108 research outputs found
Most Complex Non-Returning Regular Languages
A regular language is non-returning if in the minimal deterministic
finite automaton accepting it there are no transitions into the initial state.
Eom, Han and Jir\'askov\'a derived upper bounds on the state complexity of
boolean operations and Kleene star, and proved that these bounds are tight
using two different binary witnesses. They derived upper bounds for
concatenation and reversal using three different ternary witnesses. These five
witnesses use a total of six different transformations. We show that for each
there exists a ternary witness of state complexity that meets the
bound for reversal and that at least three letters are needed to meet this
bound. Moreover, the restrictions of this witness to binary alphabets meet the
bounds for product, star, and boolean operations. We also derive tight upper
bounds on the state complexity of binary operations that take arguments with
different alphabets. We prove that the maximal syntactic semigroup of a
non-returning language has elements and requires at least
generators. We find the maximal state complexities of atoms of
non-returning languages. Finally, we show that there exists a most complex
non-returning language that meets the bounds for all these complexity measures.Comment: 22 pages, 6 figure
A New Technique for Reachability of States in Concatenation Automata
We present a new technique for demonstrating the reachability of states in
deterministic finite automata representing the concatenation of two languages.
Such demonstrations are a necessary step in establishing the state complexity
of the concatenation of two languages, and thus in establishing the state
complexity of concatenation as an operation. Typically, ad-hoc induction
arguments are used to show particular states are reachable in concatenation
automata. We prove some results that seem to capture the essence of many of
these induction arguments. Using these results, reachability proofs in
concatenation automata can often be done more simply and without using
induction directly.Comment: 23 pages, 1 table. Added missing affiliation/funding informatio
Twitter-based analysis of the dynamics of collective attention to political parties
Large-scale data from social media have a significant potential to describe
complex phenomena in real world and to anticipate collective behaviors such as
information spreading and social trends. One specific case of study is
represented by the collective attention to the action of political parties. Not
surprisingly, researchers and stakeholders tried to correlate parties' presence
on social media with their performances in elections. Despite the many efforts,
results are still inconclusive since this kind of data is often very noisy and
significant signals could be covered by (largely unknown) statistical
fluctuations. In this paper we consider the number of tweets (tweet volume) of
a party as a proxy of collective attention to the party, identify the dynamics
of the volume, and show that this quantity has some information on the
elections outcome. We find that the distribution of the tweet volume for each
party follows a log-normal distribution with a positive autocorrelation of the
volume over short terms, which indicates the volume has large fluctuations of
the log-normal distribution yet with a short-term tendency. Furthermore, by
measuring the ratio of two consecutive daily tweet volumes, we find that the
evolution of the daily volume of a party can be described by means of a
geometric Brownian motion (i.e., the logarithm of the volume moves randomly
with a trend). Finally, we determine the optimal period of averaging tweet
volume for reducing fluctuations and extracting short-term tendencies. We
conclude that the tweet volume is a good indicator of parties' success in the
elections when considered over an optimal time window. Our study identifies the
statistical nature of collective attention to political issues and sheds light
on how to model the dynamics of collective attention in social media.Comment: 16 pages, 7 figures, 3 tables. Published in PLoS ON
A nested caseācontrol study of the association of Helicobacter pylori infection with gastric adenocarcinoma in Korea
In a nested caseācontrol study of 86 cases of gastric adenocarcinoma in relation to Helicobactor pylori infection in the Korean Multi-center Cancer Cohort, the H. pylori IgG seropositivity was 83.7% and that of the 344 matched controls was 80.8%, with a matched odds ratio for H. pylori infection of 1.06 (95% CI, 0.80ā1.40)
Multiple detection of food-borne pathogenic bacteria using a novel 16S rDNA-based oligonucleotide signature chip
There have been many attempts to develop sensitive and accurate techniques for the detection and diagnosis of pathogenic bacteria using nucleic acid-based technology. To achieve efficient multiple detection of seven selected food-borne pathogens, we assessed the respective 16S rDNA pathogen specific sequences using an oligonucleotide-based signature array. Strategic optimal design of specific capture probes was achieved by using the characteristic first variable region. To assess the specificity of this pathogen detection system, we employed a two-step experimental strategy. Under conditions established through experiments with chemically synthesized model targets comprising both conserved and variable regions of 16S rDNA, we confirmed the validity of this system using real 16S rDNA targets. Detection with real targets was successfully performed using our system, and better specificity was obtained compared to experiments with model targets. Moreover, the subtypes of Vibrio pathogens were successfully classified. We developed a two-dimensional visualization plot tool for positive control and specific spots, which allowed facile and minute differentiation between spot intensities. Repeated array formats were employed to ensure experimental uniformity, and included the statistical p-value criterion for pathogen discrimination. The present results thus indicate that our novel oligonucleotide-based signature chip detection system can be employed for the effective detection of multiple pathogens. (c) 2006 Elsevier B.V. All rights reserved.X1143sciescopu
BBOS: Efficient HPC Storage Management via Burst Buffer Over-Subscription
To avoid access to PFS, dedicated BB allocation is preferred despite of severe BB underutilization. Recently, new all-flash HPC storage systems with integrated BB and PFS are proposed, which speed up access to PFS. For this reason, we adopt BB over-subscription allocation method by allowing HPC applications to use BB only for I/O phase for improving BB utilization. Unfortunately, BB over-subscription aggravates I/O interference and demotion overhead from BB to PFS, resulting in degraded performance. To minimize the performance degradation, we develop an I/O scheduler to prevent I/O congestion and a new transparent data management system based on checkpoint/restart characteristics of HPC applications. With the proposed approach, not only the BB utilization can be improved, but also high performance of applications is achieved. In our experiments, we find that BB utilization is improved at least 2.2x, and more stable and higher checkpoint performance is guaranteed compared to other approaches. Besides, we achieve up to 96.4% hit ratio of restart requests on BB and up to 3.1x higher restart performance than others
- ā¦