1,155,828 research outputs found

    Transfer Matrices for the Partition Function of the Potts Model on Toroidal Lattice Strips

    Full text link
    We present a method for calculating transfer matrices for the qq-state Potts model partition functions Z(G,q,v)Z(G,q,v), for arbitrary qq and temperature variable vv, on strip graphs GG of the square (sq), triangular (tri), and honeycomb (hc) lattices of width LyL_y vertices and of arbitrarily great length LxL_x vertices, subject to toroidal and Klein bottle boundary conditions. For the toroidal case we express the partition function as Z(Λ,Ly×Lx,q,v)=d=0Lyjbj(d)(λZ,Λ,Ly,d,j)mZ(\Lambda, L_y \times L_x,q,v) = \sum_{d=0}^{L_y} \sum_j b_j^{(d)} (\lambda_{Z,\Lambda,L_y,d,j})^m, where Λ\Lambda denotes lattice type, bj(d)b_j^{(d)} are specified polynomials of degree dd in qq, λZ,Λ,Ly,d,j\lambda_{Z,\Lambda,L_y,d,j} are eigenvalues of the transfer matrix TZ,Λ,Ly,dT_{Z,\Lambda,L_y,d} in the degree-dd subspace, and m=Lxm=L_x (Lx/2L_x/2) for Λ=sq,tri(hc)\Lambda=sq, tri (hc), respectively. An analogous formula is given for Klein bottle strips. We exhibit a method for calculating TZ,Λ,Ly,dT_{Z,\Lambda,L_y,d} for arbitrary LyL_y. In particular, we find some very simple formulas for the determinant det(TZ,Λ,Ly,d)det(T_{Z,\Lambda,L_y,d}), and trace Tr(TZ,Λ,Ly)Tr(T_{Z,\Lambda,L_y}). Corresponding results are given for the equivalent Tutte polynomials for these lattice strips and illustrative examples are included.Comment: 52 pages, latex, 10 figure

    Community detection for networks with unipartite and bipartite structure

    Full text link
    Finding community structures in networks is important in network science, technology, and applications. To date, most algorithms that aim to find community structures only focus either on unipartite or bipartite networks. A unipartite network consists of one set of nodes and a bipartite network consists of two nonoverlapping sets of nodes with only links joining the nodes in different sets. However, a third type of network exists, defined here as the mixture network. Just like a bipartite network, a mixture network also consists of two sets of nodes, but some nodes may simultaneously belong to two sets, which breaks the nonoverlapping restriction of a bipartite network. The mixture network can be considered as a general case, with unipartite and bipartite networks viewed as its limiting cases. A mixture network can represent not only all the unipartite and bipartite networks, but also a wide range of real-world networks that cannot be properly represented as either unipartite or bipartite networks in fields such as biology and social science. Based on this observation, we first propose a probabilistic model that can find modules in unipartite, bipartite, and mixture networks in a unified framework based on the link community model for a unipartite undirected network [B Ball et al (2011 Phys. Rev. E 84 036103)]. We test our algorithm on synthetic networks (both overlapping and nonoverlapping communities) and apply it to two real-world networks: a southern women bipartite network and a human transcriptional regulatory mixture network. The results suggest that our model performs well for all three types of networks, is competitive with other algorithms for unipartite or bipartite networks, and is applicable to real-world networks.Comment: 27 pages, 8 figures. (http://iopscience.iop.org/1367-2630/16/9/093001

    Comparison of Support Vector Machine and Back Propagation Neural Network in Evaluating the Enterprise Financial Distress

    Full text link
    Recently, applying the novel data mining techniques for evaluating enterprise financial distress has received much research alternation. Support Vector Machine (SVM) and back propagation neural (BPN) network has been applied successfully in many areas with excellent generalization results, such as rule extraction, classification and evaluation. In this paper, a model based on SVM with Gaussian RBF kernel is proposed here for enterprise financial distress evaluation. BPN network is considered one of the simplest and are most general methods used for supervised training of multilayered neural network. The comparative results show that through the difference between the performance measures is marginal; SVM gives higher precision and lower error rates.Comment: 13 pages, 1 figur

    Secure secret sharing in the cloud

    Get PDF
    In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An individual share reveals absolutely no information about the secrets to the player. The secret messages are obfuscated by encryption and thus give no information to the cloud server. Furthermore, the scheme is compatible with the Paillier cryptosystem and other cryptosystems of the same type. In light of the recent developments in privacy-preserving watermarking technology, we further model the proposed scheme as a variant of reversible watermarking in the encrypted domain

    On Exactly Solvable Potentials

    Get PDF
    We investigate two methods of obtaining exactly solvable potentials with analytic forms.Comment: 13 pages, Latex, to appear in Chineses Journal of Physic

    Chiral Restoration in the Early Universe: Pion Halo in the Sky

    Get PDF
    vanishing above TcT_c indicates chiral symmetry restoration at high TT. But is it the old T=0T=0 chiral symmetry that is `restored'? In this talk, I report on the spacetime quantization of the BPFTW effective action for quarks in a hot environ. The fermion propagator is known to give a pseudo-Lorentz invariant particle pole as well as new spacelike cuts. Our quantization shows that the spacelike cuts directly lead to a thermal vacuum that is a generalized NJL state, with a curious 90o90^{o} phase. This 90o90^{o} is responsible for vanishing at high TT. The thermal vacuum is invariant under a new chiral charge, but continues to break the old zero temperature chirality. Our quantization suggests a new class of order parameters that probe the physics of these spacelike cuts. In usual scenario, the pion dissociates in the early alphabet soup. With this new understanding of the thermal vacuum, the pion remains a Nambu-Goldstone particle at high TT, and will not dissociate. It propagates at the speed of light but with a halo.Comment: 4 pages, LaTeX, CCNY-HEP-94-9 To appear in Proceedings of "Trends in Astroparticle Physics Workshop", Stockholm, Sweden, 22-25 September, 1994, Nuclear Physics B, Proceedings Supplement, edited by L. Bergstrom, P. Carlson, P.O. Hulth, and H. Snellman. (Only revision is in the header citation

    Reversible data hiding in JPEG images based on adjustable padding

    Get PDF
    In this paper, we propose a reversible data hiding scheme that enables an adjustable amount of information to be embedded in JPEG images based on padding strategy. The proposed embedding algorithm only modifies, in a subtle manner, an adjustable number of zero-valued quantised DCT coefficients to embed the message. Hence, compared with a state-of-the-art based on histogram shifting, the proposed scheme has a relatively low distortion to the host images. In addition to this, we found that by representing the message in ternary instead of in binary, we can embed a greater amount of information while the level of distortion remains unchanged. Experimental results support that the proposed scheme can achieve better visual quality of the marked JPEG image than the histogram shifting based scheme. The proposed scheme also outperforms this state-of-the-art in terms of the ease of implementation
    corecore