34,976 research outputs found

    Nitsche-XFEM for optimal control problems governed by elliptic PDEs with interfaces

    Full text link
    For the optimal control problem governed by elliptic equations with interfaces, we present a numerical method based on the Hansbo's Nitsche-XFEM. We followed the Hinze's variational discretization concept to discretize the continuous problem on a uniform mesh. We derive optimal error estimates of the state, co-state and control both in mesh dependent norm and L2 norm. In addition, our method is suitable for the model with non-homogeneous interface condition. Numerical results confirmed our theoretical results, with the implementation details discussed

    A Nitsche-eXtended finite element method for distributed optimal control problems of elliptic interface equations

    Full text link
    This paper analyzes an interface-unfitted numerical method for distributed optimal control problems governed by elliptic interface equations. We follow the variational discretization concept to discretize the optimal control problems, and apply a Nitsche-eXtended finite element method to discretize the corresponding state and adjoint equations, where piecewise cut basis functions around the interface are enriched into the standard linear element space. Optimal error estimates of the state, co-state and control in a mesh-dependent norm and the L2L^2 norm are derived. Numerical results are provided to verify the theoretical results

    Cryptanalyzing image encryption using chaotic logistic map

    Full text link
    Chaotic behavior arises from very simple non-linear dynamical equation of logistic map which makes it was used often in designing chaotic image encryption schemes. However, some properties of chaotic maps can also facilitate cryptanalysis especially when they are implemented in digital domain. Utilizing stable distribution of the chaotic states generated by iterating the logistic map, this paper presents a typical example to show insecurity of an image encryption scheme using chaotic logistic map. This work will push encryption and chaos be combined in a more effective way.Comment: 6 page

    A study of elliptic flows in a quark combination model

    Full text link
    We carry out a detail study of elliptic flows in Au-Au collisions at 200 AGeV in a quark combination model. We find that elliptic flow data for a variety of hadrons can be well reproduced except pions if constituent quarks with equal parallel transverse momenta combine into initially produced hadrons. In a combination mechanism where initial hadrons are formed by quarks with unequal parallel transverse momenta, theoretical predictions agree with data for all available hadrons including pions. The mass hierarchy at low transverse momenta in elliptic flows can be understood in the same quark combination mechanism as in the mediate range of transverse momenta.Comment: In RevTex 4, 8 pages, 5 figures, references adde

    CoMID: Context-based Multi-Invariant Detection for Monitoring Cyber-Physical Software

    Full text link
    Cyber-physical software continually interacts with its physical environment for adaptation in order to deliver smart services. However, the interactions can be subject to various errors when the software's assumption on its environment no longer holds, thus leading to unexpected misbehavior or even failure. To address this problem, one promising way is to conduct runtime monitoring of invariants, so as to prevent cyber-physical software from entering such errors (a.k.a. abnormal states). To effectively detect abnormal states, we in this article present an approach, named Context-based Multi-Invariant Detection (CoMID), which consists of two techniques: context-based trace grouping and multi-invariant detection. The former infers contexts to distinguish different effective scopes for CoMID's derived invariants, and the latter conducts ensemble evaluation of multiple invariants to detect abnormal states. We experimentally evaluate CoMID on real-world cyber-physical software. The results show that CoMID achieves a 5.7-28.2% higher true-positive rate and a 6.8-37.6% lower false-positive rate in detecting abnormal states, as compared with state-of-the-art approaches (i.e., Daikon and ZoomIn). When deployed in field tests, CoMID's runtime monitoring improves the success rate of cyber-physical software in its task executions by 15.3-31.7%

    Tensor network algorithm by coarse-graining tensor renormalization on finite periodic lattices

