4,730 research outputs found

    Visualizing the Structure of Large Trees

    Get PDF
    This study introduces a new method of visualizing complex tree structured objects. The usefulness of this method is illustrated in the context of detecting unexpected features in a data set of very large trees. The major contribution is a novel two-dimensional graphical representation of each tree, with a covariate coded by color. The motivating data set contains three dimensional representations of brain artery systems of 105 subjects. Due to inaccuracies inherent in the medical imaging techniques, issues with the reconstruction algo- rithms and inconsistencies introduced by manual adjustment, various discrepancies are present in the data. The proposed representation enables quick visual detection of the most common discrepancies. For our driving example, this tool led to the modification of 10% of the artery trees and deletion of 6.7%. The benefits of our cleaning method are demonstrated through a statistical hypothesis test on the effects of aging on vessel structure. The data cleaning resulted in improved significance levels.Comment: 17 pages, 8 figure

    Isotropic three-dimensional left-handed meta-materials

    Full text link
    We investigate three-dimensional left-handed and related meta-materials based on a fully symmetric multi-gap single-ring SRR design and crossing continuous wires. We demonstrate isotropic transmission properties of a SRR-only meta-material and the corresponding left-handed material which possesses a negative effective index of refraction due to simultaneously negative effective permeability and permittivity. Minor deviations from complete isotropy are due to the finite thickness of the meta-material.Comment: 4 pages, 6 figure

    Simulation of associative learning with the replaced elements model

    No full text
    Associative learning theories can be categorised according to whether they treat the representation of stimulus compounds in an elemental or configural manner. Since it is clear that a simple elemental approach to stimulus representation is inadequate there have been several attempts to produce more elaborate elemental models. One recent approach, the Replaced Elements Model (Wagner, 2003), reproduces many results that have until recently been uniquely predicted by Pearce’s Configural Theory (Pearce, 1994). Although it is possible to simulate the Replaced Elements Model using “standard” simulation programs the generation of the correct stimulus representation is complex. The current paper describes a method for simulation of the Replaced Elements Model and presents the results of two example simulations that show differential predictions of Replaced Elements and Pearce’s Configural Theor

    Microscopic resolution broadband dielectric spectroscopy

    Get PDF
    Results are presented for a non-contact measurement system capable of micron level spatial resolution. It utilises the novel electric potential sensor (EPS) technology, invented at Sussex, to image the electric field above a simple composite dielectric material. EP sensors may be regarded as analogous to a magnetometer and require no adjustments or offsets during either setup or use. The sample consists of a standard glass/epoxy FR4 circuit board, with linear defects machined into the surface by a PCB milling machine. The sample is excited with an a.c. signal over a range of frequencies from 10 kHz to 10 MHz, from the reverse side, by placing it on a conducting sheet connected to the source. The single sensor is raster scanned over the surface at a constant working distance, consistent with the spatial resolution, in order to build up an image of the electric field, with respect to the reference potential. The results demonstrate that both the surface defects and the internal dielectric variations within the composite may be imaged in this way, with good contrast being observed between the glass mat and the epoxy resin

    An Introduction and Characterisation of Non-identical Digital Twins in Manufacturing Systems

    Get PDF
    The digital twin (DT) has become a key component for the digitalisation, monitoring, and improvement of manufacturing systems. This has led to the development of various DTs for distinct workpieces, processes, and tools. While beneficial, these individual components need to be configured to form a system of DTs that represents the overall manufacturing system, a task that is nontrivial but necessary to realise a truly smart manufacturing system. This paper proposes an identification scheme to distinguish each unique DT within a system of DTs (Digital Twin System) from three aspects: the physical entity, the digital representation and connections. Based on it, non-identical DTs are proposed as different digital representations of the same element or elements in a manufacturing system. They are sorted into three classes, including homologous DTs, heterologous DTs, and exclusive DTs, based on their context and behaviour. Definitions and characterisations of three types of non-identical DTs are then discussed. Lastly, a case study of in-situ failure detection for material extrusion(MEX) additive manufacturing is demonstrated to explore affordances, challenges, and potential applications of non-identical DTs

