1,155,828 research outputs found
Transfer Matrices for the Partition Function of the Potts Model on Toroidal Lattice Strips
We present a method for calculating transfer matrices for the -state Potts
model partition functions , for arbitrary and temperature
variable , on strip graphs of the square (sq), triangular (tri), and
honeycomb (hc) lattices of width vertices and of arbitrarily great length
vertices, subject to toroidal and Klein bottle boundary conditions. For
the toroidal case we express the partition function as ,
where denotes lattice type, are specified polynomials of
degree in , are eigenvalues of the
transfer matrix in the degree- subspace, and
() for , respectively. An analogous formula is
given for Klein bottle strips. We exhibit a method for calculating
for arbitrary . In particular, we find some very
simple formulas for the determinant , and trace
. Corresponding results are given for the equivalent
Tutte polynomials for these lattice strips and illustrative examples are
included.Comment: 52 pages, latex, 10 figure
Community detection for networks with unipartite and bipartite structure
Finding community structures in networks is important in network science,
technology, and applications. To date, most algorithms that aim to find
community structures only focus either on unipartite or bipartite networks. A
unipartite network consists of one set of nodes and a bipartite network
consists of two nonoverlapping sets of nodes with only links joining the nodes
in different sets. However, a third type of network exists, defined here as the
mixture network. Just like a bipartite network, a mixture network also consists
of two sets of nodes, but some nodes may simultaneously belong to two sets,
which breaks the nonoverlapping restriction of a bipartite network. The mixture
network can be considered as a general case, with unipartite and bipartite
networks viewed as its limiting cases. A mixture network can represent not only
all the unipartite and bipartite networks, but also a wide range of real-world
networks that cannot be properly represented as either unipartite or bipartite
networks in fields such as biology and social science. Based on this
observation, we first propose a probabilistic model that can find modules in
unipartite, bipartite, and mixture networks in a unified framework based on the
link community model for a unipartite undirected network [B Ball et al (2011
Phys. Rev. E 84 036103)]. We test our algorithm on synthetic networks (both
overlapping and nonoverlapping communities) and apply it to two real-world
networks: a southern women bipartite network and a human transcriptional
regulatory mixture network. The results suggest that our model performs well
for all three types of networks, is competitive with other algorithms for
unipartite or bipartite networks, and is applicable to real-world networks.Comment: 27 pages, 8 figures.
(http://iopscience.iop.org/1367-2630/16/9/093001
Comparison of Support Vector Machine and Back Propagation Neural Network in Evaluating the Enterprise Financial Distress
Recently, applying the novel data mining techniques for evaluating enterprise
financial distress has received much research alternation. Support Vector
Machine (SVM) and back propagation neural (BPN) network has been applied
successfully in many areas with excellent generalization results, such as rule
extraction, classification and evaluation. In this paper, a model based on SVM
with Gaussian RBF kernel is proposed here for enterprise financial distress
evaluation. BPN network is considered one of the simplest and are most general
methods used for supervised training of multilayered neural network. The
comparative results show that through the difference between the performance
measures is marginal; SVM gives higher precision and lower error rates.Comment: 13 pages, 1 figur
Secure secret sharing in the cloud
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An individual share reveals absolutely no information about the secrets to the player. The secret messages are obfuscated by encryption and thus give no information to the cloud server. Furthermore, the scheme is compatible with the Paillier cryptosystem and other cryptosystems of the same type. In light of the recent developments in privacy-preserving watermarking technology, we further model the proposed scheme as a variant of reversible watermarking in the encrypted domain
On Exactly Solvable Potentials
We investigate two methods of obtaining exactly solvable potentials with
analytic forms.Comment: 13 pages, Latex, to appear in Chineses Journal of Physic
Chiral Restoration in the Early Universe: Pion Halo in the Sky
vanishing above indicates chiral symmetry restoration at
high . But is it the old chiral symmetry that is `restored'? In this
talk, I report on the spacetime quantization of the BPFTW effective action for
quarks in a hot environ. The fermion propagator is known to give a
pseudo-Lorentz invariant particle pole as well as new spacelike cuts. Our
quantization shows that the spacelike cuts directly lead to a thermal vacuum
that is a generalized NJL state, with a curious phase. This
is responsible for vanishing at high . The thermal vacuum is
invariant under a new chiral charge, but continues to break the old zero
temperature chirality. Our quantization suggests a new class of order
parameters that probe the physics of these spacelike cuts. In usual scenario,
the pion dissociates in the early alphabet soup. With this new understanding of
the thermal vacuum, the pion remains a Nambu-Goldstone particle at high ,
and will not dissociate. It propagates at the speed of light but with a halo.Comment: 4 pages, LaTeX, CCNY-HEP-94-9 To appear in Proceedings of "Trends in
Astroparticle Physics Workshop", Stockholm, Sweden, 22-25 September, 1994,
Nuclear Physics B, Proceedings Supplement, edited by L. Bergstrom, P.
Carlson, P.O. Hulth, and H. Snellman. (Only revision is in the header
citation
Reversible data hiding in JPEG images based on adjustable padding
In this paper, we propose a reversible data hiding scheme that enables an adjustable amount of information to be embedded in JPEG images based on padding strategy. The proposed embedding algorithm only modifies, in a subtle manner, an adjustable number of zero-valued quantised DCT coefficients to embed the message. Hence, compared with a state-of-the-art based on histogram shifting, the proposed scheme has a relatively low distortion to the host images. In addition to this, we found that by representing the message in ternary instead of in binary, we can embed a greater amount of information while the level of distortion remains unchanged. Experimental results support that the proposed scheme can achieve better visual quality of the marked JPEG image than the histogram shifting based scheme. The proposed scheme also outperforms this state-of-the-art in terms of the ease of implementation
- …