    Full text link
    We develop coarse-graining tensor renormalization group algorithms to compute physical properties of two-dimensional lattice models on finite periodic lattices. Two different coarse-graining strategies, one based on the tensor renormalization group and the other based on the higher-order tensor renormalization group, are introduced. In order to optimize the tensor-network model globally, a sweeping scheme is proposed to account for the renormalization effect from the environment tensors under the framework of second renormalization group. We demonstrate the algorithms by the classical Ising model on the square lattice and the Kitaev model on the honeycomb lattice, and show that the finite-size algorithms achieve substantially more accurate results than the corresponding infinite-size ones.Comment: 14 pages, 14 figure

    A Preliminary Field Study of Game Programming on Mobile Devices

    Full text link
    TouchDevelop is a new programming environment that allows users to create applications on mobile devices. Applications created with TouchDevelop have continued to grow in popularity since TouchDevelop was first released to public in 2011. This paper presents a field study of 31,699 applications, focusing on different characteristics between 539 game scripts and all other non-game applications, as well as what make some game applications more popular than others to users. The study provides a list of findings on characteristics of game scripts and also implications for improving end-user programming of game applications.Comment: arXiv:1309.550

    Small-scale Pedestrian Detection Based on Somatic Topology Localization and Temporal Feature Aggregation

    Full text link
    A critical issue in pedestrian detection is to detect small-scale objects that will introduce feeble contrast and motion blur in images and videos, which in our opinion should partially resort to deep-rooted annotation bias. Motivated by this, we propose a novel method integrated with somatic topological line localization (TLL) and temporal feature aggregation for detecting multi-scale pedestrians, which works particularly well with small-scale pedestrians that are relatively far from the camera. Moreover, a post-processing scheme based on Markov Random Field (MRF) is introduced to eliminate ambiguities in occlusion cases. Applying with these methodologies comprehensively, we achieve best detection performance on Caltech benchmark and improve performance of small-scale objects significantly (miss rate decreases from 74.53% to 60.79%). Beyond this, we also achieve competitive performance on CityPersons dataset and show the existence of annotation bias in KITTI dataset.Comment: Accepted by ECCV1

    Correlated Logistic Model With Elastic Net Regularization for Multilabel Image Classification

    Full text link
    In this paper, we present correlated logistic (CorrLog) model for multilabel image classification. CorrLog extends conventional logistic regression model into multilabel cases, via explicitly modeling the pairwise correlation between labels. In addition, we propose to learn the model parameters of CorrLog with elastic net regularization, which helps exploit the sparsity in feature selection and label correlations and thus further boost the performance of multilabel classification. CorrLog can be efficiently learned, though approximately, by regularized maximum pseudo likelihood estimation, and it enjoys a satisfying generalization bound that is independent of the number of labels. CorrLog performs competitively for multilabel image classification on benchmark data sets MULAN scene, MIT outdoor scene, PASCAL VOC 2007, and PASCAL VOC 2012, compared with the state-of-the-art multilabel classification algorithms

    Exploring Auxiliary Context: Discrete Semantic Transfer Hashing for Scalable Image Retrieval

    Full text link
    Unsupervised hashing can desirably support scalable content-based image retrieval (SCBIR) for its appealing advantages of semantic label independence, memory and search efficiency. However, the learned hash codes are embedded with limited discriminative semantics due to the intrinsic limitation of image representation. To address the problem, in this paper, we propose a novel hashing approach, dubbed as \emph{Discrete Semantic Transfer Hashing} (DSTH). The key idea is to \emph{directly} augment the semantics of discrete image hash codes by exploring auxiliary contextual modalities. To this end, a unified hashing framework is formulated to simultaneously preserve visual similarities of images and perform semantic transfer from contextual modalities. Further, to guarantee direct semantic transfer and avoid information loss, we explicitly impose the discrete constraint, bit--uncorrelation constraint and bit-balance constraint on hash codes. A novel and effective discrete optimization method based on augmented Lagrangian multiplier is developed to iteratively solve the optimization problem. The whole learning process has linear computation complexity and desirable scalability. Experiments on three benchmark datasets demonstrate the superiority of DSTH compared with several state-of-the-art approaches
    corecore