3,059 research outputs found

    Extraordinary focusing of sound above a soda can array without time reversal

    Get PDF
    Recently, Lemoult et al. [Phys. Rev. Lett. 107, 064301 (2011)] used time reversal to focus sound above an array of soda cans into a spot much smaller than the acoustic wavelength in air. In this study, we show that equally sharp focusing can be achieved without time reversal, by arranging transducers around a nearly circular array of soda cans. The size of the focal spot at the center of the array is made progressively smaller as the frequency approaches the Helmholtz resonance frequency of a can from below, and, near the resonance, becomes smaller than the size of a single can. We show that the locally resonant metamaterial formed by soda cans supports a guided wave at frequencies below the Helmholtz resonance frequency. The small focal spot results from a small wavelength of this guided wave near the resonance in combination with a near field effect making the acoustic field concentrate at the opening of a can. The focusing is achieved with propagating rather than evanescent waves. No sub-diffraction-limited focusing is observed if the diffraction limit is defined with respect to the wavelength of the guided mode in the metamaterial medium rather than the wavelength of the bulk wave in air

    Characterization of Soybean Protein Adhesives Modified by Xanthan Gum

    Get PDF
    The aim of this study was to provide a basis for the preparation of medical adhesives from soybean protein sources. Soybean protein (SP) adhesives mixed with different concentrations of xanthan gum (XG) were prepared. Their adhesive features were evaluated by physicochemical parameters and an in vitro bone adhesion assay. The results showed that the maximal adhesion strength was achieved in 5% SP adhesive with 0.5% XG addition, which was 2.6-fold higher than the SP alone. The addition of XG significantly increased the hydrogen bond and viscosity, as well as increased the β-sheet content but decreased the α-helix content in the second structure of protein. X-ray diffraction data showed significant interactions between SP molecules and XG. Scanning electron microscopy observations showed that the surface of SP adhesive modified by XG was more viscous and compact, which were favorable for the adhesion between the adhesive and bone. In summary, XG modification caused an increase in the hydrogen bonding and zero-shear viscosity of SP adhesives, leading to a significant increase in the bond strength of SP adhesives onto porcine bones

    High-Performance Multi-Mode Ptychography Reconstruction on Distributed GPUs

    Full text link
    Ptychography is an emerging imaging technique that is able to provide wavelength-limited spatial resolution from specimen with extended lateral dimensions. As a scanning microscopy method, a typical two-dimensional image requires a number of data frames. As a diffraction-based imaging technique, the real-space image has to be recovered through iterative reconstruction algorithms. Due to these two inherent aspects, a ptychographic reconstruction is generally a computation-intensive and time-consuming process, which limits the throughput of this method. We report an accelerated version of the multi-mode difference map algorithm for ptychography reconstruction using multiple distributed GPUs. This approach leverages available scientific computing packages in Python, including mpi4py and PyCUDA, with the core computation functions implemented in CUDA C. We find that interestingly even with MPI collective communications, the weak scaling in the number of GPU nodes can still remain nearly constant. Most importantly, for realistic diffraction measurements, we observe a speedup ranging from a factor of 1010 to 10310^3 depending on the data size, which reduces the reconstruction time remarkably from hours to typically about 1 minute and is thus critical for real-time data processing and visualization.Comment: work presented in NYSDS 201

    Lifelong Sequential Modeling with Personalized Memorization for User Response Prediction

    Full text link
    User response prediction, which models the user preference w.r.t. the presented items, plays a key role in online services. With two-decade rapid development, nowadays the cumulated user behavior sequences on mature Internet service platforms have become extremely long since the user's first registration. Each user not only has intrinsic tastes, but also keeps changing her personal interests during lifetime. Hence, it is challenging to handle such lifelong sequential modeling for each individual user. Existing methodologies for sequential modeling are only capable of dealing with relatively recent user behaviors, which leaves huge space for modeling long-term especially lifelong sequential patterns to facilitate user modeling. Moreover, one user's behavior may be accounted for various previous behaviors within her whole online activity history, i.e., long-term dependency with multi-scale sequential patterns. In order to tackle these challenges, in this paper, we propose a Hierarchical Periodic Memory Network for lifelong sequential modeling with personalized memorization of sequential patterns for each user. The model also adopts a hierarchical and periodical updating mechanism to capture multi-scale sequential patterns of user interests while supporting the evolving user behavior logs. The experimental results over three large-scale real-world datasets have demonstrated the advantages of our proposed model with significant improvement in user response prediction performance against the state-of-the-arts.Comment: SIGIR 2019. Reproducible codes and datasets: https://github.com/alimamarankgroup/HPM

    An Empirical Study of Malicious Code In PyPI Ecosystem

    Full text link
    PyPI provides a convenient and accessible package management platform to developers, enabling them to quickly implement specific functions and improve work efficiency. However, the rapid development of the PyPI ecosystem has led to a severe problem of malicious package propagation. Malicious developers disguise malicious packages as normal, posing a significant security risk to end-users. To this end, we conducted an empirical study to understand the characteristics and current state of the malicious code lifecycle in the PyPI ecosystem. We first built an automated data collection framework and collated a multi-source malicious code dataset containing 4,669 malicious package files. We preliminarily classified these malicious code into five categories based on malicious behaviour characteristics. Our research found that over 50% of malicious code exhibits multiple malicious behaviours, with information stealing and command execution being particularly prevalent. In addition, we observed several novel attack vectors and anti-detection techniques. Our analysis revealed that 74.81% of all malicious packages successfully entered end-user projects through source code installation, thereby increasing security risks. A real-world investigation showed that many reported malicious packages persist in PyPI mirror servers globally, with over 72% remaining for an extended period after being discovered. Finally, we sketched a portrait of the malicious code lifecycle in the PyPI ecosystem, effectively reflecting the characteristics of malicious code at different stages. We also present some suggested mitigations to improve the security of the Python open-source ecosystem.Comment: Accepted by the 38th IEEE/ACM International Conference on Automated Software Engineering (ASE2023
    corecore