1,219 research outputs found

    SE-shapelets: Semi-supervised Clustering of Time Series Using Representative Shapelets

    Full text link
    Shapelets that discriminate time series using local features (subsequences) are promising for time series clustering. Existing time series clustering methods may fail to capture representative shapelets because they discover shapelets from a large pool of uninformative subsequences, and thus result in low clustering accuracy. This paper proposes a Semi-supervised Clustering of Time Series Using Representative Shapelets (SE-Shapelets) method, which utilizes a small number of labeled and propagated pseudo-labeled time series to help discover representative shapelets, thereby improving the clustering accuracy. In SE-Shapelets, we propose two techniques to discover representative shapelets for the effective clustering of time series. 1) A \textit{salient subsequence chain} (SSCSSC) that can extract salient subsequences (as candidate shapelets) of a labeled/pseudo-labeled time series, which helps remove massive uninformative subsequences from the pool. 2) A \textit{linear discriminant selection} (LDSLDS) algorithm to identify shapelets that can capture representative local features of time series in different classes, for convenient clustering. Experiments on UCR time series datasets demonstrate that SE-shapelets discovers representative shapelets and achieves higher clustering accuracy than counterpart semi-supervised time series clustering methods

    Computing layouts with deformable templates

    Get PDF
    In this paper, we tackle the problem of tiling a domain with a set of deformable templates. A valid solution to this problem completely covers the domain with templates such that the templates do not overlap. We generalize existing specialized solutions and formulate a general layout problem by modeling important constraints and admissible template deformations. Our main idea is to break the layout algorithm into two steps: a discrete step to lay out the approximate template positions and a continuous step to refine the template shapes. Our approach is suitable for a large class of applications, including floorplans, urban layouts, and arts and design.</jats:p

    Privacy-Preserving Quantum Two-Party Geometric Intersection

    Full text link
    Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and computational geometry. As an important field, the privacy-preserving geometric intersection (PGI) problem is when each of the multiple parties has a private geometric graph and seeks to determine whether their graphs intersect or not without revealing their private information. In this study, through representing Alice's (Bob's) private geometric graph G_A (G_B) as the set of numbered grids S_A (S_B), an efficient privacy-preserving quantum two-party geometric intersection (PQGI) protocol is proposed. In the protocol, the oracle operation O_A (O_B) is firstly utilized to encode the private elements of S_A=(a_0, a_1, ..., a_(M-1)) (S_B=(b_0, b_1, ..., b_(N-1))) into the quantum states, and then the oracle operation O_f is applied to obtain a new quantum state which includes the XOR results between each element of S_A and S_B. Finally, the quantum counting is introduced to get the amount (t) of the states |a_i+b_j> equaling to |0>, and the intersection result can be obtained by judging t>0 or not. Compared with classical PGI protocols, our proposed protocol not only has higher security, but also holds lower communication complexity

    Source attack of decoy-state quantum key distribution using phase information

    Get PDF
    Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security loopholes due to imperfect devices. In fact, practical attacks have successfully been demonstrated. Fortunately, most of them only exploit detection-side loopholes which are now closed by the recent idea of measurement-device-independent QKD. On the other hand, little attention is paid to the source which may still leave QKD systems insecure. In this work, we propose and demonstrate an attack that exploits a source-side loophole existing in qubit-based QKD systems using a weak coherent state source and decoy states. Specifically, by implementing a linear-optics unambiguous-state-discrimination measurement, we show that the security of a system without phase randomization --- which is a step assumed in conventional security analyses but sometimes neglected in practice --- can be compromised. We conclude that implementing phase randomization is essential to the security of decoy-state QKD systems under current security analyses.Comment: 12 pages, 5 figure

    First-principles study of initial oxygen reduction reaction on stoichiometric and reduced CeO2 (111) surfaces as cathode catalyst for lithium-oxygen batteries

    Get PDF
    CeO2 has been explored as an electro-catalyst in the cathode of lithium-oxygen batteries due to its good performance, especially in the initial discharging stage. In order to fully understand its initial oxygen reduction reaction (ORR), in this work, oxygen and lithium adsorptions and initial ORR on the stoichiometric and reduced CeO2 surfaces were systematically investigated using density functional theory (DFT) calculations. Changes of free energy values and structure parameters of the intermediates and precursors of the initial ORR were also studied to identify the possible reaction paths. It was found that the oxygen atoms are preferably adsorbed on the reduced CeO2 surface, whereas the lithium atoms are preferably adsorbed on both stoichiometric and reduced CeO2 surfaces, therefore, there exists a strong adsorption at the site with high oxygen coordinations. The reduced CeO2 with the surface oxygen vacancies was identified as the most critical surface for the initial oxygen reduction reaction. The path with the lithium adsorption as the first step was identified as the most probable one. A Li3O2 precursor was identified as the most possible initial structure of the catalyst to start the discharging process

