64 research outputs found

    Complexity and Multi-boundary Wormholes

    Full text link
    Three dimensional wormholes are global solutions of Einstein-Hilbert action. These space-times which are quotients of a part of global AdS3_{3} have multiple asymptotic regions, each with conformal boundary S1×RS^{1}\times\mathbb{R}, and separated from each other by horizons. Each outer region is isometric to BTZ black hole, and behind the horizons, there is a complicated topology. The main virtue of these geometries is that they are dual to known CFT states. In this paper, we evaluate the full time dependence of holographic complexity for the simplest case of 2+1 2+1 dimensional Lorentzian wormhole spacetime, which has three asymptotic AdS boundaries, using the complexity equals volume (CV) conjecture. We conclude that the growth of complexity is non-linear and saturates at late times.Comment: 14 pages, 3 figure

    Complexity and Behind the Horizon Cut Off

    Full text link
    Motivated by TTT{\overline T} deformation of a conformal field theory we compute holographic complexity for a black brane solution with a cut off using "complexity=action" proposal. In order to have a late time behavior consistent with Lloyd's bound one is forced to have a cut off behind the horizon whose value is fixed by the boundary cut off. Using this result we compute holographic complexity for two dimensional AdS solutions where we get expected late times linear growth. It is in contrast with the naively computation which is done without assuming the cut off where the complexity approaches a constant at the late time.Comment: 14 pages, 2 figures, refs added, contribution of a counter term is added, minor correction, the final conclusion is not change

    Note on Heisenberg Characters of Heisenberg Groups

    Get PDF
    An irreducible character χ of a group G is called a Heisenberg character, if Kerχ ⊇ [G,[G,G]]. In this paper, the Heisenberg characters of the quaternion Heisenberg, generalized Heisenberg, polarised Heisenberg and threeother types of infinite Heisenberg groups are computed

    Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors

    Get PDF
    Adversarial attacks against deep learning-based object detectors have been studied extensively in the past few years. Most of the attacks proposed have targeted the model's integrity (i.e., caused the model to make incorrect predictions), while adversarial attacks targeting the model's availability, a critical aspect in safety-critical domains such as autonomous driving, have not yet been explored by the machine learning research community. In this paper, we propose a novel attack that negatively affects the decision latency of an end-to-end object detection pipeline. We craft a universal adversarial perturbation (UAP) that targets a widely used technique integrated in many object detector pipelines - non-maximum suppression (NMS). Our experiments demonstrate the proposed UAP's ability to increase the processing time of individual frames by adding "phantom" objects that overload the NMS algorithm while preserving the detection of the original objects which allows the attack to go undetected for a longer period of time

    Modeling and Simulation of NFC Logical Layer Peer-to-Peer Mode using CPN and TA

    Get PDF
    Network communication technologies have been growing explosively due to the increasing demand on faster and simpler communication; hence, providing new communication technologies is a challenging task. To make this task easy, many researchers have developed different network modeling and simulation tools with different characteristics. In this paper, simulation of Near Field Communication (NFC) logical layer control protocol is proposed to investigate efficiency of NFC device in peer-to-peer mode. For this purpose, Colored Petri Net (CPN) and Timed Automata (TA) have been used for analyses. According to the results, CPN was better than TA for simulating NFC logical layer control protocol because it could provide more details on complex communication network.DOI:http://dx.doi.org/10.11591/ijece.v4i2.515

    Molecular modeling studies of novel triazines as potent and selective phosphodiesterase 10A inhibitors using 2D quantitative structure-activity relationship

    Get PDF
    The Two-dimensional Quantitative Structure-activity Relationship (2D-QSAR) of a series of 44 triazine derivatives with antischizophrenia and antihuntingdonâs property has been studied. Multiple Linear Regression (MLR), Principal Component Regression (PCR) and Partial Least Squares (PLS) were used as regression analysis techniques with an attempt to derive a correlation between the biological activity as dependent variable and various descriptors as independent variables. The QSAR studies were performed using VLife MDS software. The models were validated for predictivity by both internal (q2) and external (Pred_r2) validation. Results indicated this is no significant statistical differences between calculated activities of these compounds with laboratory quantities thus, the obtained models allowed us to predict Antischizophrenia and Antihuntingdon activities of new Triazines derivatives

    Small Cell Carcinoma of Bladder; Still A Diagnostic and Therapeutic Challenge: Seven Years of Experience and Follow-up in A Referral Center

    Get PDF
    PURPOSE: To report clinical, histopathological, and treatment features of small cell carcinoma of (SmccB) bladder during 7 years in a referral center. METHODS: The clinical, histopathological features, treatment modalities, and outcome of all patients with bladder SmccB treated between 2009 and 2016 who were managed in Hasheminejad Kidney Center (HKC) were retrospectively collected. RESULTS: Thirteen patients were diagnosed and managed with SmccB. The average age of patients was 64.92 years. For each patient, 8 markers were used for IHC staining on average. Neuroendocrine markers such as CD 56, Neuron Specific Enolase, Synaptophysin, and Chromogranin were found in a significant percentage of patients (69, 38, 54, and 31 respectively). Patients were managed with TURBT alone (N=3), chemotherapy after TURBT (N=4), chemotherapy plus radical surgery (N=4) and radical surgery alone (N=2). The best clinical result was seen in chemotherapy received patients with or without radical surgery. The mean(SE) of survival rate in patients who received only chemotherapy alone was 42.4 (10.0) months, while in those who were managed with chemotherapy plus radical surgery it was 47.7 (10.1) months. CONCLUSION: In our center immunohistochemistry was needed for definitive diagnosis in 17/19 samples. Misdiagnosis happened in two samples without IHC request. We think that use of immunohistochemistry should be mandatory for diagnosis of SmccB to exclude misdiagnosis. Chemotherapy is the most important part of treatment and the addition of radical surgery can slightly improve patients' survival

    Human monkeypox: history, presentations, transmission, epidemiology, diagnosis, treatment, and prevention

    Get PDF
    Human monkeypox is a zoonotic infection that is similar to the diseases caused by other poxviruses. It is endemic among wild rodents in the rainforests of Central and Western Africa, and can be transmitted via direct skin contact or mucosal exposure to infected animals. The initial symptoms include fever, headache, myalgia, fatigue, and lymphadenopathy, the last of which is the main symptom that distinguishes it from smallpox. In order to prevent and manage the disease, those who are infected must be rapidly diagnosed and isolated. Several vaccines have already been developed (e.g., JYNNEOS, ACAM2000 and ACAM3000) and antiviral drugs (e.g., cidofovir and tecovirimat) can also be used to treat the disease. In the present study, we reviewed the history, morphology, clinical presentations, transmission routes, diagnosis, prevention, and potential treatment strategies for monkeypox, in order to enable health authorities and physicians to better deal with this emerging crisis
    corecore