832 research outputs found
L1 scheme for solving an inverse problem subject to a fractional diffusion equation
This paper considers the temporal discretization of an inverse problem
subject to a time fractional diffusion equation. Firstly, the convergence of
the L1 scheme is established with an arbitrary sectorial operator of spectral
angle , that is the resolvent set of this operator contains for some . The relationship between the time fractional order
and the constants in the error estimates is precisely
characterized, revealing that the L1 scheme is robust as approaches
. Then an inverse problem of a fractional diffusion equation is analyzed,
and the convergence analysis of a temporal discretization of this inverse
problem is given. Finally, numerical results are provided to confirm the
theoretical results
Algorithmic Discrimination in the U.S. Justice System: A Quantitative Assessment of Racial and Gender Bias Encoded in the Data Analytics Model of the Correctional Offender Management Profiling for Alternative Sanctions (COMPAS)
The fourth-generation risk-need assessment instruments such as Correctional Offender Management Profiling for Alternative Sanctions (COMPAS) have opened the opportunities for the use of big data analytics to assist judicial decision-making across the criminal justice system in U.S. While the COMPAS system becomes increasingly popular in supporting correctional professionals’ judgement on an offender’s risk of committing future crime, little research has been published to investigate the potential systematic bias encoded in the algorithms behind these assessment tools that could possibly work against certain ethnic or gender groups. This paper uses two-sample t-test and ordinary least-square regression model to demonstrate that COMPAS algorithms systemically generates a higher risk score for African-American and male offenders in terms of the risk of failure to appear, risk of recidivism, and risk of violence. Although race was explicitly excluded when the COMPAS algorithms were developed, the results showed that such an analytic model still systematically discriminates against African- American offenders. This paper introduced the importance of examining algorithmic fairness in big data analytic applications and offers the methodology as well as tools to investigate systematic bias encoded in machine leaning algorithms. Additionally, the implications of this paper also suggest that simply removing the protected variable in a big data algorithm could not be sufficient to eliminate the systematic bias that can still affect the protected groups, and that further research is needed for solutions to thoroughly address the algorithmic bias in big data analytics
Deep Imaging of the HCG 95 Field.I.Ultra-diffuse Galaxies
We present a detection of 89 candidates of ultra-diffuse galaxies (UDGs) in a
4.9 degree field centered on the Hickson Compact Group 95 (HCG 95) using
deep - and -band images taken with the Chinese Near Object Survey
Telescope. This field contains one rich galaxy cluster (Abell 2588 at
=0.199) and two poor clusters (Pegasus I at =0.013 and Pegasus II at
=0.040). The 89 candidates are likely associated with the two poor clusters,
giving about 50 60 true UDGs with a half-light radius kpc
and a central surface brightness mag arcsec. Deep
'-band images are available for 84 of the 89 galaxies from the Dark Energy
Camera Legacy Survey (DECaLS), confirming that these galaxies have an extremely
low central surface brightness. Moreover, our UDG candidates are spread over a
wide range in color, and 26% are as blue as normal star-forming
galaxies, which is suggestive of young UDGs that are still in formation.
Interestingly, we find that one UDG linked with HCG 95 is a gas-rich galaxy
with H I mass detected by the Very Large Array,
and has a stellar mass of . This
indicates that UDGs at least partially overlap with the population of nearly
dark galaxies found in deep H I surveys. Our results show that the high
abundance of blue UDGs in the HCG 95 field is favored by the environment of
poor galaxy clusters residing in H I-rich large-scale structures.Comment: Published in Ap
The anti-sepsis activity of the components of Huanglian Jiedu Decoction with high lipid A-binding affinity
Huanglian Jiedu Decoction (HJD), one of the classic recipes for relieving toxicity and fever, is a common method for treating sepsis in China. However, the effective components of HJD have not yet been identified. This experiment was carried out to elucidate the effective components of HJD against sepsis. Thus, seven fractions from HJD were tested using a biosensor to test their affinity for lipid A. The components obtained that had high lipid A-binding fractions were further separated, and their affinities to lipid A were assessed with the aid of a biosensor. The levels of LPS in the blood were measured, and pathology experiments were conducted. The LPS levels and mRNA expression analysis of TNF-α and IL-6 of the cell supernatant and animal tissue were evaluated to investigate the molecular mechanisms. Palmatine showed the highest affinity to lipid A and was evaluated by in vitro and in vivo experiments. The results of the in vitro and in vivo experiments indicated that the levels of LPS, TNF-α and IL-6 of the palmatine group were significantly lower than those of the sepsis model group (p \u3c 0.01). The group treated with palmatine showed strong neutralizing LPS activity in vivo. The palmatine group exhibited stronger protective activity on vital organs compared to the LPS-induced animal model. This verifies that HJD is a viable treatment option for sepsis given that there are multiple components in HJD that neutralize LPS, decrease the release of IL-6 and TNF-α induced by LPS, and protect vital organs
A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model
Wireless sensor networks (WSNs) have recently gained popularity for a wide
spectrum of applications. Monitoring tasks can be performed in various
environments. This may be beneficial in many scenarios, but it certainly
exhibits new challenges in terms of security due to increased data
transmission over the wireless channel with potentially unknown threats. Among
possible security issues are timing attacks, which are not prevented by
traditional cryptographic security. Moreover, the limited energy and memory
resources prohibit the use of complex security mechanisms in such systems.
Therefore, balancing between security and the associated energy consumption
becomes a crucial challenge. This paper proposes a secure scheme for WSNs
while maintaining the requirement of the security-performance tradeoff. In
order to proceed to a quantitative treatment of this problem, a hybrid
continuous-time Markov chain (CTMC) and queueing model are put forward, and
the tradeoff analysis of the security and performance attributes is carried
out. By extending and transforming this model, the mean time to security
attributes failure is evaluated. Through tradeoff analysis, we show that our
scheme can enhance the security of WSNs, and the optimal rekeying rate of the
performance and security tradeoff can be obtained. View Full-Tex
Assuring Safety of Vision-Based Swarm Formation Control
Vision-based formation control systems are attractive because they can use
inexpensive sensors and can work in GPS-denied environments. The safety
assurance for such systems is challenging: the vision component's accuracy
depends on the environment in complicated ways, these errors propagate through
the system and lead to incorrect control actions, and there exists no formal
specification for end-to-end reasoning. We address this problem and propose a
technique for safety assurance of vision-based formation control: First, we
propose a scheme for constructing quantizers that are consistent with
vision-based perception. Next, we show how the convergence analysis of a
standard quantized consensus algorithm can be adapted for the constructed
quantizers. We use the recently defined notion of perception contracts to
create error bounds on the actual vision-based perception pipeline using
sampled data from different ground truth states, environments, and weather
conditions. Specifically, we use a quantizer in logarithmic polar coordinates,
and we show that this quantizer is suitable for the constructed perception
contracts for the vision-based position estimation, where the error worsens
with respect to the absolute distance between agents. We build our formation
control algorithm with this nonuniform quantizer, and we prove its convergence
employing an existing result for quantized consensus.Comment: 8 pages, 7 figures, submitted to the 2024 American Control Conference
(ACC 2024
- …