^0} System -- Present Status --

    Full text link
    Possible violation of CP, T and CPT symmetries in the K^0 - bar{K^0} system is studied in a way as phenomenological and comprehensive as possible. For this purpose, we first introduce parameters which represent violation of these symmetries in mixing parameters and decay amplitudes in a convenient and well-defined way and, treating these parameters as small, derive formulas which relate them to the experimentally measured quantities. We then perform numerical analyses to derive constraints to these symmetry-violating parameters, with the latest data reported by KTeV Collaboration, NA48 Collaboration and CPLEAR Collaboration, along with those compiled by Particle Data Group, used as inputs. The result obtained by CPLEAR Collaboration from an unconstrained fit to a time-dependent leptonic asymmetry, aided by the Bell-Steinberger relation, enables us to determine or constrain most of the parameters separately. It is shown among the other things that (1) CP and T symmetries are violated definitively at least at the level of 10^{-4} in 2 pi decays, (2) CP and T symmetries are violated at least at the level of 10^{-3} in the K^0 - bar{K^0} mixing, and (3) CPT symmetry is at present tested to the level of 10^{-5} at the utmost.Comment: 20 page

    Modelled testbeds: Visualizing and augmenting physical testbeds with virtual resources

    Get PDF
    Testbed facilities play a major role in the study and evolution of emerging technologies, such as those related to the Internet of Things. In this work we introduce the concept of modelled testbeds, which are 3D interactive representations of physical testbeds where the addition of virtual resources mimicking the physical ones is made possible thanks to back-end infrastructure. We present the architecture of the Syndesi testbed, deployed at the premises of University of Geneva, which was used for the prototype modelled testbed. We investigate several extrapolation techniques towards realistic value assignment for virtual sensor measurements. K-fold cross validation is performed in a dataset comprising of nearly 300’000 measurements of temperature, illuminance and humidity sensors collected from the physical sensors of the Syndesi testbed, in order to evaluate the accuracy of the methods. We obtain strong results including Mean Absolute Percentage Error (MAPE) levels below 7%

    Considerations on Super Poincare Algebras and their Extensions to Simple Superalgebras

    Get PDF
    We consider simple superalgebras which are a supersymmetric extension of \fspin(s,t) in the cases where the number of odd generators does not exceed 64. All of them contain a super Poincar\'e algebra as a contraction and another as a subalgebra. Because of the contraction property, some of these algebras can be interpreted as de Sitter or anti de Sitter superalgebras. However, the number of odd generators present in the contraction is not always minimal due to the different splitting properties of the spinor representations under a subalgebra. We consider the general case, with arbitrary dimension and signature, and examine in detail particular examples with physical implications in dimensions d=10d=10 and d=4d=4.Comment: 16 pages, AMS-LaTeX. Version to appear in the Reviews in Mathematical Physic

    To adapt or not to adapt? Technical debt and learning driven self-adaptation for managing runtime performance

    Get PDF
    Self-adaptive system (SAS) can adapt itself to optimize various key performance indicators in response to the dynamics and uncertainty in environment. In this paper, we present Debt Learning Driven Adaptation (DLDA), an framework that dynamically determines when and whether to adapt the SAS at runtime. DLDA leverages the temporal adaptation debt, a notion derived from the technical debt metaphor, to quantify the time-varying money that the SAS carries in relation to its performance and Service Level Agreements. We designed a temporal net debt driven labeling to label whether it is economically healthier to adapt the SAS (or not) in a circumstance, based on which an online machine learning classifier learns the correlation, and then predicts whether to adapt under the future circumstances. We conducted comprehensive experiments to evaluate DLDA with two different planners, using 5 online machine learning classifiers, and in comparison to 4 state-of-the-art debt- oblivious triggering approaches. The results reveal the effectiveness and superiority of DLDA according to different metrics

    Modeling Harris Current Sheets with Themis Observations

    Get PDF
    Current sheets are ubiquitous in nature. occurring in such varied locations as the solar atmosphere. the heliosphere, and the Earth's magnetosphere. The simplest current sheet is the one-dimensional Harris neutral sheet, with the lobe field strength and scale-height the only free parameters. Despite its simplicity, confirmation of the Harris sheet as a reasonable description of the Earth's current sheet has remained elusive. In early 2009 the orbits of the 5 THEMIS probes fortuitously aligned such that profiles of the Earth's current sheet could be modeled in a time dependent manner. For the few hours of alignment we have calculated the time history of the current sheet parameters (scale height and current) in the near-Earth region. during both quiet and active times. For one particular substorm. we further demonstrate good quantitative agreement with the diversion of cross tail current inferred from the Harris modeling with the ionospheric current inferred from ground magnetometer data

    Improving sensor network performance with wireless energy transfer

    Get PDF
    Through recent technology advances in the field of wireless energy transmission Wireless Rechargeable Sensor Networks have emerged. In this new paradigm for wireless sensor networks a mobile entity called mobile charger (MC) traverses the network and replenishes the dissipated energy of sensors. In this work we first provide a formal definition of the charging dispatch decision problem and prove its computational hardness. We then investigate how to optimise the trade-offs of several critical aspects of the charging process such as: a) the trajectory of the charger; b) the different charging policies; c) the impact of the ratio of the energy the Mobile Charger may deliver to the sensors over the total available energy in the network. In the light of these optimisations, we then study the impact of the charging process to the network lifetime for three characteristic underlying routing protocols; a Greedy protocol, a clustering protocol and an energy balancing protocol. Finally, we propose a mobile charging protocol that locally adapts the circular trajectory of the MC to the energy dissipation rate of each sub-region of the network. We compare this protocol against several MC trajectories for all three routing families by a detailed experimental evaluation. The derived findings demonstrate significant performance gains, both with respect to the no charger case as well as the different charging alternatives; in particular, the performance improvements include the network lifetime, as well as connectivity, coverage and energy balance properties

    Anti de Sitter Holography via Sekiguchi Decomposition

    Full text link
    In the present paper we start consideration of anti de Sitter holography in the general case of the (q+1)-dimensional anti de Sitter bulk with boundary q-dimensional Minkowski space-time. We present the group-theoretic foundations that are necessary in our approach. Comparing what is done for q=3 the new element in the present paper is the presentation of the bulk space as the homogeneous space G/H = SO(q,2)/SO(q,1), which homogeneous space was studied by Sekiguchi.Comment: 10 pages, to appear in the Proceedings of the XI International Workshop "Lie Theory and Its Applications in Physics", (Varna, Bulgaria, June 2015

    Inter-social-networking: Accounting for multiple identities

    Get PDF
    We argue that the current approaches to online social networking give rise to numerous challenges regarding the management of the multiple facets of people’s digital identities within and around social networking sites (SNS). We propose an architecture for enabling people to better manage their SNS identities that is informed by the way the core Internet protocols developed to support interoperation of proprietary network protocols, and based on the idea of Separation of Concerns [1]. This does not require modification of existing services but is predicated on providing a connecting layer over them, both as a mechanism to address problems of privacy and identity, and to create opportunities to open up online social networking to a much richer set of possible interactions and applications.This work is supported by Horizon Digital Economy Research, RCUK grant EP/G065802/1; and by CREATe, the Centre for Copyright and New Business Models, RCUK grant AH/K000179/1. Packages and source are available under open source licenses at github.com/CREATe-centre/.This is the author accepted manuscript. The final version is available from Springer via http://dx.doi.org/10.1007/978-3-319-20367-6_2
    corecore