4,816 research outputs found

    Development of Computer Vision-Enhanced Smart Golf Ball Retriever

    Get PDF
    An automatic vehicle system was developed to assist golfers in collecting golf balls from a practice field. Computer vision methodology was utilized to enhance the detection of golf balls in shallow and/or deep grass regions. The free software OpenCV was used in this project because of its powerful features and supported repository. The homemade golf ball picker was built with a smart recognition function for golf balls and can lock onto targets by itself. A set of field tests was completed in which the rate of golf ball recognition was as high as 95%. We report that this homemade smart golf ball picker can reduce the tremendous amount of labor associated with having to gather golf balls scattered throughout a practice field

    Miraculous Survival of Three Trapping Miners by Drinking High Mineral Mine Water for 25

    Get PDF
    Little is known that how long a human been can survive a complete starvation. There were dozens of miners who lost their lives in a coal mine disaster at Qinglong,Guizhou,China in June 2009, only three of them were rescued 25 days later after they had been trapped in a coal mine 600 meters underground. They maintained their lives only by drinking mineral water in the mine, which created a miracle of life. We reported here on this life miracle in relation to high mineral mine water

    Modern Tontine with Transaction Costs

    Full text link
    In this paper, we propose a new type of reversible modern tontine with transaction costs. The wealth of the retiree is divided into a bequest account and a tontine account. And consumption can only be withdrawn from the bequest account. Each transaction between the two accounts incurs fixed and proportional transaction costs depending on the transaction volume. The retiree dynamically controls the allocation policy between the two accounts and the consumption policy to maximize the consumption and bequest utilities. We formulate the optimization problem as a combined stochastic and impulse control problem with infinite time horizon, and characterize the value function as the unique viscosity solution of a HJBQVI (Hamilton-Jacobi-Bellmen quasi-variational inequality). The numerical results exhibit the V-shaped transaction region which consists of two stages. In the former stage, since longevity credits increase gradually, the retiree decreases the proportion of wealth in the tontine account to smooth the wealth and reduce the volatility. However, in the latter stage, the retiree increases the proportion of wealth in the tontine account to gamble for the considerable longevity credits

    Device-independent point estimation from finite data and its application to device-independent property estimation

    Full text link
    The device-independent approach to physics is one where conclusions are drawn directly from the observed correlations between measurement outcomes. In quantum information, this approach allows one to make strong statements about the properties of the underlying systems or devices solely via the observation of Bell-inequality-violating correlations. However, since one can only perform a {\em finite number} of experimental trials, statistical fluctuations necessarily accompany any estimation of these correlations. Consequently, an important gap remains between the many theoretical tools developed for the asymptotic scenario and the experimentally obtained raw data. In particular, a physical and concurrently practical way to estimate the underlying quantum distribution has so far remained elusive. Here, we show that the natural analogs of the maximum-likelihood estimation technique and the least-square-error estimation technique in the device-independent context result in point estimates of the true distribution that are physical, unique, computationally tractable and consistent. They thus serve as sound algorithmic tools allowing one to bridge the aforementioned gap. As an application, we demonstrate how such estimates of the underlying quantum distribution can be used to provide, in certain cases, trustworthy estimates of the amount of entanglement present in the measured system. In stark contrast to existing approaches to device-independent parameter estimations, our estimation does not require the prior knowledge of {\em any} Bell inequality tailored for the specific property and the specific distribution of interest.Comment: Essentially published version, but with the typo in Eq. (E5) correcte

    Passive faraday mirror attack in practical two-way quantum key distribution system

    Full text link
    The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly
    • …
    corecore