429 research outputs found

    Well-posedness of the Fifth Order Kadomtsev-Petviashvili I Equation in Anisotropic Sobolev Spaces with Nonnegative Indices

    Get PDF
    In this paper we establish the local and global well-posedness of the real valued fifth order Kadomstev-Petviashvili I equation in the anisotropic Sobolev spaces with nonnegative indices. In particular, our local well-posedness improves Saut-Tzvetkov's one and our global well-posedness gives an affirmative answer to Saut-Tzvetkov's L2L^2-data conjecture.Comment: 17page

    Synchronous control of dual-channel all-optical multi-state switching

    Full text link
    We have experimentally observed optical multistabilities (OMs) simultaneously on both the signal and generated Stokes fields in an optical ring cavity with a coherently-prepared multilevel atomic medium. The two observed OMs, which are governed by different physical processes, are coupled via the multilevel atomic medium and exhibit similar threshold behaviors. By modulating the cavity input (signal) field with positive or negative pulses, dual-channel all-optical multi-state switching has been realized and synchronously controlled, which can be useful for increasing communication and computation capacities

    On averaging block Kaczmarz methods for solving nonlinear systems of equations

    Full text link
    A class of averaging block nonlinear Kaczmarz methods is developed for the solution of the nonlinear system of equations. The convergence theory of the proposed method is established under suitable assumptions and the upper bounds of the convergence rate for the proposed method with both constant stepsize and adaptive stepsize are derived. Numerical experiments are presented to verify the efficiency of the proposed method, which outperforms the existing nonlinear Kaczmarz methods in terms of the number of iteration steps and computational costs

    On multi-step extended maximum residual Kaczmarz method for solving large inconsistent linear systems

    Full text link
    A multi-step extended maximum residual Kaczmarz method is presented for the solution of the large inconsistent linear system of equations by using the multi-step iterations technique. Theoretical analysis proves the proposed method is convergent and gives an upper bound on its convergence rate. Numerical experiments show that the proposed method is effective and outperforms the existing extended Kaczmarz methods in terms of the number of iteration steps and the computational costs

    Large Magnetoresistance over an Extended Temperature Regime in Monophosphides of Tantalum and Niobium

    Full text link
    We report extremely large magnetoresistance (MR) in an extended temperature regime from 1.5 K to 300 K in non-magnetic binary compounds TaP and NbP. TaP exhibits linear MR around 1.8×1041.8\times 10^4 at 2 K in a magnetic field of 9 Tesla, which further follows its linearity up to 1.4×1051.4\times 10^5 in a magnetic field of 56 Tesla at 1.5 K. At room temperature the MR for TaP and NbP follows a power law of the exponent about 1.51.5 with the values larger than 300%300\% in a magnetic field of 9 Tesla. Such large MR in a wide temperature regime is not likely only due to a resonance of the electron-hole balance, but indicates a complicated mechanism underneath.Comment: 13 pages, 4 figures; submitted in May 20, 2015; accepted for publicatio

    MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems

    Full text link
    Speaker Verification (SV) is widely deployed in mobile systems to authenticate legitimate users by using their voice traits. In this work, we propose a backdoor attack MASTERKEY, to compromise the SV models. Different from previous attacks, we focus on a real-world practical setting where the attacker possesses no knowledge of the intended victim. To design MASTERKEY, we investigate the limitation of existing poisoning attacks against unseen targets. Then, we optimize a universal backdoor that is capable of attacking arbitrary targets. Next, we embed the speaker's characteristics and semantics information into the backdoor, making it imperceptible. Finally, we estimate the channel distortion and integrate it into the backdoor. We validate our attack on 6 popular SV models. Specifically, we poison a total of 53 models and use our trigger to attack 16,430 enrolled speakers, composed of 310 target speakers enrolled in 53 poisoned models. Our attack achieves 100% attack success rate with a 15% poison rate. By decreasing the poison rate to 3%, the attack success rate remains around 50%. We validate our attack in 3 real-world scenarios and successfully demonstrate the attack through both over-the-air and over-the-telephony-line scenarios.Comment: Accepted by Mobicom 202
    corecore