35,268 research outputs found

    MODELLING THE ELECTRON WITH COSSERAT ELASTICITY

    Get PDF
    Interactions between a finite number of bodies and the surrounding fluid, in a channel for instance, are investigated theoretically. In the planar model here the bodies or modelled grains are thin solid bodies free to move in a nearly parallel formation within a quasi-inviscid fluid. The investigation involves numerical and analytical studies and comparisons. The three main features that appear are a linear instability about a state of uniform motion, a clashing of the bodies (or of a body with a side wall) within a finite scaled time when nonlinear interaction takes effect, and a continuum-limit description of the body–fluid interaction holding for the case of many bodies

    Adaptive Measurement Network for CS Image Reconstruction

    Full text link
    Conventional compressive sensing (CS) reconstruction is very slow for its characteristic of solving an optimization problem. Convolu- tional neural network can realize fast processing while achieving compa- rable results. While CS image recovery with high quality not only de- pends on good reconstruction algorithms, but also good measurements. In this paper, we propose an adaptive measurement network in which measurement is obtained by learning. The new network consists of a fully-connected layer and ReconNet. The fully-connected layer which has low-dimension output acts as measurement. We train the fully-connected layer and ReconNet simultaneously and obtain adaptive measurement. Because the adaptive measurement fits dataset better, in contrast with random Gaussian measurement matrix, under the same measuremen- t rate, it can extract the information of scene more efficiently and get better reconstruction results. Experiments show that the new network outperforms the original one.Comment: 11pages,8figure

    Comment on "Geometrothermodynamics of a Charged Black Hole of String Theory"

    Full text link
    We comment on the conclusions found by Larra\~naga and Mojica regarding the consistency of the Geoemtrothermodynamics programme to describe the critical behaviour of a Gibbons-Maeda-Garfinkle-Horowitz-Strominger charged black hole. We argue that making the appropriate choice of metric for the thermodynamic phase space and, most importantly, considering the homogeneity of the thermodynamic potential we obtain consistent results for such a black hole.Comment: Comment on arXiv:1012.207

    Degree spectra for transcendence in fields

    Full text link
    We show that for both the unary relation of transcendence and the finitary relation of algebraic independence on a field, the degree spectra of these relations may consist of any single computably enumerable Turing degree, or of those c.e. degrees above an arbitrary fixed Δ20\Delta^0_2 degree. In other cases, these spectra may be characterized by the ability to enumerate an arbitrary Σ20\Sigma^0_2 set. This is the first proof that a computable field can fail to have a computable copy with a computable transcendence basis

    Comparison of the Near-Threshold Production of eta- and K-Mesons in Proton-Proton Collisions

    Get PDF
    The pp -> pp eta and pp -> pLambda K^+ reactions near threshold are dominated by the first and second S_11 resonance respectively. It is shown that a one-pion-exchange model exciting these isobars reproduces well the ratio of the production cross sections. The consequences for this and other channels are discussed.Comment: 10 pages, LaTeX2e, 1 eps-figur

    High girth column-weight-two LDPC codes based on distance graphs

    Get PDF
    Copyright © 2007 G. Malema and M. Liebelt. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.LDPC codes of column weight of two are constructed from minimal distance graphs or cages. Distance graphs are used to represent LDPC code matrices such that graph vertices that represent rows and edges are columns. The conversion of a distance graph into matrix form produces an adjacency matrix with column weight of two and girth double that of the graph. The number of 1's in each row (row weight) is equal to the degree of the corresponding vertex. By constructing graphs with different vertex degrees, we can vary the rate of corresponding LDPC code matrices. Cage graphs are used as examples of distance graphs to design codes with different girths and rates. Performance of obtained codes depends on girth and structure of the corresponding distance graphs.Gabofetswe Malema and Michael Liebel

