On enriching the Levin–Wen model with symmetry
نویسندگان
چکیده
منابع مشابه
THE FRANK KINETIC MODEL FOR SPONTANEOUS CHIRAL SYMMETRY BREAKING WITH VARIABLE CONCENTRATION OF THE ACHIRAL SUBSTRATE
This paper considers the possibility of spontaneous transition of aracemic mixture (composed of equal amounts of two enantiomeric species, say L and D) into a monochiral state (in which only one enantiomer, say L, is present). Transitions of this kind have been recently experimentally observed. A plausible approach to this phenomenon is a model put forward by Frank, based on simple laws of ...
متن کاملa study on insurer solvency by panel data model: the case of iranian insurance market
the aim of this thesis is an approach for assessing insurer’s solvency for iranian insurance companies. we use of economic data with both time series and cross-sectional variation, thus by using the panel data model will survey the insurer solvency.
the effect of using model essays on the develpment of writing proficiency of iranina pre-intermediate efl learners
abstract the present study was conducted to investigate the effect of using model essays on the development of writing proficiency of iranian pre-intermediate efl learners. to fulfill the purpose of the study, 55 pre- intermediate learners of parsa language institute were chosen by means of administering proficiency test. based on the results of the pretest, two matched groups, one as the expe...
Enriching the ER model based on discovered association rules
The entity–relationship (ER) model, a powerful means for business and data modeling, needs to be enriched with new semantics as the real world changes and its understanding improves. This paper attempts at enriching the ER model based on association rules (AR) discovered from large databases by introducing specializations and sub-types into the ER model. The proposed framework is extended to de...
متن کاملConstraint solving techniques and enriching the model with equational theories
Derivability constraints represent in a symbolic way the infinite set of possible executions of a finite protocol, in presence of an arbitrary active attacker. Solving a derivability constraint consists in computing a simplified representation of such executions, which is amenable to the verification of any (trace) security property. Our goal is to explain this method on a non-trivial combinati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics A: Mathematical and Theoretical
سال: 2015
ISSN: 1751-8113,1751-8121
DOI: 10.1088/1751-8113/48/12/12ft01