449 research outputs found

    Effective memory of the minority game

    Get PDF
    It is known that the memory is relevant in the symmetric phase of the minority game. In our previous work we have successfully explained the quasi-periodic behavior of the game in the symmetric phase with the help of the probability theory. Based on this explanation, we are able to determine how the memory affects the variance of the system in this paper. By using some particular types of fake history such as periodic type and random type, we determine how efficient the memory has been used in the standard game. Furthermore, the analysis on the effective memory strongly supports the result we proposed previously that there are three distinct phases in the minority game

    Towards a Privacy Rule Conceptual Model for Smart Toys

    Get PDF
    A smart toy is defined as a device consisting of a physical toy component that connects to one or more toy computing services to facilitate gameplay in the cloud through networking and sensory technologies to enhance the functionality of a traditional toy. A smart toy in this context can be effectively considered an Internet of Things (IoT) with Artificial Intelligence (AI) which can provide Augmented Reality (AR) experiences to users. In this paper, the first assumption is that children do not understand the concept of privacy and the children do not know how to protect themselves online, especially in a social media and cloud environment. The second assumption is that children may disclose private information to smart toys and not be aware of the possible consequences and liabilities. This paper presents a privacy rule conceptual model with the concepts of smart toy, mobile service, device, location, and guidance with related privacy entities: purpose, recipient, obligation, and retention for smart toys. Further the paper also discusses an implementation of the prototype interface with sample scenarios for future research works

    Certified Robustness of Quantum Classifiers against Adversarial Examples through Quantum Noise

    Full text link
    Recently, quantum classifiers have been known to be vulnerable to adversarial attacks, where quantum classifiers are fooled by imperceptible noises to have misclassification. In this paper, we propose one first theoretical study that utilizing the added quantum random rotation noise can improve the robustness of quantum classifiers against adversarial attacks. We connect the definition of differential privacy and demonstrate the quantum classifier trained with the natural presence of additive noise is differentially private. Lastly, we derive a certified robustness bound to enable quantum classifiers to defend against adversarial examples supported by experimental results.Comment: Submitted to IEEE ICASSP 202

    InGaN-based light-emitting diodes with an embedded conical air-voids structure

    Get PDF
    The conical air-void structure of an InGaN light-emitting diode (LEDs) was formed at the GaN/sapphire interface to increase the light extraction efficiency. The fabrication process of the conical air-void structure consisted of a dry process and a crystallographic wet etching process on an undoped GaN layer, followed by a re-growth process for the InGaN LED structure. A higher light output power (1.54 times) and a small divergent angle (120o) were observed, at a 20mA operation current, on the treated LED structure when compared to a standard LED without the conical air-void structure. In this electroluminescence spectrum, the emission intensity and the peak wavelength varied periodically by corresponding to the conical air-void patterns that were measured through a 100nm-optical-aperture fiber probe. The conical air-void structure reduced the compressed strain at the GaN/sapphire interface by inducing the wavelength blueshift phenomenon and the higher internal quantum efficiency of the photoluminescence spectra for the treated LED structure

    Genetic and Functional Analysis of the DLG4 Gene Encoding the Post-Synaptic Density Protein 95 in Schizophrenia

    Get PDF
    Hypofunction of N-methyl-D-aspartate (NMDA) receptor-mediated signal transduction has been implicated in the pathophysiology of schizophrenia. Post-synaptic density protein 95 (PSD95) plays a critical role in regulating the trafficking and activity of the NMDA receptor and altered expression of the PSD95 has been detected in the post-mortem brain of patients with schizophrenia. The study aimed to examine whether the DLG4 gene that encodes the PSD95 may confer genetic susceptibility to schizophrenia. We re-sequenced the core promoter, all the exons, and 3′ untranslated regions (UTR) of the DLG4 gene in 588 Taiwanese schizophrenic patients and conducted an association study with 539 non-psychotic subjects. We did not detect any rare mutations at the protein-coding sequences of the DLG4 gene associated with schizophrenia. Nevertheless, we identified four polymorphic markers at the core promoter and 5′ UTR and one single nucleotide polymorphism (SNP) at the 3′UTR of the DLG4 gene in this sample. Genetic analysis showed an association of a haplotype (C–D) derived from 2 polymorphic markers at the core promoter (odds ratio = 1.26, 95% confidence interval = 1.06–1.51, p = 0.01), and a borderline association of the T allele of the rs13331 at 3′UTR with schizophrenia (odds ratio = 1.19, 95% confidence interval = 0.99–1.43, p = 0.06). Further reporter gene assay showed that the C-D-C-C and the T allele of the rs13331 had significant lower activity than their counter parts. Our data indicate that the expression of the DLG4 gene is subject to regulation by the polymorphic markers at the core promoter region, 5′ and 3′UTR of the gene, and is associated with the susceptibility of schizophrenia

