8,706 research outputs found
Local implementation of nonlocal operations of block forms
We investigate the local implementation of nonlocal operations with the block
matrix form, and propose a protocol for any diagonal or offdiagonal block
operation. This method can be directly generalized to the two-party multiqubit
case and the multiparty case. Especially, in the multiparty cases, any diagonal
block operation can be locally implemented using the same resources as the
multiparty control-U operation discussed in Ref. [Eisert et al., Phys. Rev. A
62, 052317(2000)]. Although in the bipartite case, this kind of operations can
be transformed to control-U operation using local operations, these
transformations are impossible in the multiparty cases. We also compare the
local implementation of nonlocal block operations with the remote
implementation of local operations, and point out a relation between them.Comment: 7 pages, 3 figure
A 8-neighbor model lattice Boltzmann method applied to mathematical-physical equations
© 2016. This version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/A lattice Boltzmann method (LBM) 9-bit model is presented to solve mathematical-physical equations, such as, Laplace equation, Poisson equation, Wave equation and Burgers equation. The 9-bit model has been verified by several test cases. Numerical simulations, including 1D and 2D cases, of each problem are shown respectively. Comparisons are made between numerical predictions and analytic solutions or available numerical results from previous researchers. It turned out that the 9-bit model is computationally effective and accurate for all different mathematical-physical equations studied. The main benefits of the new model proposed is that it is faster than the previous existing models and has a better accuracy.Peer ReviewedPostprint (author's final draft
Numerical study of the 2D lid-driven triangular cavities based on the Lattice Boltzmann method
Numerical study of two dimensional lid driven triangular cavity flow is performed via using lattice Boltzmann method on low Reynolds numbers. The equilateral triangular cavity is the first geometry to be studied, the simulation is performed at Reynolds number 500 and the numerical prediction is compared with previous work done by other scholars. Several isosceles triangular cavities are studied at different initial conditions, Reynolds numbers ranging from 100 to 3000, regardless of the geometry studied, the top lid is always moving from left to right and the driven velocity remains constant. Results are also compared with previous work performed by other scholars, the agreement is very good. According to the authors’ knowledge, this is the first time that MRT-LBM model is used to simulate the flow inside the triangular cavities. One of the advantages of this method is that it is capable of producing at low and high Reynolds numbers.Peer ReviewedPostprint (published version
Chance Constrained Mixed Integer Program: Bilinear and Linear Formulations, and Benders Decomposition
In this paper, we study chance constrained mixed integer program with
consideration of recourse decisions and their incurred cost, developed on a
finite discrete scenario set. Through studying a non-traditional bilinear mixed
integer formulation, we derive its linear counterparts and show that they could
be stronger than existing linear formulations. We also develop a variant of
Jensen's inequality that extends the one for stochastic program. To solve this
challenging problem, we present a variant of Benders decomposition method in
bilinear form, which actually provides an easy-to-use algorithm framework for
further improvements, along with a few enhancement strategies based on
structural properties or Jensen's inequality. Computational study shows that
the presented Benders decomposition method, jointly with appropriate
enhancement techniques, outperforms a commercial solver by an order of
magnitude on solving chance constrained program or detecting its infeasibility
Collaboration based Multi-Label Learning
It is well-known that exploiting label correlations is crucially important to
multi-label learning. Most of the existing approaches take label correlations
as prior knowledge, which may not correctly characterize the real relationships
among labels. Besides, label correlations are normally used to regularize the
hypothesis space, while the final predictions are not explicitly correlated. In
this paper, we suggest that for each individual label, the final prediction
involves the collaboration between its own prediction and the predictions of
other labels. Based on this assumption, we first propose a novel method to
learn the label correlations via sparse reconstruction in the label space.
Then, by seamlessly integrating the learned label correlations into model
training, we propose a novel multi-label learning approach that aims to
explicitly account for the correlated predictions of labels while training the
desired model simultaneously. Extensive experimental results show that our
approach outperforms the state-of-the-art counterparts.Comment: Accepted by AAAI-1
Modeled Modernity: A Critical History of Computing in the People\u27s Republic of China, 1949-2000
The dissertation traces a longer and broader history of computing in the People\u27s Republic of China between the 1940s and the 1990s. The introduction addresses the core issues of writing a critical history of Chinese computing. The first chapter starts with the rise of cybernetics systems engineering in the PRC in the work of Qian Xuesen, which, due to Qian\u27s unusual career path, connected some of the common themes in other chapters. The second chapter presents a long history of early Chinese programming languages and software and analyzes a hidden software development and maintenance crisis that fundamentally shaped the development after the 1980s. Chapter three is a history of early Chinese AI and a historiographical intervention that connects the Mao (chapters one and two) and the Deng era (chapters four and five) by, ironically, identifying a rupture in research paradigms. Chapter four explores the emergence of a socio-technical imaginary of the computational future through the computer education campaign for children between the late 1970s and early 1990s. The last chapter examines the distinctive path Chinese quantitative economics took from the 1950s to the 1990s that represented both the common themes and the overall trajectory of quantification in the PRC. In conclusion, I show how the chapters come together in one of the earliest large-scale computerized policy-making projects in the 1980s, consolidating the rise of modeled modernity in post-socialist China
THE SHIFTING DYNAMICS BETWEEN WORK AND LIFE IN REMOTE WORKING
Purpose: Aiming to investigate how knowledge workers organise their work through boundary
practice in remote working, this study has partnered with one online consulting
company who provides professional accounting services to third party customers. This
study tries to explore 1) how accountants organize their work through managing and
shaping their physical and temporal boundaries to establish flexibility in remote
working; 2) how are technologies harnessed to manage work-life boundaries in the
context of remote working. By probing into these inquiries, this study enlightens the
complex interplay between evolving work practices, technological advancements, and
individual boundary practices.
Theory: Through the lens of work-family border theory, this study would shed light on the
shifting dynamics between work and life within the context of remote working.
Method: Using semi-structured interview and reflexive thematic analysis, this empirical study
would be able to discover individualized and contextualised strategies and tactics of
boundary practice in temporal and spatial dimensions within remote working context.
Results: Knowledge workers perceive themselves as the active agents in 1) constantly shaping
and managing their temporal and physical boundaries; 2) negotiating their boundaries
with other domain members; 3) using ICTs and MCTs to manage, shape and modify
their boundaries. Their boundary strategies entail a dynamic shift depending on
constant trade-offs of diverse personal and professional priorities. The shifting
dynamics between work and life is both the central character of work-life balance, as
well as the key resource of creating work-life balance within the context of remote
working. Furthermore, the re-construction of organization/company/supervisor’ role
in boundary negotiation may be crucial for matching expectations between different
stakeholders in remote working. The seamfullness design may better contribute to the
boundary practice in remote working
- …