    Recurring Contingent Service Payment

    Full text link
    Fair exchange protocols let two mutually distrustful parties exchange digital data in a way that neither party can cheat. They have various applications such as the exchange of digital items, or the exchange of digital coins and digital services between a buyer/client and seller/server. In this work, we formally define and propose a generic blockchain-based construction called "Recurring Contingent Service Payment" (RC-S-P). It (i) lets a fair exchange of digital coins and verifiable service reoccur securely between clients and a server while ensuring that the server is paid if and only if it delivers a valid service, and (ii) ensures the parties' privacy is preserved. RC-S-P supports arbitrary verifiable services, such as "Proofs of Retrievability" (PoR) or verifiable computation and imposes low on-chain overheads. Our formal treatment and construction, for the first time, consider the setting where either client or server is malicious. We also present a concrete efficient instantiation of RC- S-P when the verifiable service is PoR. We implemented the concrete instantiation and analysed its cost. When it deals with a 4-GB outsourced file, a verifier can check a proof in only 90 milliseconds, and a dispute between a prover and verifier is resolved in 0.1 milliseconds. At CCS 2017, two blockchain-based protocols were proposed to support the fair exchange of digital coins and a certain verifiable service; namely, PoR. In this work, we show that these protocols (i) are susceptible to a free-riding attack which enables a client to receive the service without paying the server, and (ii) are not suitable for cases where parties' privacy matters, e.g., when the server's proof status or buyer's file size must remain private from the public. RC- S-P simultaneously mitigates the above attack and preserves the parties' privacy

    Delegated Time-Lock Puzzle

    Full text link
    Time-Lock Puzzles (TLPs) are cryptographic protocols that enable a client to lock a message in such a way that a server can only unlock it after a specific time period. However, existing TLPs have certain limitations: (i) they assume that both the client and server always possess sufficient computational resources and (ii) they solely focus on the lower time bound for finding a solution, disregarding the upper bound that guarantees a regular server can find a solution within a certain time frame. Additionally, existing TLPs designed to handle multiple puzzles either (a) entail high verification costs or (b) lack generality, requiring identical time intervals between consecutive solutions. To address these limitations, this paper introduces, for the first time, the concept of a "Delegated Time-Lock Puzzle" and presents a protocol called "Efficient Delegated Time-Lock Puzzle" (ED-TLP) that realises this concept. ED-TLP allows the client and server to delegate their resource-demanding tasks to third-party helpers. It facilitates real-time verification of solution correctness and efficiently handles multiple puzzles with varying time intervals. ED-TLP ensures the delivery of solutions within predefined time limits by incorporating both an upper bound and a fair payment algorithm. We have implemented ED-TLP and conducted a comprehensive analysis of its overheads, demonstrating the efficiency of the construction

    Pion wave functions from holographic QCD and the role of infrared renormalons in photon-photon collisions

    Full text link
    In this article, we calculate the contribution of the higher-twist Feynman diagrams to the large-pTp_T inclusive single pion production cross section in photon-photon collisions in case of the running coupling and frozen coupling approaches within holographic QCD. We compare the resummed higher-twist cross sections with the ones obtained in the framework of the frozen coupling approach and leading-twist cross section. Also, we show that in the context of frozen coupling approach a higher-twist contribution to the photon-photon collisions cross section is normalized in terms of the pion electromagnetic form factor.Comment: 21 pages, 15 figures. arXiv admin note: text overlap with arXiv:0709.2072 by other author

    Calculation of coupling constant g_phi-pi-gamma in QCD sum rules

    Full text link
    The coupling constant of g_phi-pi-gamma decay is calculated in the method of QCD sum rules. A comparison of our prediction on the coupling constant with the result obtained from analysis of the experimental data is performed.Comment: 6 pages, 3 figure
    • …
    corecore