34,976 research outputs found
Nitsche-XFEM for optimal control problems governed by elliptic PDEs with interfaces
For the optimal control problem governed by elliptic equations with
interfaces, we present a numerical method based on the Hansbo's Nitsche-XFEM.
We followed the Hinze's variational discretization concept to discretize the
continuous problem on a uniform mesh. We derive optimal error estimates of the
state, co-state and control both in mesh dependent norm and L2 norm. In
addition, our method is suitable for the model with non-homogeneous interface
condition. Numerical results confirmed our theoretical results, with the
implementation details discussed
A Nitsche-eXtended finite element method for distributed optimal control problems of elliptic interface equations
This paper analyzes an interface-unfitted numerical method for distributed
optimal control problems governed by elliptic interface equations. We follow
the variational discretization concept to discretize the optimal control
problems, and apply a Nitsche-eXtended finite element method to discretize the
corresponding state and adjoint equations, where piecewise cut basis functions
around the interface are enriched into the standard linear element space.
Optimal error estimates of the state, co-state and control in a mesh-dependent
norm and the norm are derived. Numerical results are provided to verify
the theoretical results
Cryptanalyzing image encryption using chaotic logistic map
Chaotic behavior arises from very simple non-linear dynamical equation of
logistic map which makes it was used often in designing chaotic image
encryption schemes. However, some properties of chaotic maps can also
facilitate cryptanalysis especially when they are implemented in digital
domain. Utilizing stable distribution of the chaotic states generated by
iterating the logistic map, this paper presents a typical example to show
insecurity of an image encryption scheme using chaotic logistic map. This work
will push encryption and chaos be combined in a more effective way.Comment: 6 page
A study of elliptic flows in a quark combination model
We carry out a detail study of elliptic flows in Au-Au collisions at 200 AGeV
in a quark combination model. We find that elliptic flow data for a variety of
hadrons can be well reproduced except pions if constituent quarks with equal
parallel transverse momenta combine into initially produced hadrons. In a
combination mechanism where initial hadrons are formed by quarks with unequal
parallel transverse momenta, theoretical predictions agree with data for all
available hadrons including pions. The mass hierarchy at low transverse momenta
in elliptic flows can be understood in the same quark combination mechanism as
in the mediate range of transverse momenta.Comment: In RevTex 4, 8 pages, 5 figures, references adde
CoMID: Context-based Multi-Invariant Detection for Monitoring Cyber-Physical Software
Cyber-physical software continually interacts with its physical environment
for adaptation in order to deliver smart services. However, the interactions
can be subject to various errors when the software's assumption on its
environment no longer holds, thus leading to unexpected misbehavior or even
failure. To address this problem, one promising way is to conduct runtime
monitoring of invariants, so as to prevent cyber-physical software from
entering such errors (a.k.a. abnormal states). To effectively detect abnormal
states, we in this article present an approach, named Context-based
Multi-Invariant Detection (CoMID), which consists of two techniques:
context-based trace grouping and multi-invariant detection. The former infers
contexts to distinguish different effective scopes for CoMID's derived
invariants, and the latter conducts ensemble evaluation of multiple invariants
to detect abnormal states. We experimentally evaluate CoMID on real-world
cyber-physical software. The results show that CoMID achieves a 5.7-28.2%
higher true-positive rate and a 6.8-37.6% lower false-positive rate in
detecting abnormal states, as compared with state-of-the-art approaches (i.e.,
Daikon and ZoomIn). When deployed in field tests, CoMID's runtime monitoring
improves the success rate of cyber-physical software in its task executions by
15.3-31.7%
Tensor network algorithm by coarse-graining tensor renormalization on finite periodic lattices
We develop coarse-graining tensor renormalization group algorithms to compute
physical properties of two-dimensional lattice models on finite periodic
lattices. Two different coarse-graining strategies, one based on the tensor
renormalization group and the other based on the higher-order tensor
renormalization group, are introduced. In order to optimize the tensor-network
