298 research outputs found

    A Cup of Imperial Taste: The Formation of Ceramic Aesthetics under Emperor Huizong (r. 1100-1126)

    Get PDF
    Ancient Chinese ceramics are objects of appreciation around the world and have been defined as works of art by the art world. My thesis, however, points out that the taken-for-granted idea that ceramics are born to be works of art in ancient China, is, in fact, a constructed interpretation. In the thesis, I ask the question: when and how were ceramics transformed from functional objects into works of art in ancient China? The thesis investigates the change of roles and imperial tastes of ceramics during the Tang-Song transition, and examines the formation of a new aesthetics of ceramics, combining two aesthetic concepts: unadorned naturalness and antiquarianism, under Emperor Huizong of the Northern Song dynasty (960-1127). Ru ware, the imperial ceramics cherished by Huizong, was produced after the new ceramic aesthetics. Through examining the life of Ru ware in relation to Song dynasty literati culture and court rituals, the thesis proposes that Emperor Huizong developed the new ceramic aesthetics through appropriating contemporary literati aesthetics of nature and synthesizing it with his political interest in reviving antiquity. The ceramics aesthetics was established as a powerful cultural discourse rejecting the extravagant lifestyle of the Tang court and emphasizing a return to morality, which also elevated functional ceramics into the realm of art

    Congestion Control in Networks with Dynamic Flows

    Get PDF
    Congestion control in wireline networks has been studied extensively since the seminal work by Mazumdar et al in 1998. It is well known that this global optimization problem can be implemented in a distributed manner. Stability and fairness are two main design objectives of congestion control mechanisms. Most literatures make the assumption that the number of flows is fixed in the network and each flow has infinite backlog for transfer in developing congestion control schemes. However, this assumption may not hold in reality. Thus, there is a need to study congestion control algorithm in the presence of dynamic flows. It is only until recently that short-lived flows have been taken into account. In this thesis, we study utility maximization problems for networks with dynamic flows. In particular, we consider the case where each class of flows arrives according to a Poisson process and has a length given by a certain distribution. The goal is to maximize the long-term expected system utility, which is a function of the number of flows and the rate (identical within a given class) allocated to each flow. Our investigation shows that, as long as the average work brought by the arrival processes is strictly within the network stability region, the fairness and stability issues are independent. While stability can be guaranteed by, for example, a FIFO policy, utility maximization becomes an unconstrained optimization. We also provide a queueing interpretation of this seemingly surprising result and show that not all utility functions make sense under dynamic flows. Finally, we use simulation results to show that our algorithm indeed maximizes the expected system utility

    Recreating the Past: Guwan tu Handscrolls and Practices of Illusionism under Emperor Yongzheng (r. 1723–35)

    Get PDF
    This thesis centres on two Yongzheng period (1723–35) handscrolls entitled Guwan tu 古玩圖 (Pictures of Ancient Playthings) housed in the British Museum and the Victoria and Albert Museum. By reexamining the scrolls not solely as pictorial representations of antiquities, the thesis proposes an alternative approach to the scrolls through reintroducing them as material objects actively engaged with their spatial surroundings and socio-cultural milieus. Resituating them within the context of Qing image-making practices and object consumption, the thesis examines the scrolls’ position in relation to the canons of painting and objects prevailing under Emperor Yongzheng. An iconological-iconographical study focusing on the subject of the scrolls is further conducted in an attempt to reveal the identities of the depicted guwan in relation to extant objects similar in types. Through this study, the thesis presents the classification guidelines embedded in the Guwan tu, while calling attention to the complicated interrelationship between varied art objects attributed to different temporal layers in the history of Chinese material culture. Finally, the thesis delves into the provenience and provenance of the Guwan tu and the depicted objects, proposing the association between the scrolls, the painted guwan, and Yuanmingyuan, the imperial garden complex cherished by Emperor Yongzheng. Through an intensive cross-media investigation of the paintings in juxtaposition with textual and pictorial records of Yuanmingyuan, the thesis aims to elucidate how and why the Guwan tu series, as a painting project, was initiated in conjunction with the vigorous construction projects and practices of illusionism launched by the emperor in the imperial garden

    Effects of active galactic nucleus feedback on cold gas depletion and quenching of central galaxies

    Get PDF
    NSCWe investigate the influence of active galactic nucleus (AGN) feedback on the galaxy cold gas content and its connection to galaxy quenching in three hydrodynamical simulations of Illustris, IllustrisTNG, and SIMBA. By comparing to the observed atomic and molecular neutral hydrogen measurements for central galaxies, we find that Illustris overpredicts the cold gas masses in star-forming galaxies and significantly underpredicts them for quenched galaxies. IllustrisTNG performs better in this comparison than Illustris, but quenched galaxies retain too much cold gas compared with observations. SIMBA shows good agreement with observations, by depleting the global cold gas reservoir for quenched galaxies. We find that the discrepancies in IllustrisTNG are caused by its weak kinetic AGN feedback that only redistributes the cold gas from the inner disks to the outer regions and reduces the inner cold gas densities. It agrees with observations much better when only the cold gas within the stellar disk is considered to infer the star formation rates. From dependences of the cold gas reservoir on the black hole mass and Eddington ratio, we find that the cumulative energy release during the black hole growth is the dominant reason for the cold gas depletion and thus the galaxy quenching. We further measure the central stellar surface density within 1 kpc (ÎŁ1) for the high-resolution run of IllustrisTNG and find a tight correlation between ÎŁ1 and black hole mass. It suggests that the observed decreasing trend of cold gas mass with ÎŁ1 is also a reflection of the black hole growth.N/

    Fake Alignment: Are LLMs Really Aligned Well?

