1,562 research outputs found

    UAV-Based Smart Rock Localization for Determination of Bridge Scour Depth

    Get PDF
    First Place Award in recognition of outstanding achievement in the 2020 Annual Meeting Graduate Student Poster Competition sponsored by INSPIRE University Transportation Cente

    Momentum distribution and contacts of one-dimensional spinless Fermi gases with an attractive p-wave interaction

    Get PDF
    We present a rigorous study of momentum distribution and p-wave contacts of one dimensional (1D) spinless Fermi gases with an attractive p-wave interaction. Using the Bethe wave function, we analytically calculate the large-momentum tail of momentum distribution of the model. We show that the leading (∼1/p2\sim 1/p^{2}) and sub-leading terms (∼1/p4\sim 1/p^{4}) of the large-momentum tail are determined by two contacts C2C_2 and C4C_4, which we show, by explicit calculation, are related to the short-distance behaviour of the two-body correlation function and its derivatives. We show as one increases the 1D scattering length, the contact C2C_2 increases monotonically from zero while C4C_4 exhibits a peak for finite scattering length. In addition, we obtain analytic expressions for p-wave contacts at finite temperature from the thermodynamic Bethe ansatz equations in both weakly and strongly attractive regimes.Comment: 19 pages,2 figure

    Object Discovery From a Single Unlabeled Image by Mining Frequent Itemset With Multi-scale Features

    Full text link
    TThe goal of our work is to discover dominant objects in a very general setting where only a single unlabeled image is given. This is far more challenge than typical co-localization or weakly-supervised localization tasks. To tackle this problem, we propose a simple but effective pattern mining-based method, called Object Location Mining (OLM), which exploits the advantages of data mining and feature representation of pre-trained convolutional neural networks (CNNs). Specifically, we first convert the feature maps from a pre-trained CNN model into a set of transactions, and then discovers frequent patterns from transaction database through pattern mining techniques. We observe that those discovered patterns, i.e., co-occurrence highlighted regions, typically hold appearance and spatial consistency. Motivated by this observation, we can easily discover and localize possible objects by merging relevant meaningful patterns. Extensive experiments on a variety of benchmarks demonstrate that OLM achieves competitive localization performance compared with the state-of-the-art methods. We also evaluate our approach compared with unsupervised saliency detection methods and achieves competitive results on seven benchmark datasets. Moreover, we conduct experiments on fine-grained classification to show that our proposed method can locate the entire object and parts accurately, which can benefit to improving the classification results significantly

    Comparative Analysis of Privacy Concerns in Website Register Process between China and Korea

    Get PDF
    Abstract: Personal information privacy is fast becoming one of the most important ethical issues of our information society. Most of Internet users and non-Internet users are concerned about the protection of their privacy information in Internet. This empirical research developed a model based on the Theory of Reasoned Action and Theory of Planning Behavior, which try to address the relationships among protect regulations and differences in concerns for information privacy between China and Korea. This study used structural equation modeling to validate the proposed research model. The result illustrate that the level of concerns for information privacy in Korea is higher than what in China. For Korea, the influence of concern for information privacy is mediated by trust beliefs and administrative regulations. For China, The concern for information privacy of Internet users impacts their risk beliefs and regulation positively, but not affects their trust beliefs. Key words: Privacy information; Website register; SEM modelRésumé: La confidentialité des informations personnels est en entrain de devenir l'une des plus importantes questions éthiques de notre société de l'information. La plupart des utilisateurs d'Internet et non-utilisateurs d'Internet sont préoccupés par la protection de leurs confidentialité des renseignement sur Internet. Cette recherche empirique a développé un modèle basé sur la théorie de l'action raisonnée et la théorie de la planification du comportement, qui tentent d'aborder les relations entre les règlements de protection et leur différences dans la préoccupation sur les informations privées entre la Chine et la Corée. Cette étude a utilisé la modélisation par équation structurelle pour valider le modèle de recherche proposé. Le résultat montre que le niveau de préoccupations pour la protection des renseignements en Corée est plus élevé qu’en Chine. Pour la Corée, l'influence de préoccupation pour la protection des informations personnelles est médiée par les croyances de fiducie et les règlements administratifs. Pour la Chine, le souci de protection des renseignements personnels des utilisateurs d'Internet a un impact de leurs croyances de risques et la réglementation de manière positive, mais ne touche pas leur confiance de croyances. Mots clés: Information sur la confidentialité; S’inscrire au site; Le modèle SE
    • …
    corecore