    Parameterized Complexity of the k-anonymity Problem

    Full text link
    The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization that has been recently proposed is the kk-anonymity. This approach requires that the rows of a table are partitioned in clusters of size at least kk and that all the rows in a cluster become the same tuple, after the suppression of some entries. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is known to be APX-hard even when the records values are over a binary alphabet and k=3k=3, and when the records have length at most 8 and k=4k=4 . In this paper we study how the complexity of the problem is influenced by different parameters. In this paper we follow this direction of research, first showing that the problem is W[1]-hard when parameterized by the size of the solution (and the value kk). Then we exhibit a fixed parameter algorithm, when the problem is parameterized by the size of the alphabet and the number of columns. Finally, we investigate the computational (and approximation) complexity of the kk-anonymity problem, when restricting the instance to records having length bounded by 3 and k=3k=3. We show that such a restriction is APX-hard.Comment: 22 pages, 2 figure

    Structural comparison of the free and DNA-bound forms of the purine repressor DNA-binding domain

    Get PDF
    AbstractBackground: The purine repressor (PurR) regulates genes that encode enzymes for purine biosynthesis. PurR has a two domain structure with an N-terminal DNA-binding domain (DBD) and a C-terminal corepressor-binding domain (CBD). The three-dimensional structure of a ternary complex of PurR bound to both corepressor and a specific DNA sequence has recently been determined by X-ray crystallography.Results We have determined the solution structure of the PurR DBD by NMR. It contains three helices, with the first and second helices forming a helix-turn-helix motif. The tertiary structure of the three helices is very similar to that of the corresponding region in the ternary complex. The structure of the hinge helical region, however, which makes specific base contacts in the minor groove of DNA, is disordered in the DNA-free form.Conclusion The stable formation of PurR hinge helices requires PurR dimerization, which brings the hinge regions proximal to each other. The dimerization of the hinge helices is likely to be controled by the CBD dimerization interface, but is induced by specific-DNA binding

    Distance Properties of Short LDPC Codes and their Impact on the BP, ML and Near-ML Decoding Performance

    Full text link
    Parameters of LDPC codes, such as minimum distance, stopping distance, stopping redundancy, girth of the Tanner graph, and their influence on the frame error rate performance of the BP, ML and near-ML decoding over a BEC and an AWGN channel are studied. Both random and structured LDPC codes are considered. In particular, the BP decoding is applied to the code parity-check matrices with an increasing number of redundant rows, and the convergence of the performance to that of the ML decoding is analyzed. A comparison of the simulated BP, ML, and near-ML performance with the improved theoretical bounds on the error probability based on the exact weight spectrum coefficients and the exact stopping size spectrum coefficients is presented. It is observed that decoding performance very close to the ML decoding performance can be achieved with a relatively small number of redundant rows for some codes, for both the BEC and the AWGN channels

    Parameterized complexity of the MINCCA problem on graphs of bounded decomposability

    Full text link
    In an edge-colored graph, the cost incurred at a vertex on a path when two incident edges with different colors are traversed is called reload or changeover cost. The "Minimum Changeover Cost Arborescence" (MINCCA) problem consists in finding an arborescence with a given root vertex such that the total changeover cost of the internal vertices is minimized. It has been recently proved by G\"oz\"upek et al. [TCS 2016] that the problem is FPT when parameterized by the treewidth and the maximum degree of the input graph. In this article we present the following results for the MINCCA problem: - the problem is W[1]-hard parameterized by the treedepth of the input graph, even on graphs of average degree at most 8. In particular, it is W[1]-hard parameterized by the treewidth of the input graph, which answers the main open problem of G\"oz\"upek et al. [TCS 2016]; - it is W[1]-hard on multigraphs parameterized by the tree-cutwidth of the input multigraph; - it is FPT parameterized by the star tree-cutwidth of the input graph, which is a slightly restricted version of tree-cutwidth. This result strictly generalizes the FPT result given in G\"oz\"upek et al. [TCS 2016]; - it remains NP-hard on planar graphs even when restricted to instances with at most 6 colors and 0/1 symmetric costs, or when restricted to instances with at most 8 colors, maximum degree bounded by 4, and 0/1 symmetric costs.Comment: 25 pages, 11 figure
    • 

    corecore