35,249 research outputs found

    MODELLING THE ELECTRON WITH COSSERAT ELASTICITY

    Get PDF
    Interactions between a finite number of bodies and the surrounding fluid, in a channel for instance, are investigated theoretically. In the planar model here the bodies or modelled grains are thin solid bodies free to move in a nearly parallel formation within a quasi-inviscid fluid. The investigation involves numerical and analytical studies and comparisons. The three main features that appear are a linear instability about a state of uniform motion, a clashing of the bodies (or of a body with a side wall) within a finite scaled time when nonlinear interaction takes effect, and a continuum-limit description of the body–fluid interaction holding for the case of many bodies

    Adaptive Measurement Network for CS Image Reconstruction

    Full text link
    Conventional compressive sensing (CS) reconstruction is very slow for its characteristic of solving an optimization problem. Convolu- tional neural network can realize fast processing while achieving compa- rable results. While CS image recovery with high quality not only de- pends on good reconstruction algorithms, but also good measurements. In this paper, we propose an adaptive measurement network in which measurement is obtained by learning. The new network consists of a fully-connected layer and ReconNet. The fully-connected layer which has low-dimension output acts as measurement. We train the fully-connected layer and ReconNet simultaneously and obtain adaptive measurement. Because the adaptive measurement fits dataset better, in contrast with random Gaussian measurement matrix, under the same measuremen- t rate, it can extract the information of scene more efficiently and get better reconstruction results. Experiments show that the new network outperforms the original one.Comment: 11pages,8figure

    Degree spectra for transcendence in fields

    Full text link
    We show that for both the unary relation of transcendence and the finitary relation of algebraic independence on a field, the degree spectra of these relations may consist of any single computably enumerable Turing degree, or of those c.e. degrees above an arbitrary fixed Δ20\Delta^0_2 degree. In other cases, these spectra may be characterized by the ability to enumerate an arbitrary Σ20\Sigma^0_2 set. This is the first proof that a computable field can fail to have a computable copy with a computable transcendence basis

    Comment on "Geometrothermodynamics of a Charged Black Hole of String Theory"

    Full text link
    We comment on the conclusions found by Larra\~naga and Mojica regarding the consistency of the Geoemtrothermodynamics programme to describe the critical behaviour of a Gibbons-Maeda-Garfinkle-Horowitz-Strominger charged black hole. We argue that making the appropriate choice of metric for the thermodynamic phase space and, most importantly, considering the homogeneity of the thermodynamic potential we obtain consistent results for such a black hole.Comment: Comment on arXiv:1012.207

    Comparison of the Near-Threshold Production of eta- and K-Mesons in Proton-Proton Collisions

    Get PDF
    The pp -> pp eta and pp -> pLambda K^+ reactions near threshold are dominated by the first and second S_11 resonance respectively. It is shown that a one-pion-exchange model exciting these isobars reproduces well the ratio of the production cross sections. The consequences for this and other channels are discussed.Comment: 10 pages, LaTeX2e, 1 eps-figur

    Parameterized complexity of the MINCCA problem on graphs of bounded decomposability

    Full text link
    In an edge-colored graph, the cost incurred at a vertex on a path when two incident edges with different colors are traversed is called reload or changeover cost. The "Minimum Changeover Cost Arborescence" (MINCCA) problem consists in finding an arborescence with a given root vertex such that the total changeover cost of the internal vertices is minimized. It has been recently proved by G\"oz\"upek et al. [TCS 2016] that the problem is FPT when parameterized by the treewidth and the maximum degree of the input graph. In this article we present the following results for the MINCCA problem: - the problem is W[1]-hard parameterized by the treedepth of the input graph, even on graphs of average degree at most 8. In particular, it is W[1]-hard parameterized by the treewidth of the input graph, which answers the main open problem of G\"oz\"upek et al. [TCS 2016]; - it is W[1]-hard on multigraphs parameterized by the tree-cutwidth of the input multigraph; - it is FPT parameterized by the star tree-cutwidth of the input graph, which is a slightly restricted version of tree-cutwidth. This result strictly generalizes the FPT result given in G\"oz\"upek et al. [TCS 2016]; - it remains NP-hard on planar graphs even when restricted to instances with at most 6 colors and 0/1 symmetric costs, or when restricted to instances with at most 8 colors, maximum degree bounded by 4, and 0/1 symmetric costs.Comment: 25 pages, 11 figure

