1,407 research outputs found
Quantum Gauss Jordan Elimination
In this paper we construct the Quantum Gau\ss Jordan Elimination (QGJE)
Algorithm and estimate the complexity time of computation of Reduced Row
Echelon Form (RREF) of an matrix using QGJE procedure. The main
theorem asserts that QGJE has computation time of order
Economic impact of climate change on agriculture: a case of Vietnam
Food security, agricultural exports, and livelihoods have improved by rapid agricultural expansion in the previous 30 years. In the coming decades, warming trends and human pressures are expected to exacerbate the impact of climate change on agriculture. A time series of data from 1990 to 2020 examines the economic effects of climate change on Vietnamese farm production. After using the Augmented Dickey-Fuller and Philips-Perron unit root tests, the ARDL bounds testing technique estimates short and long-run cointegration. They found long-run cointegration between the variables. A positive influence of CO2 emissions is identified, although negative impacts of average temperature and rainfall are found. But only in the short term can energy consumption benefit agriculture. Non-climatic factors like crop production and fertiliser consumption have beneficial short- and long-term impacts on agriculture production and yield. Juselius Jhansen As well as proving long-term cointegration between variables. The report advises the Vietnamese government to create and implement many adaptation programmes to preserve the agriculture industry from climate change.Nguyen Van Huong (Faculty of Economics, Hung Yen University of Technology and Education (UTEHY)), Bui Thi Minh Nguyet (Vietnam National University of Forestry), Hoang Van Hung (Faculty of Economics, Hung Yen University of Technology and Education (UTEHY)), Hoang Minh Duc (Faculty of Economics, Hung Yen University of Technology and Education (UTEHY)), Nguyen Van Chuong (University of Financial and Business Administration (UFBA)), Do Minh Tri (Nguyen Van Linh Political School), Phung Van Hien (National Academy of Public Administration (NAPA))Includes bibliographical references
Relationships between activation level, knowledge, self-efficacy, and self-management behavior in heart failure patients discharged from rural hospitals.
Non-adherence to self-management guidelines accounted for 50% of hospital readmissions in heart failure patients. Evidence showed that patient activation affects self-management behaviors in populations living with chronic conditions. The purpose of this study was to describe patient activation level and its relationship with knowledge, self-efficacy and self-management behaviors in heart failure patients discharged from rural hospitals. Our study populations were recruited from two hospitals in rural areas of Nebraska. We found that two-thirds of the participants reported low activation levels (e.g., taking no action to manage their heart failure condition). In addition, low patient activation levels were associated with inadequate heart failure knowledge (p=.005), low self-efficacy (
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogonal multiple access (NOMA) considered in this study. This system model employs Amplify-and-Forward (AF) relaying scheme to serve far users. In this scheme, a transmitter sends confidential signal to far users. It can be raised falling performance in the presence of an external eavesdropper in such NOMA system. With regard to orthogonal multiple access (OMA), performance of NOMA system model is compared. In particular, tradeoff the SPSC performance and transmit SNR is examined. In this study, the SPSC is evaluated as the secrecy metric to limit impacts of the practical passive eavesdropper in real scenario. It is confirmed that the secrecy performance of NOMA is significant lower than OMA due to related parameters characterization in NOMA, and it should be controlled by varying related coefficients. As main results, both of NOMA and OMA against to impact of eavesdropper is studied in terms of analytically result and numerically result
Optical cavity for Raman laser
Our research seeks to employ magnetic and optical fields to form complex many-body quantum states of the spins of ultra-cold neutral atoms. This summer, I worked with an optical cavity as a part Raman laser system to control the quantum states of single cesium atoms. The purpose of this optical cavity research is to stabilize the frequency of light exiting the laser via laser locking and filtering out unwanted sidebands that are byproducts of a phase modulator that generates the Raman tones on the optical field.Oklahoma Louis Stokes Alliance for Minority Participation ProgramNational Science Foundation (U.S.)University of Oklahoma. Summer Undergraduate Research ExperiencePhysic
On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors
Recently, there has been a growing focus and interest in applying machine
learning (ML) to the field of cybersecurity, particularly in malware detection
and prevention. Several research works on malware analysis have been proposed,
offering promising results for both academic and practical applications. In
these works, the use of Generative Adversarial Networks (GANs) or Reinforcement
Learning (RL) can aid malware creators in crafting metamorphic malware that
evades antivirus software. In this study, we propose a mutation system to
counteract ensemble learning-based detectors by combining GANs and an RL model,
overcoming the limitations of the MalGAN model. Our proposed FeaGAN model is
built based on MalGAN by incorporating an RL model called the Deep Q-network
anti-malware Engines Attacking Framework (DQEAF). The RL model addresses three
key challenges in performing adversarial attacks on Windows Portable Executable
malware, including format preservation, executability preservation, and
maliciousness preservation. In the FeaGAN model, ensemble learning is utilized
to enhance the malware detector's evasion ability, with the generated
adversarial patterns. The experimental results demonstrate that 100\% of the
selected mutant samples preserve the format of executable files, while certain
successes in both executability preservation and maliciousness preservation are
achieved, reaching a stable success rate
Real-Space Approach for the Electronic Calculation of Twisted Bilayer Graphene Using the Orthogonal Polynomial Technique
We discuss technical issues involving the implementation of a computational method for the electronic structure of material systems of arbitrary atomic arrangement. The method is based on the analysis of time evolution of electron states in the real lattice space. The Chebyshev polynomials of the first kind are used to approximate the time evolution operator. Â We demonstrate that the developed method is powerful and efficient since the computational scaling law is linear. We invoked the method to study the electronic properties of special twisted bilayer graphene whose atomic structure is quasi-crystalline. We show the density of states of an electron in this graphene system as well as the variation of the associated time auto-correlation function. We find the fluctuation of electron density on the lattice nodes forming a typical pattern closely related to the typical atomic pattern of the quasi-crystalline bilayer graphene configuration
- …