2,071 research outputs found

    (Z)-3-Ferrocenyl-2-(4-pyridyl)­propene­nitrile

    Get PDF
    In the title compound, [Fe(C5H5)(C13H9N2)], the pyridine ring makes a dihedral angle of 9.91 (17)° with the substituted cyclo­penta­dienyl ring and the double bond adopts a Z configuration. In the crystal structure, inter­molecular C—H⋯N hydrogen bonds link the molecules into a one-dimensional chain in the a+c direction

    Generic cluster characters

    Full text link
    Let \CC be a Hom-finite triangulated 2-Calabi-Yau category with a cluster-tilting object TT. Under a constructibility condition we prove the existence of a set \mathcal G^T(\CC) of generic values of the cluster character associated to TT. If \CC has a cluster structure in the sense of Buan-Iyama-Reiten-Scott, \mathcal G^T(\CC) contains the set of cluster monomials of the corresponding cluster algebra. Moreover, these sets coincide if C\mathcal C has finitely many indecomposable objects. When \CC is the cluster category of an acyclic quiver and TT is the canonical cluster-tilting object, this set coincides with the set of generic variables previously introduced by the author in the context of acyclic cluster algebras. In particular, it allows to construct Z\Z-linear bases in acyclic cluster algebras.Comment: 24 pages. Final Version. In particular, a new section studying an explicit example was adde

    Cluster algebras arising from cluster tubes

    Full text link
    We study the cluster algebras arising from cluster tubes with rank bigger than 11. Cluster tubes are 22-Calabi-Yau triangulated categories which contain no cluster tilting objects, but maximal rigid objects. Fix a certain maximal rigid object TT in the cluster tube Cn\mathcal{C}_n of rank nn. For any indecomposable rigid object MM in Cn\mathcal{C}_n, we define an analogous XMX_M of Caldero-Chapton's formula (or Palu's cluster character formula) by using the geometric information of MM. We show that XM,XMX_M, X_{M'} satisfy the mutation formula when M,MM,M' form an exchange pair, and that X?:MXMX_{?}: M\mapsto X_M gives a bijection from the set of indecomposable rigid objects in Cn\mathcal{C}_n to the set of cluster variables of cluster algebra of type Cn1C_{n-1}, which induces a bijection between the set of basic maximal rigid objects in Cn\mathcal{C}_n and the set of clusters. This strengths a surprising result proved recently by Buan-Marsh-Vatne that the combinatorics of maximal rigid objects in the cluster tube Cn\mathcal{C}_n encode the combinatorics of the cluster algebra of type Bn1B_{n-1} since the combinatorics of cluster algebras of type Bn1B_{n-1} or of type Cn1C_{n-1} are the same by a result of Fomin and Zelevinsky. As a consequence, we give a categorification of cluster algebras of type CC.Comment: 21 pages, title changed, rewrite the proof of the main theorem in Section 3, add Section 5, final version to appear in Jour. London Math. So

    Cluster algebras of type A2(1)A_2^{(1)}

    Get PDF
    In this paper we study cluster algebras \myAA of type A2(1)A_2^{(1)}. We solve the recurrence relations among the cluster variables (which form a T--system of type A2(1)A_2^{(1)}). We solve the recurrence relations among the coefficients of \myAA (which form a Y--system of type A2(1)A_2^{(1)}). In \myAA there is a natural notion of positivity. We find linear bases \BB of \myAA such that positive linear combinations of elements of \BB coincide with the cone of positive elements. We call these bases \emph{atomic bases} of \myAA. These are the analogue of the "canonical bases" found by Sherman and Zelevinsky in type A1(1)A_{1}^{(1)}. Every atomic basis consists of cluster monomials together with extra elements. We provide explicit expressions for the elements of such bases in every cluster. We prove that the elements of \BB are parameterized by \ZZ^3 via their g\mathbf{g}--vectors in every cluster. We prove that the denominator vector map in every acyclic seed of \myAA restricts to a bijection between \BB and \ZZ^3. In particular this gives an explicit algorithm to determine the "virtual" canonical decomposition of every element of the root lattice of type A2(1)A_2^{(1)}. We find explicit recurrence relations to express every element of \myAA as linear combinations of elements of \BB.Comment: Latex, 40 pages; Published online in Algebras and Representation Theory, springer, 201

    A Comparison of RBF Neural Network Training Algorithms for Inertial Sensor Based Terrain Classification

    Get PDF
    This paper introduces a comparison of training algorithms of radial basis function (RBF) neural networks for classification purposes. RBF networks provide effective solutions in many science and engineering fields. They are especially popular in the pattern classification and signal processing areas. Several algorithms have been proposed for training RBF networks. The Artificial Bee Colony (ABC) algorithm is a new, very simple and robust population based optimization algorithm that is inspired by the intelligent behavior of honey bee swarms. The training performance of the ABC algorithm is compared with the Genetic algorithm, Kalman filtering algorithm and gradient descent algorithm. In the experiments, not only well known classification problems from the UCI repository such as the Iris, Wine and Glass datasets have been used, but also an experimental setup is designed and inertial sensor based terrain classification for autonomous ground vehicles was also achieved. Experimental results show that the use of the ABC algorithm results in better learning than those of others

    A 1D microphysical cloud model for Earth, and Earth-like exoplanets. Liquid water and water ice clouds in the convective troposphere

