Abstract We develop a Fredholm theory for the Hodge Laplacian in weighted spaces on ALG ∗ manifolds in dimension four.We then give several applications of this theory.First, we show the existence of harmonic functions with prescribed asymptotics at infinity.A corollary of this is a non-existence result for ALG ∗ manifolds with non-negative Ricci curvature having group Γ = { e } \Gamma=\{e\} at infinity.Next, we prove a Hodge decomposition for the first de Rham cohomology group of an ALG ∗ manifold.A corollary of this is vanishing of the first Betti number for any ALG ∗ manifold with non-negative Ricci curvature.Another application of our analysis is to determine the optimal order of ALG ∗ gravitational instantons.
more »
« less
First-Principles Analysis of Ethylene Oligomerization on Single-Site Ga 3+ Catalysts Supported on Amorphous Silica
- Award ID(s):
- 1647722
- PAR ID:
- 10431116
- Date Published:
- Journal Name:
- ACS Catalysis
- Volume:
- 12
- Issue:
- 9
- ISSN:
- 2155-5435
- Page Range / eLocation ID:
- 5416 to 5424
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Vulnerability Management, which is a vital part of risk and resiliency management efforts, is a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on devices that are likely to be used by attackers to compromise a network component. For effective and efficient vulnerability management, which requires extensive resources– such as time and personnel, vulnerabilities should be prioritized based on their criticality. One of the most common methods to prioritize vulnerabilities is the Common Vulnerability Scoring System (CVSS). However, in its severity score, the National Institute of Standards and Technology (NIST) only provides the base metric values that include exploitability and impact information for the known vulnerabilities and acknowledges the importance of temporal and environmental characteristics to have a more accurate vulnerability assessment. There is no established method to conduct the integration of these metrics. In this study, we created a testbed to assess the vulnerabilities by considering the functional dependencies between vulnerable assets, other assets, and business processes. The experiment results revealed that a vulnerability's severity significantly changes from its CVSS base score when the vulnerable asset's characteristics and role inside the organization are considered.more » « less