    Full text link
    The growing awareness of safety concerns in large language models (LLMs) has sparked considerable interest in the evaluation of safety within current research endeavors. This study investigates an interesting issue pertaining to the evaluation of LLMs, namely the substantial discrepancy in performance between multiple-choice questions and open-ended questions. Inspired by research on jailbreak attack patterns, we argue this is caused by mismatched generalization. That is, the LLM does not have a comprehensive understanding of the complex concept of safety. Instead, it only remembers what to answer for open-ended safety questions, which makes it unable to solve other forms of safety tests. We refer to this phenomenon as fake alignment and construct a comparative benchmark to empirically verify its existence in LLMs. Such fake alignment renders previous evaluation protocols unreliable. To address this, we introduce the Fake alIgNment Evaluation (FINE) framework and two novel metrics--Consistency Score (CS) and Consistent Safety Score (CSS), which jointly assess two complementary forms of evaluation to quantify fake alignment and obtain corrected performance estimates. Applying FINE to 14 widely-used LLMs reveals several models with purported safety are poorly aligned in practice. Our work highlights potential limitations in prevailing alignment methodologies

    Point-Bind & Point-LLM: Aligning Point Cloud with Multi-modality for 3D Understanding, Generation, and Instruction Following

    Full text link
    We introduce Point-Bind, a 3D multi-modality model aligning point clouds with 2D image, language, audio, and video. Guided by ImageBind, we construct a joint embedding space between 3D and multi-modalities, enabling many promising applications, e.g., any-to-3D generation, 3D embedding arithmetic, and 3D open-world understanding. On top of this, we further present Point-LLM, the first 3D large language model (LLM) following 3D multi-modal instructions. By parameter-efficient fine-tuning techniques, Point-LLM injects the semantics of Point-Bind into pre-trained LLMs, e.g., LLaMA, which requires no 3D instruction data, but exhibits superior 3D and multi-modal question-answering capacity. We hope our work may cast a light on the community for extending 3D point clouds to multi-modality applications. Code is available at https://github.com/ZiyuGuo99/Point-Bind_Point-LLM.Comment: Work in progress. Code is available at https://github.com/ZiyuGuo99/Point-Bind_Point-LL

    Improved Differential Analysis of Block Cipher PRIDE

    Get PDF
    In CRYPTO 2014 Albrecht \emph{et al.} brought in a 20-round iterative lightweight block cipher PRIDE which is based on a good linear layer for achieving a tradeoff between security and efficiency. A recent analysis is presented by Zhao \emph{et al.}. Inspired by their work, we use an automatic search method to find out 56 iterative differential characteristics of PRIDE, containing 24 1-round iterative characteristics, based on three of them we construct a 15-round differential and perform a differential attack on the 19-round PRIDE, with data, time and memory complexity of 2622^{62}, 2632^{63} and 2712^{71} respectively

    Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties

    Get PDF
    In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the differential and linear behavior of a wide range of block ciphers. We point out that the differential behavior of an arbitrary S-box can be exactly described by a small system of linear inequalities. ~~~~~Based on this observation and MILP technique, we propose an automatic method for finding high probability (related-key) differential or linear characteristics of block ciphers. Compared with Sun {\it et al.}\u27s {\it heuristic} method presented in Asiacrypt 2014, the new method is {\it exact} for most ciphers in the sense that every feasible 0-1 solution of the MILP model generated by the new method corresponds to a valid characteristic, and therefore there is no need to repeatedly add valid cutting-off inequalities into the MILP model as is done in Sun {\it et al.}\u27s method; the new method is more powerful which allows us to get the {\it exact lower bounds} of the number of differentially or linearly active S-boxes; and the new method is more efficient which allows to obtain characteristic with higher probability or covering more rounds of a cipher (sometimes with less computational effort). ~~~~~Further, by encoding the probability information of the differentials of an S-boxes into its differential patterns, we present a novel MILP modelling technique which can be used to search for the characteristics with the maximal probability, rather than the characteristics with the smallest number of active S-boxes. With this technique, we are able to get tighter security bounds and find better characteristics. ~~~~~Moreover, by employing a type of specially constructed linear inequalities which can remove {\it exactly one} feasible 0-1 solution from the feasible region of an MILP problem, we propose a method for automatic enumeration of {\it all} (related-key) differential or linear characteristics with some predefined properties, {\it e.g.}, characteristics with given input or/and output difference/mask, or with a limited number of active S-boxes. Such a method is very useful in the automatic (related-key) differential analysis, truncated (related-key) differential analysis, linear hull analysis, and the automatic construction of (related-key) boomerang/rectangle distinguishers. ~~~~~The methods presented in this paper are very simple and straightforward, based on which we implement a Python framework for automatic cryptanalysis, and extensive experiments are performed using this framework. To demonstrate the usefulness of these methods, we apply them to SIMON, PRESENT, Serpent, LBlock, DESL, and we obtain some improved cryptanalytic results
    • …
    corecore