    Parameterized Complexity of the k-anonymity Problem

    Full text link
    The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization that has been recently proposed is the kk-anonymity. This approach requires that the rows of a table are partitioned in clusters of size at least kk and that all the rows in a cluster become the same tuple, after the suppression of some entries. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is known to be APX-hard even when the records values are over a binary alphabet and k=3k=3, and when the records have length at most 8 and k=4k=4 . In this paper we study how the complexity of the problem is influenced by different parameters. In this paper we follow this direction of research, first showing that the problem is W[1]-hard when parameterized by the size of the solution (and the value kk). Then we exhibit a fixed parameter algorithm, when the problem is parameterized by the size of the alphabet and the number of columns. Finally, we investigate the computational (and approximation) complexity of the kk-anonymity problem, when restricting the instance to records having length bounded by 3 and k=3k=3. We show that such a restriction is APX-hard.Comment: 22 pages, 2 figure

    Thermodynamics of a class of non-asymptotically flat black holes in Einstein-Maxwell-Dilaton theory

    Full text link
    We analyse in detail the thermodynamics in the canonical and grand canonical ensembles of a class of non-asymptotically flat black holes of the Einstein-(anti) Maxwell-(anti) Dilaton theory in 4D with spherical symmetry. We present the first law of thermodynamics, the thermodynamic analysis of the system through the geometrothermodynamics methods, Weinhold, Ruppeiner, Liu-Lu-Luo-Shao and the most common, that made by the specific heat. The geometric methods show a curvature scalar identically zero, which is incompatible with the results of the analysis made by the non null specific heat, which shows that the system is thermodynamically interacting, does not possess extreme case nor phase transition. We also analyse the local and global stability of the thermodynamic system, and obtain a local and global stability for the normal case for 0<\gamma<1 and for other values of \gamma, an unstable system. The solution where \gamma=0 separates the class of locally and globally stable solutions from the unstable ones.Comment: 18 pages, version accepted for publication in General Relativity and Gravitatio

    Distance Properties of Short LDPC Codes and their Impact on the BP, ML and Near-ML Decoding Performance

    Full text link
    Parameters of LDPC codes, such as minimum distance, stopping distance, stopping redundancy, girth of the Tanner graph, and their influence on the frame error rate performance of the BP, ML and near-ML decoding over a BEC and an AWGN channel are studied. Both random and structured LDPC codes are considered. In particular, the BP decoding is applied to the code parity-check matrices with an increasing number of redundant rows, and the convergence of the performance to that of the ML decoding is analyzed. A comparison of the simulated BP, ML, and near-ML performance with the improved theoretical bounds on the error probability based on the exact weight spectrum coefficients and the exact stopping size spectrum coefficients is presented. It is observed that decoding performance very close to the ML decoding performance can be achieved with a relatively small number of redundant rows for some codes, for both the BEC and the AWGN channels

    Self-repair ability of evolved self-assembling systems in cellular automata

    Get PDF
    Self-repairing systems are those that are able to reconfigure themselves following disruptions to bring them back into a defined normal state. In this paper we explore the self-repair ability of some cellular automata-like systems, which differ from classical cellular automata by the introduction of a local diffusion process inspired by chemical signalling processes in biological development. The update rules in these systems are evolved using genetic programming to self-assemble towards a target pattern. In particular, we demonstrate that once the update rules have been evolved for self-assembly, many of those update rules also provide a self-repair ability without any additional evolutionary process aimed specifically at self-repair
    • …
    corecore