19,486 research outputs found

    New Osmosis Law and Theory: the New Formula that Replaces van't Hoff Osmotic Pressure Equation

    Full text link
    This article derived a new abstract concept from the osmotic process and concluded it via "osmotic force" with a new law -- "osmotic law". The "osmotic law" describes that, in an osmotic system, osmolyte moves osmotically from the side with higher "osmotic force" to the side with lower "osmotic force". In addition, it was proved mathematically that the osmotic process could be explained perfectly via "osmotic force" and "osmotic laws", which can prevent the difficulties in using current "osmotic pressure" concept to explain the osmotic process and phenomenon. A theory and equation to describe the curve of osmotic pressure vs. different ideal solution concentrations are also derived, which can overcome the limitedness and incompleteness of van't Hoff osmotic pressure formula (a linear equation) which is applicable to ideal dilute solution only

    Robust Independent Component Analysis via Minimum Divergence Estimation

    Full text link
    Independent component analysis (ICA) has been shown to be useful in many applications. However, most ICA methods are sensitive to data contamination and outliers. In this article we introduce a general minimum U-divergence framework for ICA, which covers some standard ICA methods as special cases. Within the U-family we further focus on the gamma-divergence due to its desirable property of super robustness, which gives the proposed method gamma-ICA. Statistical properties and technical conditions for the consistency of gamma-ICA are rigorously studied. In the limiting case, it leads to a necessary and sufficient condition for the consistency of MLE-ICA. This necessary and sufficient condition is weaker than the condition known in the literature. Since the parameter of interest in ICA is an orthogonal matrix, a geometrical algorithm based on gradient flows on special orthogonal group is introduced to implement gamma-ICA. Furthermore, a data-driven selection for the gamma value, which is critical to the achievement of gamma-ICA, is developed. The performance, especially the robustness, of gamma-ICA in comparison with standard ICA methods is demonstrated through experimental studies using simulated data and image data.Comment: 7 figure

    A Model of Low-lying States in Strongly Interacting Electroweak Symmetry-Breaking Sector

    Full text link
    It is proposed that, in a strongly-interacting electroweak sector, besides the Goldstone bosons, the coexistence of a scalar state (HH) and vector resonances such as A1A_1 [IG(JP)=1βˆ’(1+I^G(J^P)=1^-(1^+)], VV [1+(1βˆ’)1^+(1^-)] and Ο‰H\omega_H^{} [0βˆ’(1βˆ’)0^-(1^-)] is required by the proper Regge behavior of the forward scattering amplitudes. This is a consequence of the following well-motivated assumptions: (a). Adler-Weisberger-type sum rules and the superconvergence relations for scattering amplitudes hold in this strongly interacting sector; (b). the sum rules at t=0t=0 are saturated by a minimal set of low-lying states with appropriate quantum numbers. It therefore suggests that a complete description should include all these resonances. These states may lead to distinctive experimental signatures at future colliders.Comment: revised version, to appear in Modern Physics Letters A; file also available via anonymous ftp at ftp://ucdhep.ucdavis.edu/han/sews/lowlying.p

    R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections

    Full text link
    The influence of Deep Learning on image identification and natural language processing has attracted enormous attention globally. The convolution neural network that can learn without prior extraction of features fits well in response to the rapid iteration of Android malware. The traditional solution for detecting Android malware requires continuous learning through pre-extracted features to maintain high performance of identifying the malware. In order to reduce the manpower of feature engineering prior to the condition of not to extract pre-selected features, we have developed a coloR-inspired convolutional neuRal networks (CNN)-based AndroiD malware Detection (R2-D2) system. The system can convert the bytecode of classes.dex from Android archive file to rgb color code and store it as a color image with fixed size. The color image is input to the convolutional neural network for automatic feature extraction and training. The data was collected from Jan. 2017 to Aug 2017. During the period of time, we have collected approximately 2 million of benign and malicious Android apps for our experiments with the help from our research partner Leopard Mobile Inc. Our experiment results demonstrate that the proposed system has accurate security analysis on contracts. Furthermore, we keep our research results and experiment materials on http://R2D2.TWMAN.ORG.Comment: Verison 2018/11/15, IEEE BigData 2018, Seattle, WA, USA, Dec 10-13, 2018. (Accepted
    • …
    corecore