1,605 research outputs found

    The Extended Algebra of the Minimal Models

    Get PDF
    The minimal models M(p',p) with p' > 2 have a unique (non-trivial) simple current of conformal dimension h = (p' - 2) (p - 2) / 4. The representation theory of the extended algebra defined by this simple current is investigated in detail. All highest weight representations are proved to be irreducible: There are thus no singular vectors in the extended theory. This has interesting structural consequences. In particular, it leads to a recursive method for computing the various terms appearing in the operator product expansion of the simple current with itself. The simplest extended models are analysed in detail and the question of equivalence of conformal field theories is carefully examined.Comment: 43 pages, 1 figure. Added reference, clarification to proof of Thm 5.1, and several paragraphs to Sec 3.2 addressing modules corresponding to simple current fixed point

    Quantization and Training of Neural Networks for Efficient Integer-Arithmetic-Only Inference

    Full text link
    The rising popularity of intelligent mobile devices and the daunting computational cost of deep learning-based models call for efficient and accurate on-device inference schemes. We propose a quantization scheme that allows inference to be carried out using integer-only arithmetic, which can be implemented more efficiently than floating point inference on commonly available integer-only hardware. We also co-design a training procedure to preserve end-to-end model accuracy post quantization. As a result, the proposed quantization scheme improves the tradeoff between accuracy and on-device latency. The improvements are significant even on MobileNets, a model family known for run-time efficiency, and are demonstrated in ImageNet classification and COCO detection on popular CPUs.Comment: 14 pages, 12 figure

    Design and Synthesis of Oxazoline-Based Scaffolds for Hybrid Lewis Acid/Lewis Base Catalysis of Carbon–Carbon Bond Formation

    Get PDF
    A new class of hybrid Lewis acid/Lewis base catalysts has been designed and prepared with an initial objective of promoting stereoselective direct aldol reactions. Several scaffolds were synthesized that contain amine moieties capable of enamine catalysis, connected to heterocyclic metal-chelating sections composed of an oxazole–oxazoline or thiazole–oxazoline. Early screening results have identified oxa­zole–oxazoline-based systems capable of promoting a highly diastereo- and enantioselective direct aldol reaction of propionaldehyde with 4-nitrobenzaldehyde, when combined with Lewis acids such as zinc triflate

    Experimental host-and network-based analyser and detector for Botnets

    Get PDF
    Botnets are networks of malware-infected machines that are controlled by an adversary are the cause of a large number of problems on the internet [1]. They are increasing faster than any other type of malware and have created a huge army of hosts over the internet. By coordinating themselves, they are able to initiate attacks of unprecedented scales [2]. An example of such a Botnet can be made in Python code. This Botnet will be able to generate a simple attack which will steal screenshots taken while the user is entering his confidential information on a bank website. The aim of this project is firstly to detect and analyse this Botnet operation and secondly to make statistics of the Intrusion Detection System detection rate.Detecting malicious software in the system is generally made by an antivirus which analyses a files signature and compares it to their own database in order to know if a file is infected or not. Other kinds of detection tools such as Host-based IDS (Intrusion Detection System) can be used: they trigger abnormal activity but in reality, they generate many false positive results. The tool "Process monitor" is able to detect every process used by the system in real time, and another tool "Filewatcher", is able to detect any modification of files on the hard drive. These tools aim to recognize whether a program is acting suspiciously within the computer and this activity should be logged by one of these security tools. However, results from the first experiment revealed that the host-based detection remained unfeasible using these tools because of the multiples of processes which are continuously running inside the system causing many false positive errors.On another hand, the network activity has been monitored in order to detect, using an Intrusion Detection System, the next intrusion or activity of this Botnet on the network. The experiment is going to test the IDS by increasing network activity, and will include attacks to some background traffic generated at different speeds. The aim is to see how the IDS will react to this increasing type of traffic. Results show that the CPU utilisation of the IDS is increasing in function of the network speed. But even if all the attacks have been successfully detected under 80Mb/s, 5% of the packets have been dropped by the IDS and could have contained some malicious activity. This paper concludes that for this experimental setup which uses a 2.0 GHz CPU, to have a secure network with 0% of packet drop by the IDS, the maximum network activity should be of 30Mb/s. Further development in this project could be to experiment with different CPU performances assessing how the IDS will react to an increasing network activity and when it will start dropping packets. It would allow companies to gauge which configuration is needed for their IDS to be totally reliable with 0% dropped packets or semi-reliable with less than 2% dropped packets

    Adjusting the cation and anion nature in ionic liquids used for the growth control of nanoparticles of organic conductors

    Get PDF
    Ionic liquids are used for controlling the growth of organic conductors as nanoparticles. We review the conditions of preparation of nanoparticles of conductors derived from tetrathiafulvalene (TTF), tetramethyltetraselenafulvalene (TMTSF) and bis-ethylenedithiotetrathiafulvalene (BEDT-TTF). They are prepared by electrocrystallization using an ionic liquid supporting electrolyte in which the cation plays the role of growth controller and the anion enters the composition of the expected organic conductor. Stable suspensions of nanoparticles are obtained in one case, a valuable characteristic for potential applications in electronic devices
    • …
    corecore