14,075 research outputs found

    Performance Evaluation of Airport Construction Energy-saving based on DEA Network Design and Performance Analysis

    Get PDF
    AbstractFuzzy Data Envelopment Analysis (DEA) evaluation model in Airport Construction Energy-saving have improved incomplete weight deficiency of information processing. Firstly, indices values were converted to trapezoid fuzzy numbers, then with incomplete information on indices weights as constraints, a fuzzy DEA model with outputs only and preference was established, and then by applying the α-cut approach, the model was transformed to a family of crisp DEA models and was solved. Experiments demonstrated the feasibility and applicability of the method

    Complexity growth rates for AdS black holes in massive gravity and f(R)f(R) gravity

    Full text link
    The "complexity = action" duality states that the quantum complexity is equal to the action of the stationary AdS black holes within the Wheeler-DeWitt patch at late time approximation. We compute the action growth rates of the neutral and charged black holes in massive gravity and the neutral, charged and Kerr-Newman black holes in f(R)f(R) gravity to test this conjecture. Besides, we investigate the effects of the massive graviton terms, higher derivative terms and the topology of the black hole horizon on the complexity growth rate.Comment: 11 pages, no figur

    Methods for linear optical quantum Fredkin gate

    Get PDF
    We consider the realization of quantum Fredkin gate with only linear optics and single photons. First we construct a heralded Fredkin gate using four heralded controlled-not (CNOT) gates. Then we simplify this method to a post-selected one utilizing only two CNOT gates. We also give a possible realization of this method which is feasible with current experimental technology. Another post-selected scheme requires time entanglement of the input photons but needs no ancillary photons.Comment: 5 pages, 5 figure

    On determination of the geometric cosmological constant from the OPERA experiment of superluminal neutrinos

    Full text link
    The recent OPERA experiment of superluminal neutrinos has deep consequences in cosmology. In cosmology a fundamental constant is the cosmological constant. From observations one can estimate the effective cosmological constant Λeff\Lambda_{eff} which is the sum of the quantum zero point energy Λdarkenergy\Lambda_{dark energy} and the geometric cosmological constant Λ\Lambda. The OPERA experiment can be applied to determine the geometric cosmological constant Λ\Lambda. It is the first time to distinguish the contributions of Λ\Lambda and Λdarkenergy\Lambda_{dark energy} from each other by experiment. The determination is based on an explanation of the OPERA experiment in the framework of Special Relativity with de Sitter space-time symmetry.Comment: 7 pages, no figure

    The “Competition” for Training Cross Border E-commerce Talents in China on the Background of “Internet Plus”

    Get PDF
    Under the background of “Internet plus,” more and more traditional industries have been integrated into the Internet through information technology. The international trade (foreign trade) industry has constantly been networked, informalized and electrolyzed. Based on the statistical analysis of the current development trend and market demand for cross-border e-commerce talents, this paper attempts to find out the causes of the current multidisciplinary “competition” for cross-border e-commerce talent training, analyze the advantages and disadvantages of this "competition," and put forward the development strategies of multidisciplinary cross-border e-commerce talent training. This study will be of essential reference and significance for applied universities, colleges and higher vocational colleges to adjust the cross-border e-commerce talent training positioning, orientation and professional layout

    MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems

    Full text link
    Speaker Verification (SV) is widely deployed in mobile systems to authenticate legitimate users by using their voice traits. In this work, we propose a backdoor attack MASTERKEY, to compromise the SV models. Different from previous attacks, we focus on a real-world practical setting where the attacker possesses no knowledge of the intended victim. To design MASTERKEY, we investigate the limitation of existing poisoning attacks against unseen targets. Then, we optimize a universal backdoor that is capable of attacking arbitrary targets. Next, we embed the speaker's characteristics and semantics information into the backdoor, making it imperceptible. Finally, we estimate the channel distortion and integrate it into the backdoor. We validate our attack on 6 popular SV models. Specifically, we poison a total of 53 models and use our trigger to attack 16,430 enrolled speakers, composed of 310 target speakers enrolled in 53 poisoned models. Our attack achieves 100% attack success rate with a 15% poison rate. By decreasing the poison rate to 3%, the attack success rate remains around 50%. We validate our attack in 3 real-world scenarios and successfully demonstrate the attack through both over-the-air and over-the-telephony-line scenarios.Comment: Accepted by Mobicom 202
    • …
    corecore