1,562 research outputs found
UAV-Based Smart Rock Localization for Determination of Bridge Scour Depth
First Place Award in recognition of outstanding achievement in the 2020 Annual Meeting Graduate Student Poster Competition sponsored by INSPIRE University Transportation Cente
Momentum distribution and contacts of one-dimensional spinless Fermi gases with an attractive p-wave interaction
We present a rigorous study of momentum distribution and p-wave contacts of
one dimensional (1D) spinless Fermi gases with an attractive p-wave
interaction. Using the Bethe wave function, we analytically calculate the
large-momentum tail of momentum distribution of the model. We show that the
leading () and sub-leading terms () of the
large-momentum tail are determined by two contacts and , which we
show, by explicit calculation, are related to the short-distance behaviour of
the two-body correlation function and its derivatives. We show as one increases
the 1D scattering length, the contact increases monotonically from zero
while exhibits a peak for finite scattering length. In addition, we
obtain analytic expressions for p-wave contacts at finite temperature from the
thermodynamic Bethe ansatz equations in both weakly and strongly attractive
regimes.Comment: 19 pages,2 figure
Object Discovery From a Single Unlabeled Image by Mining Frequent Itemset With Multi-scale Features
TThe goal of our work is to discover dominant objects in a very general
setting where only a single unlabeled image is given. This is far more
challenge than typical co-localization or weakly-supervised localization tasks.
To tackle this problem, we propose a simple but effective pattern mining-based
method, called Object Location Mining (OLM), which exploits the advantages of
data mining and feature representation of pre-trained convolutional neural
networks (CNNs). Specifically, we first convert the feature maps from a
pre-trained CNN model into a set of transactions, and then discovers frequent
patterns from transaction database through pattern mining techniques. We
observe that those discovered patterns, i.e., co-occurrence highlighted
regions, typically hold appearance and spatial consistency. Motivated by this
observation, we can easily discover and localize possible objects by merging
relevant meaningful patterns. Extensive experiments on a variety of benchmarks
demonstrate that OLM achieves competitive localization performance compared
with the state-of-the-art methods. We also evaluate our approach compared with
unsupervised saliency detection methods and achieves competitive results on
seven benchmark datasets. Moreover, we conduct experiments on fine-grained
classification to show that our proposed method can locate the entire object
and parts accurately, which can benefit to improving the classification results
significantly
Comparative Analysis of Privacy Concerns in Website Register Process between China and Korea
Abstract: Personal information privacy is fast becoming one of the most important ethical issues of our information society. Most of Internet users and non-Internet users are concerned about the protection of their privacy information in Internet. This empirical research developed a model based on the Theory of Reasoned Action and Theory of Planning Behavior, which try to address the relationships among protect regulations and differences in concerns for information privacy between China and Korea. This study used structural equation modeling to validate the proposed research model. The result illustrate that the level of concerns for information privacy in Korea is higher than what in China. For Korea, the influence of concern for information privacy is mediated by trust beliefs and administrative regulations. For China, The concern for information privacy of Internet users impacts their risk beliefs and regulation positively, but not affects their trust beliefs. Key words: Privacy information; Website register; SEM modelRésumé: La confidentialité des informations personnels est en entrain de devenir l'une des plus importantes questions éthiques de notre société de l'information. La plupart des utilisateurs d'Internet et non-utilisateurs d'Internet sont préoccupés par la protection de leurs confidentialité des renseignement sur Internet. Cette recherche empirique a développé un modèle basé sur la théorie de l'action raisonnée et la théorie de la planification du comportement, qui tentent d'aborder les relations entre les règlements de protection et leur différences dans la préoccupation sur les informations privées entre la Chine et la Corée. Cette étude a utilisé la modélisation par équation structurelle pour valider le modèle de recherche proposé. Le résultat montre que le niveau de préoccupations pour la protection des renseignements en Corée est plus élevé qu’en Chine. Pour la Corée, l'influence de préoccupation pour la protection des informations personnelles est médiée par les croyances de fiducie et les règlements administratifs. Pour la Chine, le souci de protection des renseignements personnels des utilisateurs d'Internet a un impact de leurs croyances de risques et la réglementation de manière positive, mais ne touche pas leur confiance de croyances. Mots clés: Information sur la confidentialité; S’inscrire au site; Le modèle SE
- …