8,404 research outputs found

    Behavioral implications of shortlisting procedures

    Get PDF
    We consider two-stage “shortlisting procedures” in which the menu of alternatives is first pruned by some process or criterion and then a binary relation is maximized. Given a particular first-stage process, our main result supplies a necessary and sufficient condition for choice data to be consistent with a procedure in the designated class. This result applies to any class of procedures with a certain lattice structure, including the cases of “consideration filters,” “satisficing with salience effects,” and “rational shortlist methods.” The theory avoids background assumptions made for mathematical convenience; in this and other respects following Richter’s classical analysis of preference-maximizing choice in the absence of shortlisting

    Genetic variation at CHRNA5-CHRNA3-CHRNB4 interacts with smoking status to influence body mass index

    Get PDF
    Cigarette smoking is associated with lower body mass index (BMI), and a commonly cited reason for unwillingness to quit smoking is a concern about weight gain. Common variation in the CHRNA5-CHRNA3-CHRNB4 gene region (chromosome 15q25) is robustly associated with smoking quantity in smokers, but its association with BMI is unknown. We hypothesized that genotype would accurately reflect smoking exposure and that, if smoking were causally related to weight, it would be associated with BMI in smokers, but not in never smokers

    The Search for Invariance: Repeated Positive Testing Serves the Goals of Causal Learning

    Get PDF
    Positive testing is characteristic of exploratory behavior, yet it seems to be at odds with the aim of information seeking. After all, repeated demonstrations of one’s current hypothesis often produce the same evidence and fail to distinguish it from potential alternatives. Research on the development of scientific reasoning and adult rule learning have both documented and attempted to explain this behavior. The current chapter reviews this prior work and introduces a novel theoretical account—the Search for Invariance (SI) hypothesis—which suggests that producing multiple positive examples serves the goals of causal learning. This hypothesis draws on the interventionist framework of causal reasoning, which suggests that causal learners are concerned with the invariance of candidate hypotheses. In a probabilistic and interdependent causal world, our primary goal is to determine whether, and in what contexts, our causal hypotheses provide accurate foundations for inference and intervention—not to disconfirm their alternatives. By recognizing the central role of invariance in causal learning, the phenomenon of positive testing may be reinterpreted as a rational information-seeking strategy

    Quantum resource estimates for computing elliptic curve discrete logarithms

    Get PDF
    We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition, implemented within the framework of the quantum computing software tool suite LIQUiUi|\rangle. We determine circuit implementations for reversible modular arithmetic, including modular addition, multiplication and inversion, as well as reversible elliptic curve point addition. We conclude that elliptic curve discrete logarithms on an elliptic curve defined over an nn-bit prime field can be computed on a quantum computer with at most 9n+2log2(n)+109n + 2\lceil\log_2(n)\rceil+10 qubits using a quantum circuit of at most 448n3log2(n)+4090n3448 n^3 \log_2(n) + 4090 n^3 Toffoli gates. We are able to classically simulate the Toffoli networks corresponding to the controlled elliptic curve point addition as the core piece of Shor's algorithm for the NIST standard curves P-192, P-224, P-256, P-384 and P-521. Our approach allows gate-level comparisons to recent resource estimates for Shor's factoring algorithm. The results also support estimates given earlier by Proos and Zalka and indicate that, for current parameters at comparable classical security levels, the number of qubits required to tackle elliptic curves is less than for attacking RSA, suggesting that indeed ECC is an easier target than RSA.Comment: 24 pages, 2 tables, 11 figures. v2: typos fixed and reference added. ASIACRYPT 201

    Microstructural Characterization of Graphite Spheroids in Ductile Iron

    Get PDF
    The present work brings new insights by transmission electron microscopy allowing disregarding or supporting some of the models proposed for spheroidal growth of graphite in cast irons. Nodules consist of sectors made of graphite plates elongated along a hai direction and stack on each other with their c axis aligned with the radial direction. These plates are the elementary units for spheroidal growth and a calculation supports the idea that new units continuously nucleate at the ledge between sectors

    Seeing two faces together: preference formation in humans and rhesus macaques

    Get PDF
    Humans, great apes and old world monkeys show selective attention to faces depending on conspecificity, familiarity, and social status supporting the view that primates share similar face processing mechanisms. Although many studies have been done on face scanning strategy in monkeys and humans, the mechanisms influencing viewing preference have received little attention. To determine how face categories influence viewing preference in humans and rhesus macaques (Macaca mulatta), we performed two eye-tracking experiments using a visual preference task whereby pairs of faces from different species were presented simultaneously. The results indicated that viewing time was significantly influenced by the pairing of the face categories. Humans showed a strong bias towards an own-race face in an Asian–Caucasian condition. Rhesus macaques directed more attention towards non-human primate faces when they were paired with human faces, regardless of the species. When rhesus faces were paired with faces from Barbary macaques (Macaca sylvanus) or chimpanzees (Pan troglodytes), the novel species’ faces attracted more attention. These results indicate that monkeys’ viewing preferences, as assessed by a visual preference task, are modulated by several factors, species and dominance being the most influential

