10,162 research outputs found

    Development and Verification of a Flight Stack for a High-Altitude Glider in Ada/SPARK 2014

    Full text link
    SPARK 2014 is a modern programming language and a new state-of-the-art tool set for development and verification of high-integrity software. In this paper, we explore the capabilities and limitations of its latest version in the context of building a flight stack for a high-altitude unmanned glider. Towards that, we deliberately applied static analysis early and continuously during implementation, to give verification the possibility to steer the software design. In this process we have identified several limitations and pitfalls of software design and verification in SPARK, for which we give workarounds and protective actions to avoid them. Finally, we give design recommendations that have proven effective for verification, and summarize our experiences with this new language

    Ultrasoft NLL Running of the Nonrelativistic O(v) QCD Quark Potential

    Full text link
    Using the nonrelativistic effective field theory vNRQCD, we determine the contribution to the next-to-leading logarithmic (NLL) running of the effective quark-antiquark potential at order v (1/mk) from diagrams with one potential and two ultrasoft loops, v being the velocity of the quarks in the c.m. frame. The results are numerically important and complete the description of ultrasoft next-to-next-to-leading logarithmic (NNLL) order effects in heavy quark pair production and annihilation close to threshold.Comment: 25 pages, 7 figures, 3 tables; minor modifications, typos corrected, references added, footnote adde

    Relativistic Coulomb Resummation in QCD

    Get PDF
    A relativistic Coulomb-like resummation factor in QCD is suggested, based on the solution of the quasipotential equation.Comment: 4 pages, 2 eps figures, REVTe

    Efficient tensor completion for color image and video recovery: Low-rank tensor train

    Full text link
    This paper proposes a novel approach to tensor completion, which recovers missing entries of data represented by tensors. The approach is based on the tensor train (TT) rank, which is able to capture hidden information from tensors thanks to its definition from a well-balanced matricization scheme. Accordingly, new optimization formulations for tensor completion are proposed as well as two new algorithms for their solution. The first one called simple low-rank tensor completion via tensor train (SiLRTC-TT) is intimately related to minimizing a nuclear norm based on TT rank. The second one is from a multilinear matrix factorization model to approximate the TT rank of a tensor, and is called tensor completion by parallel matrix factorization via tensor train (TMac-TT). A tensor augmentation scheme of transforming a low-order tensor to higher-orders is also proposed to enhance the effectiveness of SiLRTC-TT and TMac-TT. Simulation results for color image and video recovery show the clear advantage of our method over all other methods.Comment: Submitted to the IEEE Transactions on Image Processing. arXiv admin note: substantial text overlap with arXiv:1601.0108

    Concatenated image completion via tensor augmentation and completion

    Full text link
    This paper proposes a novel framework called concatenated image completion via tensor augmentation and completion (ICTAC), which recovers missing entries of color images with high accuracy. Typical images are second- or third-order tensors (2D/3D) depending if they are grayscale or color, hence tensor completion algorithms are ideal for their recovery. The proposed framework performs image completion by concatenating copies of a single image that has missing entries into a third-order tensor, applying a dimensionality augmentation technique to the tensor, utilizing a tensor completion algorithm for recovering its missing entries, and finally extracting the recovered image from the tensor. The solution relies on two key components that have been recently proposed to take advantage of the tensor train (TT) rank: A tensor augmentation tool called ket augmentation (KA) that represents a low-order tensor by a higher-order tensor, and the algorithm tensor completion by parallel matrix factorization via tensor train (TMac-TT), which has been demonstrated to outperform state-of-the-art tensor completion algorithms. Simulation results for color image recovery show the clear advantage of our framework against current state-of-the-art tensor completion algorithms.Comment: 7 pages, 6 figures, submitted to ICSPCS 201

    Top quark precision physics at the International Linear Collider

    Full text link
    Top quark production in the process e+ettˉe^+e^- \rightarrow t\bar{t} at a future linear electron positron collider with polarized beams is a powerful tool to determine the scale of new physics. Studies at the \ttbar threshold will allow for precise determination of the top quark mass in a well defined theoretical framework. At higher energies vector, axial vector and tensorial CP conserving couplings can be separately determined for the photon and the Z0Z^0 component in the electro-weak production process. The sensitivity to new physics would be dramatically improved w.r.t. to what expected from LHC for electroweak couplings.Comment: White paper for Snowmass CSS 201

    MAGIC sensitivity to millisecond-duration optical pulses

    Full text link
    The MAGIC telescopes are a system of two Imaging Atmospheric Cherenkov Telescopes (IACTs) designed to observe very high energy (VHE) gamma rays above ~50 GeV. However, as IACTs are sensitive to Cherenkov light in the UV/blue and use photo-detectors with a time response well below the ms scale, MAGIC is also able to perform simultaneous optical observations. Through an alternative system installed in the central PMT of MAGIC II camera, the so-called central pixel, MAGIC is sensitive to short (1ms - 1s) optical pulses. Periodic signals from the Crab pulsar are regularly monitored. Here we report for the first time the experimental determination of the sensitivity of the central pixel to isolated 1-10 ms long optical pulses. The result of this study is relevant for searches of fast transients such as Fast Radio Bursts (FRBs).Comment: Proceedings of the 35th International Cosmic Ray Conference (ICRC 2017), Bexco, Busan, Korea (arXiv:1708.05153

    Challenge-response trust assessment model for personal space IoT

    Full text link
    © 2016 IEEE. Internet of Things (IoT) embraces the interconnection of identifiable devices that are capable of providing services through their cooperation. The cooperation among devices in such an IoT environment often requires reliable and trusted participating members in order to provide useful services to the end user. Consequently, an IoT environment or space needs to evaluate the trust levels of all devices in contact before admitting them as members of the space. Existing trust evaluation models are based on resources such as historical observations or recommendations information to evaluate the trust level of a device. However, these methods fail if there is no existing trust resource. This paper introduces a specific IoT environment called personal space IoT and proposes a novel trust evaluation model that performs a challenge-response trust assessment to evaluate the trust level of a device before allowing it to participate in the space. This novel challenge-response trust assessment model does not require the historical observation or previous encounter with the device or any existing trusted recommendation. The proposed challenge-response trust assessment model provides a reliable trust resource that can be used along with other resources such as direct trust, recommendation trust to get a comprehensive trust opinion on a specific device. It can also be considered as a new method for evaluating the trust value on a device
    corecore