model globally, a sweeping scheme is proposed to account for the
renormalization effect from the environment tensors under the framework of
second renormalization group. We demonstrate the algorithms by the classical
Ising model on the square lattice and the Kitaev model on the honeycomb
lattice, and show that the finite-size algorithms achieve substantially more
accurate results than the corresponding infinite-size ones.Comment: 14 pages, 14 figure
A Preliminary Field Study of Game Programming on Mobile Devices
TouchDevelop is a new programming environment that allows users to create
applications on mobile devices. Applications created with TouchDevelop have
continued to grow in popularity since TouchDevelop was first released to public
in 2011. This paper presents a field study of 31,699 applications, focusing on
different characteristics between 539 game scripts and all other non-game
applications, as well as what make some game applications more popular than
others to users. The study provides a list of findings on characteristics of
game scripts and also implications for improving end-user programming of game
applications.Comment: arXiv:1309.550
Small-scale Pedestrian Detection Based on Somatic Topology Localization and Temporal Feature Aggregation
A critical issue in pedestrian detection is to detect small-scale objects
that will introduce feeble contrast and motion blur in images and videos, which
in our opinion should partially resort to deep-rooted annotation bias.
Motivated by this, we propose a novel method integrated with somatic
topological line localization (TLL) and temporal feature aggregation for
detecting multi-scale pedestrians, which works particularly well with
small-scale pedestrians that are relatively far from the camera. Moreover, a
post-processing scheme based on Markov Random Field (MRF) is introduced to
eliminate ambiguities in occlusion cases. Applying with these methodologies
comprehensively, we achieve best detection performance on Caltech benchmark and
improve performance of small-scale objects significantly (miss rate decreases
from 74.53% to 60.79%). Beyond this, we also achieve competitive performance on
CityPersons dataset and show the existence of annotation bias in KITTI dataset.Comment: Accepted by ECCV1
Correlated Logistic Model With Elastic Net Regularization for Multilabel Image Classification
In this paper, we present correlated logistic (CorrLog) model for multilabel
image classification. CorrLog extends conventional logistic regression model
into multilabel cases, via explicitly modeling the pairwise correlation between
labels. In addition, we propose to learn the model parameters of CorrLog with
elastic net regularization, which helps exploit the sparsity in feature
selection and label correlations and thus further boost the performance of
multilabel classification. CorrLog can be efficiently learned, though
approximately, by regularized maximum pseudo likelihood estimation, and it
enjoys a satisfying generalization bound that is independent of the number of
labels. CorrLog performs competitively for multilabel image classification on
benchmark data sets MULAN scene, MIT outdoor scene, PASCAL VOC 2007, and PASCAL
VOC 2012, compared with the state-of-the-art multilabel classification
algorithms
Exploring Auxiliary Context: Discrete Semantic Transfer Hashing for Scalable Image Retrieval
Unsupervised hashing can desirably support scalable content-based image
retrieval (SCBIR) for its appealing advantages of semantic label independence,
memory and search efficiency. However, the learned hash codes are embedded with
limited discriminative semantics due to the intrinsic limitation of image
representation. To address the problem, in this paper, we propose a novel
hashing approach, dubbed as \emph{Discrete Semantic Transfer Hashing} (DSTH).
The key idea is to \emph{directly} augment the semantics of discrete image hash
codes by exploring auxiliary contextual modalities. To this end, a unified
hashing framework is formulated to simultaneously preserve visual similarities
of images and perform semantic transfer from contextual modalities. Further, to
guarantee direct semantic transfer and avoid information loss, we explicitly
impose the discrete constraint, bit--uncorrelation constraint and bit-balance
constraint on hash codes. A novel and effective discrete optimization method
based on augmented Lagrangian multiplier is developed to iteratively solve the
optimization problem. The whole learning process has linear computation
complexity and desirable scalability. Experiments on three benchmark datasets
demonstrate the superiority of DSTH compared with several state-of-the-art
approaches
- …