    Estimation of diameter growth parameters for Cryptomeria Plantations inďż˝ Taiwan Using the Local Yield Table Construction System

    Get PDF
    We applied the Local Yield Table Construction System (LYCS), a computer program that estimates stand growth as a function of various density control strategies, to Cryptomeria plantations in Taiwan. Parameters of the growth model were estimated from permanent plot data on Cryptomeria stands stored in a database at the Experimental Forest of National Taiwan University. The diameter at breast height (DBH) and the number of trees measured in permanent plots were used as parameters to estimate the curve of the DBH growth rate, the effects of stand density on diameter growth, growth in terms of DBH, and diameter distribution. The estimated stand growth could be adapted to the observed values in the permanent plots. Based on these results, yield tables for various stand density control strategies can now be constructed for Cryptomeria stands in Taiwan

    Requirement of transcription factor NFAT in developing atrial myocardium

    Get PDF
    Nuclear factor of activated T cell (NFAT) is a ubiquitous regulator involved in multiple biological processes. Here, we demonstrate that NFAT is temporally required in the developing atrial myocardium between embryonic day 14 and P0 (birth). Inhibition of NFAT activity by conditional expression of dominant-negative NFAT causes thinning of the atrial myocardium. The thin myocardium exhibits severe sarcomere disorganization and reduced expression of cardiac troponin-I (cTnI) and cardiac troponin-T (cTnT). Promoter analysis indicates that NFAT binds to and regulates transcription of the cTnI and the cTnT genes. Thus, regulation of cytoskeletal protein gene expression by NFAT may be important for the structural architecture of the developing atrial myocardium

    High pressure evolution of Fe2_{2}O3_{3} electronic structure revealed by X-ray absorption

    Full text link
    We report the first high pressure measurement of the Fe K-edge in hematite (Fe2_2O3_3) by X-ray absorption spectroscopy in partial fluorescence yield geometry. The pressure-induced evolution of the electronic structure as Fe2_2O3_3 transforms from a high-spin insulator to a low-spin metal is reflected in the x-ray absorption pre-edge. The crystal field splitting energy was found to increase monotonically with pressure up to 48 GPa, above which a series of phase transitions occur. Atomic multiplet, cluster diagonalization, and density-functional calculations were performed to simulate the pre-edge absorption spectra, showing good qualitative agreement with the measurements. The mechanism for the pressure-induced phase transitions of Fe2_2O3_3 is discussed and it is shown that ligand hybridization significantly reduces the critical high-spin/low-spin pressure.Comment: 5 pages, 4 figures and 1 tabl

    Aphid Endosymbiont Facilitates Virus Transmission by Modulating the Volatile Profile of Host Plants

    Get PDF
    BACKGROUND: Most plant viruses rely on vectors for their transmission and spread. One of the outstanding biological questions concerning the vector-pathogen-symbiont multi-trophic interactions is the potential involvement of vector symbionts in the virus transmission process. Here, we used a multi-factorial system containing a non-persistent plant virus, cucumber mosaic virus (CMV), its primary vector, green peach aphid, Myzus persicae, and the obligate endosymbiont, Buchnera aphidicola to explore this uncharted territory. RESULTS: Based on our preliminary research, we hypothesized that aphid endosymbiont B. aphidicola can facilitate CMV transmission by modulating plant volatile profiles. Gene expression analyses demonstrated that CMV infection reduced B. aphidicola abundance in M. persicae, in which lower abundance of B. aphidicola was associated with a preference shift in aphids from infected to healthy plants. Volatile profile analyses confirmed that feeding by aphids with lower B. aphidicola titers reduced the production of attractants, while increased the emission of deterrents. As a result, M. persicae changed their feeding preference from infected to healthy plants. CONCLUSIONS: We conclude that CMV infection reduces the B. aphidicola abundance in M. persicae. When viruliferous aphids feed on host plants, dynamic changes in obligate symbionts lead to a shift in plant volatiles from attraction to avoidance, thereby switching insect vector’s feeding preference from infected to healthy plants
    • …
    corecore