    Full text link
    One significant difference between the atmospheres of stars and exoplanets is the presence of condensed particles (clouds or hazes) in the atmosphere of the latter. The main goal of this paper is to develop a self-consistent microphysical cloud model for 1D atmospheric codes, which can reproduce some observed properties of Earth, such as the average albedo, surface temperature, and global energy budget. The cloud model is designed to be computationally efficient, simple to implement, and applicable for a wide range of atmospheric parameters for planets in the habitable zone. We use a 1D, cloud-free, radiative-convective, and photochemical equilibrium code originally developed by Kasting, Pavlov, Segura, and collaborators as basis for our cloudy atmosphere model. The cloud model is based on models used by the meteorology community for Earth's clouds. The free parameters of the model are the relative humidity and number density of condensation nuclei, and the precipitation efficiency. In a 1D model, the cloud coverage cannot be self-consistently determined, thus we treat it as a free parameter. We apply this model to Earth (aerosol number density 100 cm^-3, relative humidity 77 %, liquid cloud fraction 40 %, and ice cloud fraction 25 %) and find that a precipitation efficiency of 0.8 is needed to reproduce the albedo, average surface temperature and global energy budget of Earth. We perform simulations to determine how the albedo and the climate of a planet is influenced by the free parameters of the cloud model. We find that the planetary climate is most sensitive to changes in the liquid water cloud fraction and precipitation efficiency. The advantage of our cloud model is that the cloud height and the droplet sizes are self-consistently calculated, both of which influence the climate and albedo of exoplanets.Comment: To appear in Icaru

    Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Full text link
    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1) automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2) mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3) be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.Comment: In Proceedings TAV-WEB 2010, arXiv:1009.330

    Categorification of skew-symmetrizable cluster algebras

    Full text link
    We propose a new framework for categorifying skew-symmetrizable cluster algebras. Starting from an exact stably 2-Calabi-Yau category C endowed with the action of a finite group G, we construct a G-equivariant mutation on the set of maximal rigid G-invariant objects of C. Using an appropriate cluster character, we can then attach to these data an explicit skew-symmetrizable cluster algebra. As an application we prove the linear independence of the cluster monomials in this setting. Finally, we illustrate our construction with examples associated with partial flag varieties and unipotent subgroups of Kac-Moody groups, generalizing to the non simply-laced case several results of Gei\ss-Leclerc-Schr\"oer.Comment: 64 page

    Early satellite cell communication creates a permissive environment for long-term muscle growth

    Get PDF
    Using in vivo muscle stem cell (satellite cell)-specific extracellular vesicle (EV) tracking, satellite cell depletion, in vitro cell culture, and single-cell RNA sequencing, we show satellite cells communicate with other cells in skeletal muscle during mechanical overload. Early satellite cell EV communication primes the muscle milieu for proper long-term extracellular matrix (ECM) deposition and is sufficient to support sustained hypertrophy in adult mice, even in the absence of fusion to muscle fibers. Satellite cells modulate chemokine gene expression across cell types within the first few days of loading, and EV delivery of miR 206 to fibrogenic cells represses Wisp1 expression required for appropriate ECM remodeling. Late-stage communication from myogenic cells during loading is widespread but may be targeted toward endothelial cells. Satellite cells coordinate adaptation by influencing the phenotype of recipient cells, which extends our understanding of their role in muscle adaptation beyond regeneration and myonuclear donation

    Maintaining regularity and generalization in data using the minimum description length principle and genetic algorithm: case of grammatical inference

    Get PDF
    In this paper, a genetic algorithm with minimum description length (GAWMDL) is proposed for grammatical inference. The primary challenge of identifying a language of infinite cardinality from a finite set of examples should know when to generalize and specialize the training data. The minimum description length principle that has been incorporated addresses this issue is discussed in this paper. Previously, the e-GRIDS learning model was proposed, which enjoyed the merits of the minimum description length principle, but it is limited to positive examples only. The proposed GAWMDL, which incorporates a traditional genetic algorithm and has a powerful global exploration capability that can exploit an optimum offspring. This is an effective approach to handle a problem which has a large search space such the grammatical inference problem. The computational capability, the genetic algorithm poses is not questionable, but it still suffers from premature convergence mainly arising due to lack of population diversity. The proposed GAWMDL incorporates a bit mask oriented data structure that performs the reproduction operations, creating the mask, then Boolean based procedure is applied to create an offspring in a generative manner. The Boolean based procedure is capable of introducing diversity into the population, hence alleviating premature convergence. The proposed GAWMDL is applied in the context free as well as regular languages of varying complexities. The computational experiments show that the GAWMDL finds an optimal or close-to-optimal grammar. Two fold performance analysis have been performed. First, the GAWMDL has been evaluated against the elite mating pool genetic algorithm which was proposed to introduce diversity and to address premature convergence. GAWMDL is also tested against the improved tabular representation algorithm. In addition, the authors evaluate the performance of the GAWMDL against a genetic algorithm not using the minimum description length principle. Statistical tests demonstrate the superiority of the proposed algorithm. Overall, the proposed GAWMDL algorithm greatly improves the performance in three main aspects: maintains regularity of the data, alleviates premature convergence and is capable in grammatical inference from both positive and negative corpora
    corecore