skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Extreme co-movements between infectious disease events and crude oil futures prices: From extreme value analysis perspective
Award ID(s):
2012298
PAR ID:
10340961
Author(s) / Creator(s):
;
Date Published:
Journal Name:
Energy Economics
Volume:
110
Issue:
C
ISSN:
0140-9883
Page Range / eLocation ID:
106054
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Numerically computed with high accuracy are periodic travelling waves at the free surface of a two-dimensional, infinitely deep, and constant vorticity flow of an incompressible inviscid fluid, under gravity, without the effects of surface tension. Of particular interest is the angle the fluid surface of an almost extreme wave makes with the horizontal. Numerically found are the following. (i) There is a boundary layer where the angle rises sharply from $$0^\circ$$ at the crest to a local maximum, which converges to $$30.3787\ldots ^\circ$$ , independently of the vorticity, as the amplitude increases towards that of the extreme wave, which displays a corner at the crest with a $$30^\circ$$ angle. (ii) There is an outer region where the angle descends to $$0^\circ$$ at the trough for negative vorticity, while it rises to a maximum, greater than $$30^\circ$$ , and then falls sharply to $$0^\circ$$ at the trough for large positive vorticity. (iii) There is a transition region where the angle oscillates about $$30^\circ$$ , resembling the Gibbs phenomenon. Numerical evidence suggests that the amplitude and frequency of the oscillations become independent of the vorticity as the wave profile approaches the extreme form. 
    more » « less
  2. The brain architecture of shrimp living in deep-sea vents provides clues to how these organisms have adapted to extreme living. 
    more » « less
  3. We solve a long-standing challenge to the integrity of votes cast without the supervision of a voting booth: ``improper influence,'' which we define as any combination of vote buying and voter coercion. In comparison with previous proposals, our system is the first in the literature to protect against a strong adversary who learns all of the voter's keys---we call this property ``extreme coercion resistance.'' Our approach allows each voter, or their trusted agents (which we call ``hedgehogs''), to ``nullify'' (effectively cancel) their vote in a way that is unstoppable and irrevocable, and such that the nullification action is forever unattributable to that voter or their hedgehog(s). We demonstrate the security of VoteXX in the {universal composability} model. Additionally we provide concrete implementations of sub-protocols---including inalienable authentication, decentralized bulletin boards, and anonymous communication channels---that are usually left as abstract assumptions in the literature. As in many other coercion-resistant systems, voters are authorized to vote with public-private keys. Each voter registers their public keys with the Election Authority (EA) in a way that convinces the EA that the voter has complete knowledge of their private keys. Voters concerned about losing their private keys can themselves, or by delegating to one or more hedgehog(s), monitor the bulletin board for malicious ballots cast with their keys, and can act to nullify these ballots in a privacy-preserving manner with zero-knowledge proofs. In comparison with previous proposals, our system makes fewer assumptions and protects against a stronger adversary. For example, votexx makes none of the following assumptions made by previous systems: the voter must complete registration before being coerced; the election will not close before the voter can cast a ballot after coercion; the voter needs to generate a fake password to evade coercion; and the voter knows an honest Election Authority official. 
    more » « less