    The role of Comprehension in Requirements and Implications for Use Case Descriptions

    Get PDF
    Within requirements engineering it is generally accepted that in writing specifications (or indeed any requirements phase document), one attempts to produce an artefact which will be simple to comprehend for the user. That is, whether the document is intended for customers to validate requirements, or engineers to understand what the design must deliver, comprehension is an important goal for the author. Indeed, advice on producing ‘readable’ or ‘understandable’ documents is often included in courses on requirements engineering. However, few researchers, particularly within the software engineering domain, have attempted either to define or to understand the nature of comprehension and it’s implications for guidance on the production of quality requirements. Therefore, this paper examines thoroughly the nature of textual comprehension, drawing heavily from research in discourse process, and suggests some implications for requirements (and other) software documentation. In essence, we find that the guidance on writing requirements, often prevalent within software engineering, may be based upon assumptions which are an oversimplification of the nature of comprehension. Hence, the paper examines guidelines which have been proposed, in this case for use case descriptions, and the extent to which they agree with discourse process theory; before suggesting refinements to the guidelines which attempt to utilise lessons learned from our richer understanding of the underlying discourse process theory. For example, we suggest subtly different sets of writing guidelines for the different tasks of requirements, specification and design

    Pneumococcal carriage in sub-Saharan Africa--a systematic review.

    Get PDF
    BACKGROUND: Pneumococcal epidemiology varies geographically and few data are available from the African continent. We assess pneumococcal carriage from studies conducted in sub-Saharan Africa (sSA) before and after the pneumococcal conjugate vaccine (PCV) era. METHODS: A search for pneumococcal carriage studies published before 2012 was conducted to describe carriage in sSA. The review also describes pneumococcal serotypes and assesses the impact of vaccination on carriage in this region. RESULTS: Fifty-seven studies were included in this review with the majority (40.3%) from South Africa. There was considerable variability in the prevalence of carriage between studies (I-squared statistic = 99%). Carriage was higher in children and decreased with increasing age, 63.2% (95% CI: 55.6-70.8) in children less than 5 years, 42.6% (95% CI: 29.9-55.4) in children 5-15 years and 28.0% (95% CI: 19.0-37.0) in adults older than 15 years. There was no difference in the prevalence of carriage between males and females in 9/11 studies. Serotypes 19F, 6B, 6A, 14 and 23F were the five most common isolates. A meta-analysis of four randomized trials of PCV vaccination in children aged 9-24 months showed that carriage of vaccine type (VT) serotypes decreased with PCV vaccination; however, overall carriage remained the same because of a concomitant increase in non-vaccine type (NVT) serotypes. CONCLUSION: Pneumococcal carriage is generally high in the African continent, particularly in young children. The five most common serotypes in sSA are among the top seven serotypes that cause invasive pneumococcal disease in children globally. These serotypes are covered by the two PCVs recommended for routine childhood immunization by the WHO. The distribution of serotypes found in the nasopharynx is altered by PCV vaccination

    Topologically Protected Quantum State Transfer in a Chiral Spin Liquid

    Get PDF
    Topology plays a central role in ensuring the robustness of a wide variety of physical phenomena. Notable examples range from the robust current carrying edge states associated with the quantum Hall and the quantum spin Hall effects to proposals involving topologically protected quantum memory and quantum logic operations. Here, we propose and analyze a topologically protected channel for the transfer of quantum states between remote quantum nodes. In our approach, state transfer is mediated by the edge mode of a chiral spin liquid. We demonstrate that the proposed method is intrinsically robust to realistic imperfections associated with disorder and decoherence. Possible experimental implementations and applications to the detection and characterization of spin liquid phases are discussed.Comment: 14 pages, 7 figure

    Non-perturbative gauge/gravity correspondence in N=2 theories

    Full text link
    We derive the exact supergravity profile for the twisted scalar field emitted by a system of fractional D3 branes at a Z2 orbifold singularity supporting N=2 quiver gauge theories with unitary groups and bifundamental matter. At the perturbative level this twisted field is "dual" to the gauge coupling but it is corrected non-perturbatively by an infinite tower of fractional D-instantons. The explicit microscopic description allows to derive the gravity profile from disk amplitudes computing the emission rate of the twisted scalar field in terms of chiral correlators in the dual gauge theory. We compute these quantum correlators using multi-instanton localization techniques and/or Seiberg-Witten analysis. Finally, we discuss a non-perturbative relation between the twisted scalar and the effective coupling of the gauge theory for some simple choices of the brane set ups.Comment: 42 pages. 3 figures, PDFLaTe
    corecore