882 research outputs found

    Double Fourier Integral Analysis based Convolutional Neural Network Regression for High-Frequency Energy Disaggregation

    Get PDF
    © 2021 IEEE. This is the accepted manuscript version of an article which has been published in final form at https://doi.org/ 10.1109/TETCI.2021.3086226Non-Intrusive Load Monitoring aims to extract the energy consumption of individual electrical appliances through disaggregation of the total power load measured by a single smart-meter. In this article we introduce Double Fourier Integral Analysis in the Non-Intrusive Load Monitoring task in order to provide more distinct feature descriptions compared to current or voltage spectrograms. Specifically, the high-frequency aggregated current and voltage signals are transformed into two-dimensional unit cells as calculated by Double Fourier Integral Analysis and used as input to a Convolutional Neural Network for regression. The performance of the proposed methodology was evaluated in the publicly available U.K.-DALE dataset. The proposed approach improves the estimation accuracy by 7.2% when compared to the baseline energy disaggregation setup using current and voltage spectrograms.Peer reviewe

    Maternal antibodies from mothers of children with autism alter brain growth and social behavior development in the rhesus monkey.

    Get PDF
    Antibodies directed against fetal brain proteins of 37 and 73 kDa molecular weight are found in approximately 12% of mothers who have children with autism spectrum disorder (ASD), but not in mothers of typically developing children. This finding has raised the possibility that these immunoglobulin G (IgG) class antibodies cross the placenta during pregnancy and impact brain development, leading to one form of ASD. We evaluated the pathogenic potential of these antibodies by using a nonhuman primate model. IgG was isolated from mothers of children with ASD (IgG-ASD) and of typically developing children (IgG-CON). The purified IgG was administered to two groups of female rhesus monkeys (IgG-ASD; n=8 and IgG-CON; n=8) during the first and second trimesters of pregnancy. Another control group of pregnant monkeys (n=8) was untreated. Brain and behavioral development of the offspring were assessed for 2 years. Behavioral differences were first detected when the macaque mothers responded to their IgG-ASD offspring with heightened protectiveness during early development. As they matured, IgG-ASD offspring consistently deviated from species-typical social norms by more frequently approaching familiar peers. The increased approach was not reciprocated and did not lead to sustained social interactions. Even more striking, IgG-ASD offspring displayed inappropriate approach behavior to unfamiliar peers, clearly deviating from normal macaque social behavior. Longitudinal magnetic resonance imaging analyses revealed that male IgG-ASD offspring had enlarged brain volume compared with controls. White matter volume increases appeared to be driving the brain differences in the IgG-ASD offspring and these differences were most pronounced in the frontal lobes

    The Long Term Stability of Oscillations During Thermonuclear X-ray Bursts: Constraining the Binary X-ray Mass Function

    Get PDF
    We report on the long term stability of the millisecond oscillations observed with the Rossi X-ray Timing Explorer (RXTE) during thermonuclear X-ray bursts from the low mass X-ray binaries (LMXB) 4U 1728-34 and 4U 1636-53. We show that bursts from 4U 1728-34 spanning more than 1.5 years have observed asymptotic oscillation periods which are within 0.2 microsec. of each other, well within the magnitude which could be produced by the orbital motion of the neutron star in a typical LMXB. This stability implies a timescale to change the oscillation period of > 23,000 years, suggesting a highly stable process such as stellar rotation as the oscillation mechanism. We show that period offsets in three distinct bursts from 4U 1636-53 can be plausibly interpreted as due to orbital motion of the neutron star in this 3.8 hour binary system. We discuss the constraints on the mass function which can in principle be derived using this technique.Comment: 11 pages, 4 figures. AASTeX, to be published in the Astrophysical Journal Letter

    Decision Procedure for Entailment of Symbolic Heaps with Arrays

    Full text link
    This paper gives a decision procedure for the validity of en- tailment of symbolic heaps in separation logic with Presburger arithmetic and arrays. The correctness of the decision procedure is proved under the condition that sizes of arrays in the succedent are not existentially bound. This condition is independent of the condition proposed by the CADE-2017 paper by Brotherston et al, namely, one of them does not imply the other. For improving efficiency of the decision procedure, some techniques are also presented. The main idea of the decision procedure is a novel translation of an entailment of symbolic heaps into a formula in Presburger arithmetic, and to combine it with an external SMT solver. This paper also gives experimental results by an implementation, which shows that the decision procedure works efficiently enough to use

    Efficiently and Effectively Recognizing Toricity of Steady State Varieties

    No full text
    We consider the problem of testing whether the points in a complex or real variety with non-zero coordinates form a multiplicative group or, more generally, a coset of a multiplicative group. For the coset case, we study the notion of shifted toric varieties which generalizes the notion of toric varieties. This requires a geometric view on the varieties rather than an algebraic view on the ideals. We present algorithms and computations on 129 models from the BioModels repository testing for group and coset structures over both the complex numbers and the real numbers. Our methods over the complex numbers are based on Gr\"obner basis techniques and binomiality tests. Over the real numbers we use first-order characterizations and employ real quantifier elimination. In combination with suitable prime decompositions and restrictions to subspaces it turns out that almost all models show coset structure. Beyond our practical computations, we give upper bounds on the asymptotic worst-case complexity of the corresponding problems by proposing single exponential algorithms that test complex or real varieties for toricity or shifted toricity. In the positive case, these algorithms produce generating binomials. In addition, we propose an asymptotically fast algorithm for testing membership in a binomial variety over the algebraic closure of the rational numbers

    Importance of Verification and Validation of Data Sources in Attaining Information Superiority

    Get PDF
    Information superiority has been defined as a state that is achieved when a competitive advantage is derived from the ability to exploit a superior information position. To achieve such a superior information position enterprises and nations, alike, must not only collect and record correct, accurate, timely and useful information but also ensure that information recorded is not lost to competitors due to lack of comprehensive security and leaks. Further, enterprises that aim to attain information superiority must also ensure mechanisms of validating and verifying information to reduce the chances of mis-information. Although, research has been carried out into ways to increase the security of information and detect leaks, not enough focus has been given to the key elements of information, namely data and context. This paper outlines the importance of data in contributing to information superiority and highlights the lack of data centric approach in attaining information superiority. The paper also discusses the importance of verification and back tracking of information to ascertain the data, its source and context in validating information for its correctness, validity and accuracy. A brief list of consequences of information leaks is also provided in the document to emphasize the importance of information security in the context of data collected. Further, this paper examines the McCumber model, which outlines the various states and elements of information, to accommodate a data centric, quantitative approach. Outlining simple protocols for verification of data in the information superiority context, this paper also highlights a few steps that can be taken to verify the sources of data
    corecore