41 research outputs found

    The Ginger-shaped Asteroid 4179 Toutatis: New Observations from a Successful Flyby of Chang'e-2

    Full text link
    On 13 December 2012, Chang'e-2 conducted a successful flyby of the near-Earth asteroid 4179 Toutatis at a closest distance of 770 ±\pm 120 meters from the asteroid's surface. The highest-resolution image, with a resolution of better than 3 meters, reveals new discoveries on the asteroid, e.g., a giant basin at the big end, a sharply perpendicular silhouette near the neck region, and direct evidence of boulders and regolith, which suggests that Toutatis may bear a rubble-pile structure. Toutatis' maximum physical length and width are (4.75 ×\times 1.95 km) ±\pm10%\%, respectively, and the direction of the +zz axis is estimated to be (250±\pm5∘^\circ, 63±\pm5∘^\circ) with respect to the J2000 ecliptic coordinate system. The bifurcated configuration is indicative of a contact binary origin for Toutatis, which is composed of two lobes (head and body). Chang'e-2 observations have significantly improved our understanding of the characteristics, formation, and evolution of asteroids in general.Comment: 21 pages, 3 figures, 1 tabl

    Securing linked transportation systems: economic implications and investment strategies

    Get PDF
    The security of the transportation system depends on that of any of its components and how they are interlinked. But the securing of each component is oftentimes in the hand of the agency in whose jurisdiction it falls. Literature on reliability and security economics suggests that when security is defined by the weakest link in an interlinked system, then its level is determined by the agent with the highest cost-benefit ratio, and the other agents have the tendency to under-invest or free ride. When security is a function of total effort, then the opposite obtains and the reliability will depend on the agent with the lowest cost-benefit ratio. These conditions arise in urban transportation. This research explores agency investment behavior in multi-agency urban transportation systems develops guidelines for investments in security. The question to answer: is it preferable to let each agency operate its own security budget and make its own investment decisions or is this process better centralized

    Securing linked transportation systems: economic implications and investment strategies

    No full text
    The security of the transportation system depends on that of any of its components and how they are interlinked. But the securing of each component is oftentimes in the hand of the agency in whose jurisdiction it falls. Literature on reliability and security economics suggests that when security is defined by the weakest link in an interlinked system, then its level is determined by the agent with the highest cost-benefit ratio, and the other agents have the tendency to under-invest or free ride. When security is a function of total effort, then the opposite obtains and the reliability will depend on the agent with the lowest cost-benefit ratio. These conditions arise in urban transportation. This research explores agency investment behavior in multi-agency urban transportation systems develops guidelines for investments in security. The question to answer: is it preferable to let each agency operate its own security budget and make its own investment decisions or is this process better centralized?Engineering

    Personalized Cross-Silo Federated Learning on Non-IID Data

    Full text link
    Non-IID data present a tough challenge for federated learning. In this paper, we explore a novel idea of facilitating pairwise collaborations between clients with similar data. We propose FedAMP, a new method employing federated attentive message passing to facilitate similar clients to collaborate more. We establish the convergence of FedAMP for both convex and non-convex models, and propose a heuristic method to further improve the performance of FedAMP when clients adopt deep neural networks as personalized models. Our extensive experiments on benchmark data sets demonstrate the superior performance of the proposed methods.Comment: Accepted by AAAI 2021. The API of this work is available at Huawei Cloud (https://developer.huaweicloud.com/develop/aigallery/notebook/detail?id=6d4a9521-6a4d-4b6d-b84d-943d7c7b1cbd), free registration is required before us
    corecore