4,816 research outputs found
Development of Computer Vision-Enhanced Smart Golf Ball Retriever
An automatic vehicle system was developed to assist golfers in collecting golf balls from a practice field. Computer vision methodology was utilized to enhance the detection of golf balls in shallow and/or deep grass regions. The free software OpenCV was used in this project because of its powerful features and supported repository. The homemade golf ball picker was built with a smart recognition function for golf balls and can lock onto targets by itself. A set of field tests was completed in which the rate of golf ball recognition was as high as 95%. We report that this homemade smart golf ball picker can reduce the tremendous amount of labor associated with having to gather golf balls scattered throughout a practice field
Miraculous Survival of Three Trapping Miners by Drinking High Mineral Mine Water for 25
Little is known that how long a human been can survive a complete starvation. There were dozens of miners who lost their lives in a coal mine disaster at Qinglong,Guizhou,China in June 2009, only three of them were rescued 25 days later after they had been trapped in a coal mine 600 meters underground. They maintained their lives only by drinking mineral water in the mine, which created a miracle of life. We reported here on this life miracle in relation to high mineral mine water
Modern Tontine with Transaction Costs
In this paper, we propose a new type of reversible modern tontine with
transaction costs. The wealth of the retiree is divided into a bequest account
and a tontine account. And consumption can only be withdrawn from the bequest
account. Each transaction between the two accounts incurs fixed and
proportional transaction costs depending on the transaction volume. The retiree
dynamically controls the allocation policy between the two accounts and the
consumption policy to maximize the consumption and bequest utilities. We
formulate the optimization problem as a combined stochastic and impulse control
problem with infinite time horizon, and characterize the value function as the
unique viscosity solution of a HJBQVI (Hamilton-Jacobi-Bellmen
quasi-variational inequality). The numerical results exhibit the V-shaped
transaction region which consists of two stages. In the former stage, since
longevity credits increase gradually, the retiree decreases the proportion of
wealth in the tontine account to smooth the wealth and reduce the volatility.
However, in the latter stage, the retiree increases the proportion of wealth in
the tontine account to gamble for the considerable longevity credits
Device-independent point estimation from finite data and its application to device-independent property estimation
The device-independent approach to physics is one where conclusions are drawn
directly from the observed correlations between measurement outcomes. In
quantum information, this approach allows one to make strong statements about
the properties of the underlying systems or devices solely via the observation
of Bell-inequality-violating correlations. However, since one can only perform
a {\em finite number} of experimental trials, statistical fluctuations
necessarily accompany any estimation of these correlations. Consequently, an
important gap remains between the many theoretical tools developed for the
asymptotic scenario and the experimentally obtained raw data. In particular, a
physical and concurrently practical way to estimate the underlying quantum
distribution has so far remained elusive. Here, we show that the natural
analogs of the maximum-likelihood estimation technique and the
least-square-error estimation technique in the device-independent context
result in point estimates of the true distribution that are physical, unique,
computationally tractable and consistent. They thus serve as sound algorithmic
tools allowing one to bridge the aforementioned gap. As an application, we
demonstrate how such estimates of the underlying quantum distribution can be
used to provide, in certain cases, trustworthy estimates of the amount of
entanglement present in the measured system. In stark contrast to existing
approaches to device-independent parameter estimations, our estimation does not
require the prior knowledge of {\em any} Bell inequality tailored for the
specific property and the specific distribution of interest.Comment: Essentially published version, but with the typo in Eq. (E5)
correcte
Passive faraday mirror attack in practical two-way quantum key distribution system
The faraday mirror (FM) plays a very important role in maintaining the
stability of two way plug-and-play quantum key distribution (QKD) system.
However, the practical FM is imperfect, which will not only introduce
additional quantum bit error rate (QBER) but also leave a loophole for Eve to
spy the secret key. In this paper, we propose a passive faraday mirror attack
in two way QKD system based on the imperfection of FM. Our analysis shows that,
if the FM is imperfect, the dimension of Hilbert space spanned by the four
states sent by Alice is three instead of two. Thus Eve can distinguish these
states with a set of POVM operators belonging to three dimension space, which
will reduce the QBER induced by her attack. Furthermore, a relationship between
the degree of the imperfection of FM and the transmittance of the practical QKD
system is obtained. The results show that, the probability that Eve loads her
attack successfully depends on the degree of the imperfection of FM rapidly,
but the QBER induced by Eve's attack changes with the degree of the
imperfection of FM slightly
- …