10,162 research outputs found
Development and Verification of a Flight Stack for a High-Altitude Glider in Ada/SPARK 2014
SPARK 2014 is a modern programming language and a new state-of-the-art tool
set for development and verification of high-integrity software. In this paper,
we explore the capabilities and limitations of its latest version in the
context of building a flight stack for a high-altitude unmanned glider. Towards
that, we deliberately applied static analysis early and continuously during
implementation, to give verification the possibility to steer the software
design. In this process we have identified several limitations and pitfalls of
software design and verification in SPARK, for which we give workarounds and
protective actions to avoid them. Finally, we give design recommendations that
have proven effective for verification, and summarize our experiences with this
new language
Ultrasoft NLL Running of the Nonrelativistic O(v) QCD Quark Potential
Using the nonrelativistic effective field theory vNRQCD, we determine the
contribution to the next-to-leading logarithmic (NLL) running of the effective
quark-antiquark potential at order v (1/mk) from diagrams with one potential
and two ultrasoft loops, v being the velocity of the quarks in the c.m. frame.
The results are numerically important and complete the description of ultrasoft
next-to-next-to-leading logarithmic (NNLL) order effects in heavy quark pair
production and annihilation close to threshold.Comment: 25 pages, 7 figures, 3 tables; minor modifications, typos corrected,
references added, footnote adde
Relativistic Coulomb Resummation in QCD
A relativistic Coulomb-like resummation factor in QCD is suggested, based on
the solution of the quasipotential equation.Comment: 4 pages, 2 eps figures, REVTe
Efficient tensor completion for color image and video recovery: Low-rank tensor train
This paper proposes a novel approach to tensor completion, which recovers
missing entries of data represented by tensors. The approach is based on the
tensor train (TT) rank, which is able to capture hidden information from
tensors thanks to its definition from a well-balanced matricization scheme.
Accordingly, new optimization formulations for tensor completion are proposed
as well as two new algorithms for their solution. The first one called simple
low-rank tensor completion via tensor train (SiLRTC-TT) is intimately related
to minimizing a nuclear norm based on TT rank. The second one is from a
multilinear matrix factorization model to approximate the TT rank of a tensor,
and is called tensor completion by parallel matrix factorization via tensor
train (TMac-TT). A tensor augmentation scheme of transforming a low-order
tensor to higher-orders is also proposed to enhance the effectiveness of
SiLRTC-TT and TMac-TT. Simulation results for color image and video recovery
show the clear advantage of our method over all other methods.Comment: Submitted to the IEEE Transactions on Image Processing. arXiv admin
note: substantial text overlap with arXiv:1601.0108
Concatenated image completion via tensor augmentation and completion
This paper proposes a novel framework called concatenated image completion
via tensor augmentation and completion (ICTAC), which recovers missing entries
of color images with high accuracy. Typical images are second- or third-order
tensors (2D/3D) depending if they are grayscale or color, hence tensor
completion algorithms are ideal for their recovery. The proposed framework
performs image completion by concatenating copies of a single image that has
missing entries into a third-order tensor, applying a dimensionality
augmentation technique to the tensor, utilizing a tensor completion algorithm
for recovering its missing entries, and finally extracting the recovered image
from the tensor. The solution relies on two key components that have been
recently proposed to take advantage of the tensor train (TT) rank: A tensor
augmentation tool called ket augmentation (KA) that represents a low-order
tensor by a higher-order tensor, and the algorithm tensor completion by
parallel matrix factorization via tensor train (TMac-TT), which has been
demonstrated to outperform state-of-the-art tensor completion algorithms.
Simulation results for color image recovery show the clear advantage of our
framework against current state-of-the-art tensor completion algorithms.Comment: 7 pages, 6 figures, submitted to ICSPCS 201
Top quark precision physics at the International Linear Collider
Top quark production in the process at a future
linear electron positron collider with polarized beams is a powerful tool to
determine the scale of new physics. Studies at the \ttbar threshold will
allow for precise determination of the top quark mass in a well defined
theoretical framework. At higher energies vector, axial vector and tensorial CP
conserving couplings can be separately determined for the photon and the
component in the electro-weak production process. The sensitivity to new
physics would be dramatically improved w.r.t. to what expected from LHC for
electroweak couplings.Comment: White paper for Snowmass CSS 201
MAGIC sensitivity to millisecond-duration optical pulses
The MAGIC telescopes are a system of two Imaging Atmospheric Cherenkov
Telescopes (IACTs) designed to observe very high energy (VHE) gamma rays above
~50 GeV. However, as IACTs are sensitive to Cherenkov light in the UV/blue and
use photo-detectors with a time response well below the ms scale, MAGIC is also
able to perform simultaneous optical observations. Through an alternative
system installed in the central PMT of MAGIC II camera, the so-called central
pixel, MAGIC is sensitive to short (1ms - 1s) optical pulses. Periodic signals
from the Crab pulsar are regularly monitored. Here we report for the first time
the experimental determination of the sensitivity of the central pixel to
isolated 1-10 ms long optical pulses. The result of this study is relevant for
searches of fast transients such as Fast Radio Bursts (FRBs).Comment: Proceedings of the 35th International Cosmic Ray Conference (ICRC
2017), Bexco, Busan, Korea (arXiv:1708.05153
Challenge-response trust assessment model for personal space IoT
© 2016 IEEE. Internet of Things (IoT) embraces the interconnection of identifiable devices that are capable of providing services through their cooperation. The cooperation among devices in such an IoT environment often requires reliable and trusted participating members in order to provide useful services to the end user. Consequently, an IoT environment or space needs to evaluate the trust levels of all devices in contact before admitting them as members of the space. Existing trust evaluation models are based on resources such as historical observations or recommendations information to evaluate the trust level of a device. However, these methods fail if there is no existing trust resource. This paper introduces a specific IoT environment called personal space IoT and proposes a novel trust evaluation model that performs a challenge-response trust assessment to evaluate the trust level of a device before allowing it to participate in the space. This novel challenge-response trust assessment model does not require the historical observation or previous encounter with the device or any existing trusted recommendation. The proposed challenge-response trust assessment model provides a reliable trust resource that can be used along with other resources such as direct trust, recommendation trust to get a comprehensive trust opinion on a specific device. It can also be considered as a new method for evaluating the trust value on a device
- …