    Acquiring Authentic Data in Unattended Wireless Sensor Networks

    Get PDF
    An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunately, few attentions have been given to this authentication problem. Moreover, existing methods suffer from different kinds of DoS attacks such as Path-Based DoS (PDoS) and False Endorsement-based DoS (FEDoS) attacks. In this paper, a scheme, called AAD, is proposed to Acquire Authentic Data in UWSNs. We exploit the collaboration among sensors to address the authentication problem. With the proper design of the collaboration mechanism, AAD has superior resilience against sensor compromises, PDoS attack, and FEDoS attack. In addition, compared with prior works, AAD also has relatively low energy consumption. In particular, according to our simulation, in a network with 1,000 sensors, the energy consumed by AAD is lower than 30% of that consumed by the existing method, ExCo. The analysis and simulation are also conducted to demonstrate the superiority of the proposed AAD scheme over the existing methods

    A crack in the facade? Situating Singapore in global flows of electronic waste

    Get PDF
    Singapore is alleged to be a key node in global flows of e‐waste prohibited under the Basel Convention. We combine a close reading of the Convention and related documents with findings from nonparticipant observation of and interviews with Singapore‐based traders of discarded electronics. The case offers both important conceptual and empirical findings for future studies of territory in market‐making activity. Conceptually, our research suggests that it may be analytically useful in such studies to conceptualize territory without presupposing that it is generated as a result of separate domains or logics such as ‘the political’ or ‘the economic’. Empirically, we find that the regulatory framework of the Convention, combined with the action of traders based in Singapore, generates a territorialization of the city‐state such that it operates as a crack in the regulatory edifice of the Convention, even as Singapore lawfully fulfils its obligations to it. Moreover, allegations premised on the role of Singapore as a facilitator of global e‐waste dumping misrepresent its crucial role as a conduit of electronic equipment for the significant reuse markets elsewhere in Southeast Asia and beyond. The case indicates that the allegations against Singapore hinge on the city‐state being territorialized as a ‘developing country’

    Reduction of Monocyte Chemoattractant Protein-1 and Interleukin-8 Levels by Ticlopidine in TNF-α Stimulated Human Umbilical Vein Endothelial Cells

    Get PDF
    Atherosclerosis and its associated complications represent major causes of morbidity and mortality in the industrialized or Western countries. Monocyte chemoattractant protein-1 (MCP-1) is critical for the initiating and developing of atherosclerotic lesions. Interleukin-8 (IL-8), a CXC chemokine, stimulates neutrophil chemotaxis. Ticlopidine is one of the antiplatelet drugs used to prevent thrombus formation relevant to the pathophysiology of atherothrombosis. In this study, we found that ticlopidine dose-dependently decreased the mRNA and protein levels of TNF-α-stimulated MCP-1, IL-8, and vascular cell adhesion molecule-1 (VCAM-1) in human umbilical vein endothelial cells (HUVECs). Ticlopidine declined U937 cells adhesion and chemotaxis as compared to TNF-α stimulated alone. Furthermore, the inhibitory effects were neither due to decreased HUVEC viability, nor through NF-kB inhibition. These results suggest that ticlopidine decreased TNF-α induced MCP-1, IL-8, and VCAM-1 levels in HUVECs, and monocyte adhesion. Therefore, the data provide additional therapeutic machinery of ticlopidine in treatment and prevention of atherosclerosis
    corecore