1,407 research outputs found

    Quantum Gauss Jordan Elimination

    Full text link
    In this paper we construct the Quantum Gau\ss Jordan Elimination (QGJE) Algorithm and estimate the complexity time of computation of Reduced Row Echelon Form (RREF) of an N×NN\times N matrix using QGJE procedure. The main theorem asserts that QGJE has computation time of order 2N/22^{N/2}

    Economic impact of climate change on agriculture: a case of Vietnam

    Get PDF
    Food security, agricultural exports, and livelihoods have improved by rapid agricultural expansion in the previous 30 years. In the coming decades, warming trends and human pressures are expected to exacerbate the impact of climate change on agriculture. A time series of data from 1990 to 2020 examines the economic effects of climate change on Vietnamese farm production. After using the Augmented Dickey-Fuller and Philips-Perron unit root tests, the ARDL bounds testing technique estimates short and long-run cointegration. They found long-run cointegration between the variables. A positive influence of CO2 emissions is identified, although negative impacts of average temperature and rainfall are found. But only in the short term can energy consumption benefit agriculture. Non-climatic factors like crop production and fertiliser consumption have beneficial short- and long-term impacts on agriculture production and yield. Juselius Jhansen As well as proving long-term cointegration between variables. The report advises the Vietnamese government to create and implement many adaptation programmes to preserve the agriculture industry from climate change.Nguyen Van Huong (Faculty of Economics, Hung Yen University of Technology and Education (UTEHY)), Bui Thi Minh Nguyet (Vietnam National University of Forestry), Hoang Van Hung (Faculty of Economics, Hung Yen University of Technology and Education (UTEHY)), Hoang Minh Duc (Faculty of Economics, Hung Yen University of Technology and Education (UTEHY)), Nguyen Van Chuong (University of Financial and Business Administration (UFBA)), Do Minh Tri (Nguyen Van Linh Political School), Phung Van Hien (National Academy of Public Administration (NAPA))Includes bibliographical references

    Relationships between activation level, knowledge, self-efficacy, and self-management behavior in heart failure patients discharged from rural hospitals.

    Get PDF
    Non-adherence to self-management guidelines accounted for 50% of hospital readmissions in heart failure patients. Evidence showed that patient activation affects self-management behaviors in populations living with chronic conditions. The purpose of this study was to describe patient activation level and its relationship with knowledge, self-efficacy and self-management behaviors in heart failure patients discharged from rural hospitals. Our study populations were recruited from two hospitals in rural areas of Nebraska. We found that two-thirds of the participants reported low activation levels (e.g., taking no action to manage their heart failure condition). In addition, low patient activation levels were associated with inadequate heart failure knowledge (p=.005), low self-efficacy (

    Comparison study on secrecy probability of AF-NOMA and AF-OMA networks

    Get PDF
    The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogonal multiple access (NOMA) considered in this study. This system model employs Amplify-and-Forward (AF) relaying scheme to serve far users. In this scheme, a transmitter sends confidential signal to far users. It can be raised falling performance in the presence of an external eavesdropper in such NOMA system. With regard to orthogonal multiple access (OMA), performance of NOMA system model is compared. In particular, tradeoff the SPSC performance and transmit SNR is examined. In this study, the SPSC is evaluated as the secrecy metric to limit impacts of the practical passive eavesdropper in real scenario. It is confirmed that the secrecy performance of NOMA is significant lower than OMA due to related parameters characterization in NOMA, and it should be controlled by varying related coefficients. As main results, both of NOMA and OMA against to impact of eavesdropper is studied in terms of analytically result and numerically result

    Optical cavity for Raman laser

    Get PDF
    Our research seeks to employ magnetic and optical fields to form complex many-body quantum states of the spins of ultra-cold neutral atoms. This summer, I worked with an optical cavity as a part Raman laser system to control the quantum states of single cesium atoms. The purpose of this optical cavity research is to stabilize the frequency of light exiting the laser via laser locking and filtering out unwanted sidebands that are byproducts of a phase modulator that generates the Raman tones on the optical field.Oklahoma Louis Stokes Alliance for Minority Participation ProgramNational Science Foundation (U.S.)University of Oklahoma. Summer Undergraduate Research ExperiencePhysic

    On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors

    Full text link
    Recently, there has been a growing focus and interest in applying machine learning (ML) to the field of cybersecurity, particularly in malware detection and prevention. Several research works on malware analysis have been proposed, offering promising results for both academic and practical applications. In these works, the use of Generative Adversarial Networks (GANs) or Reinforcement Learning (RL) can aid malware creators in crafting metamorphic malware that evades antivirus software. In this study, we propose a mutation system to counteract ensemble learning-based detectors by combining GANs and an RL model, overcoming the limitations of the MalGAN model. Our proposed FeaGAN model is built based on MalGAN by incorporating an RL model called the Deep Q-network anti-malware Engines Attacking Framework (DQEAF). The RL model addresses three key challenges in performing adversarial attacks on Windows Portable Executable malware, including format preservation, executability preservation, and maliciousness preservation. In the FeaGAN model, ensemble learning is utilized to enhance the malware detector's evasion ability, with the generated adversarial patterns. The experimental results demonstrate that 100\% of the selected mutant samples preserve the format of executable files, while certain successes in both executability preservation and maliciousness preservation are achieved, reaching a stable success rate

    Real-Space Approach for the Electronic Calculation of Twisted Bilayer Graphene Using the Orthogonal Polynomial Technique

    Get PDF
    We discuss technical issues involving the implementation of a computational method for the electronic structure of material systems of arbitrary atomic arrangement. The method is based on the analysis of time evolution of electron states in the real lattice space. The Chebyshev polynomials of the first kind are used to approximate the time evolution operator.  We demonstrate that the developed method is powerful and efficient since the computational scaling law is linear. We invoked the method to study the electronic properties of special twisted bilayer graphene whose atomic structure is quasi-crystalline. We show the density of states of an electron in this graphene system as well as the variation of the associated time auto-correlation function. We find the fluctuation of electron density on the lattice nodes forming a typical pattern closely related to the typical atomic pattern of the quasi-crystalline bilayer graphene configuration
    • …
    corecore