55 research outputs found

    Subspace tracking from missing and corrupted data using NORST and its heuristic extensions

    Get PDF
    We study the problem of subspace tracking (ST) in the presence of missing and corrupted data. We are able to show that, under assumptions on only the algorithm inputs (input data and/or initialization), the output subspace estimates are close to the true data subspaces at all times. The guarantees hold under mild and easily interpretable assumptions and handle time-varying subspaces. We also show that our algorithm and its extensions are fast and have competitive experimental performance when compared with existing methods. Finally, this solution can be interpreted as a provably correct mini-batch and memory-efficient solution to low rank Matrix Completion (MC)

    Evolutionary Approach to Realism

    Get PDF
    Common sense realism and scientific realism are two metaphysical thesis. The former accepts the existence of the observable entities of common sense knowledge and the later accepts the unobservable entities necessary for the well-established scientific theories. Common sense realism and scientific realism are defended or rejected by some philosophers with reliance on the evolutionary approach. Studying these arguments shows there are positive evidences to the advantage of both subjects; realism and anti-realism, But skeptical consequences of evolutionary approach to science is a source for a new idea to specify science and to develop the scientific epistemology. In this article، in addition to investigating the above local reasonings to the advantage of Van Fraasson's evolutionary explanation will be adopted for science and scientific epistemology growth on the basis of specifying evolutionary; the third position which between realism and belief in miracle is in specifying the success of science. In this approach, the evolutionary approach, the production of resistant and abiding models is the main goal of science and philosophy and the scientific realism is also one of the abiding models

    Simultaneous treatment of anterior vaginal wall prolapse and stress urinary incontinence by using transobturator four arms polypropylene mesh

    Get PDF
    Purpose: To evaluate the medium-term efficacy and safety of transobturator four-arm polypropylene mesh in the treatment of high-stage anterior vaginal wall prolapse and concomitant stress urinary incontinence (SUI). Materials and Methods: Between September 2010 and August 2013, a prospective single-center trial was performed to evaluate women with stage≥3 anterior vaginal wall prolapse with or without SUI who presented to Labbafinejad Hospital, Teheran, Iran, and underwent anterior vaginal wall repair with polypropylene mesh. Pre- and postoperative evaluation included history; physical examination using the Pelvic Organ Prolapse Quantification system and cough stress test, both before and after reduction of prolapsed structures; Pelvic Floor Distress Inventory (PFDI) and Pelvic Floor Impact Questionnaire (PFIQ); urinalysis and culture; and a postvoid residual assessment. Complications were reported at a mean of 2 years of follow-up. Results: A total of 71 patients underwent cystocele repair with the transobturator four-arm polypropylene mesh. Seven of the patients were lost to follow-up. There were no perioperative complications. The anatomical success rate was 87.5%. The subjective success rate was 92.1%. The PFDI and PFIQ were significantly improved after surgery (p<0.001). Among those with the simultaneous complaint of SUI, 82% were cured without any additional procedure. Three patients (4.6%) experienced vaginal mesh extrusion. Two patients (3.1%) reported worsening of dyspareunia after surgery. Conclusions: The four arms polypropylene mesh is an effective device for simultaneous correction of anterior vaginal wall prolapse and SUI with a low complication rate at a medium-term follow-up. The majority of the subgroup with concomitant SUI were cured without a second simultaneous procedure

    An unusual cause of urinary incontinence: Urethral coitus in a case of Mayer-Rokitansky- Kuster-Hauser syndrome

    Get PDF
    Mayer-Rokitansky-Kuster-Hauser (MRKH) syndrome is a rare anomaly in women and is characterized by congenital aplasia of the uterus and vagina, with normal development of secondary sexual characteristics and a normal karyotype. We report a case of a 38-year-old women with MRKH syndrome that had experienced urethral sex for many years. She presented with urinary incontinence and dyspareunia. The patient’s secondary sexual characteristics were normal, and examination revealed a widely open incompetent megalourethra and an absent vagina. Laboratory studies confirmed a 46, XX karyotype. Imaging included ultrasonography and magnetic resonance imaging, which indicated bilateral normal ovaries and a rudimental bicornuate uterus. After confirming the diagnosis of MRKH, the patient underwent urethroplasty by urethral plication, antiincontinence surgery by autologous fascial sling of the bladder neck, and the creation of a neo-vagina using a urethral flap. After 3 months, voiding cystourethrography and uroflowmetry confirmed normal voiding. There were no postoperative symptoms of urinary incontinence, and the patient was completely satisfied

    Optimal homotopy asymptotic method to large post-buckling deformation of MEMS

    Get PDF
    In the present paper, the post-buckling response of an axially stressed clamped-clamped actuator, modeled as a beam and subjected to a symmetric electrostatic field is analyzed. An analytical approximate method, namely the Optimal Homotopy Asymptotic Method (OHAM) is applied to the governing nonlinear integro-differential equation. The analytical results obtained through the proposed procedure show excellent agreement with numerical solution, proving the validity of the proposed procedure, which is simple and easy to use

    Subspace tracking from missing and corrupted data using NORST and its heuristic extensions

    No full text
    We study the problem of subspace tracking (ST) in the presence of missing and corrupted data. We are able to show that, under assumptions on only the algorithm inputs (input data and/or initialization), the output subspace estimates are close to the true data subspaces at all times. The guarantees hold under mild and easily interpretable assumptions and handle time-varying subspaces. We also show that our algorithm and its extensions are fast and have competitive experimental performance when compared with existing methods. Finally, this solution can be interpreted as a provably correct mini-batch and memory-efficient solution to low rank Matrix Completion (MC).</p

    HotGate : trustless cross-chain settlement protocol

    No full text
    The concept of blockchain was introduced by Nakamoto in the Bitcoin whitepaper. Bitcoin enabled users to make payments in a fully-decentralized manner. In the past decade, researchers and engineers leveraged the Bitcoin idea and proposed blockchains with different characteristics (such as level of security, privacy, and decentralization), each focusing on a particular area. One way to classify blockchains is based on their programmability. A programmable blockchain enables developers to run their programs on top of it. This way, the execution of programs becomes decentralized so no one can manipulate the result. Currently, many dApps are built on top of programmable blockchains such as exchanges, lending protocols, etc. Bitcoin, although its promising security, doesn't have the programming capability to build dApp on it. In this work, I introduce and implement HotGate, a trustless cross-chain settlement protocol that enables users to move BTC from Bitcoin to other programmable blockchains. So users can leverage their BTC in dApps of other blockchains. Moreover, HotGate enables users to exchange their BTC for assets that exist on these blockchains. HotGate uses Relay, a fully-decentralized interoperability solution that connects blockchains directly together. This makes Hotgate a trustless protocol that is aligned with blockchain values. Moreover, HotGate introduces two mechanisms that enable users to move BTC in a fast and private manner, which are the weaknesses of the Bitcoin blockchain.Applied Science, Faculty ofEngineering, School of (Okanagan)Graduat
    • …
    corecore