text
stringlengths 231
473k
|
|---|
We argue that the vacuum polarization by the virtual electron-positron pairs
can be measured by studying a Josephson junction in a strong magnetic field.
The vacuum polarization results in a weak dependence of the Josephson constant
on the magnetic field strength which is within the reach of the existing
experimental techniques.
|
Until recently, many of the dozens of quantitative predictions of the
ambipolar-diffusion theory of gravitational fragmentation (or core formation)
of molecular clouds have been confirmed by observations and, just as
importantly, no prediction has been contradicted by any observation. A recent
paper, however, claims that measurements of the variation of the mass-to-flux
ratio from envelopes to cores in four clouds {\it de}creases, in direct
contrast to a prediction of the theory but in agreement with turbulent
fragmentation (in the absence of gravity) and, therefore, the
ambipolar-diffusion theory is invalid (Crutcher et al 2008). The paper treats
magnetic-field nondetections as if they were detections. We show that the
analysis of the data is fundamentally flawed and, moreover, the comparison with
the theoretical prediction ignores major geometrical effects, suggested by the
data themselves if taken at face value. The magnetic fluxes of the envelopes
are also miscalculated. We carry out a proper error analysis and treatment of
the nondetections and we show that the claimed measurement of the variation of
the mass-to-flux ratio from envelopes to cores is not valid, no contradiction
with the ambipolar-diffusion theory can be concluded, and no theory can be
tested on the basis of these data.
|
Regular path queries (RPQs) are an essential component of graph query
languages. Such queries consider a regular expression r and a directed
edge-labeled graph G and search for paths in G for which the sequence of labels
is in the language of r. In order to avoid having to consider infinitely many
paths, some database engines restrict such paths to be trails, that is, they
only consider paths without repeated edges. In this paper we consider the
evaluation problem for RPQs under trail semantics, in the case where the
expression is fixed. We show that, in this setting, there exists a trichotomy.
More precisely, the complexity of RPQ evaluation divides the regular languages
into the finite languages, the class Ttract (for which the problem is
tractable), and the rest. Interestingly, the tractable class in the trichotomy
is larger than for the trichotomy for simple paths, discovered by Bagan,
Bonifati, and Groz [JCSS 2020]. In addition to this trichotomy result, we also
study characterizations of the tractable class, its expressivity, the
recognition problem, closure properties, and show how the decision problem can
be extended to the enumeration problem, which is relevant to practice.
|
In this paper, we focus on solving an important class of nonconvex
optimization problems which includes many problems for example signal
processing over a networked multi-agent system and distributed learning over
networks. Motivated by many applications in which the local objective function
is the sum of smooth but possibly nonconvex part, and non-smooth but convex
part subject to a linear equality constraint, this paper proposes a proximal
zeroth-order primal dual algorithm (PZO-PDA) that accounts for the information
structure of the problem. This algorithm only utilize the zeroth-order
information (i.e., the functional values) of smooth functions, yet the
flexibility is achieved for applications that only noisy information of the
objective function is accessible, where classical methods cannot be applied. We
prove convergence and rate of convergence for PZO-PDA. Numerical experiments
are provided to validate the theoretical results.
|
just before I saw the receipt that said $9768 , I be certain that my friends brother woz like actualy bringing home money part-time from their laptop. . there moms best frend has done this 4 only about 19 months and just now repaid the mortgage on there home and bought a new Dodge . go check this dtrumpview.comᴵᴵᴵᴵᴵᴵᴵᴵᴵᴵᴵᴵᴵᴵᴵᴵ
|
Let $G$ be a digraph and $A(G)$ be the adjacency matrix of $G$. Let $D(G)$ be
the diagonal matrix with outdegrees of vertices of $G$. For any real
$\alpha\in[0,1]$, Liu et al. \cite{LWCL} defined the matrix $A_\alpha(G)$ as
$$A_\alpha(G)=\alpha D(G)+(1-\alpha)A(G).$$ The largest modulus of the
eigenvalues of $A_\alpha(G)$ is called the $A_\alpha$ spectral radius of $G$.
In this paper, we determine the digraphs which attain the maximum (or minimum)
$A_\alpha$ spectral radius among all strongly connected digraphs with given
parameters such as girth, clique number, vertex connectivity or arc
connectivity. We also discuss a number of open problems.
|
Trimmer lasted 3 years and blower not powerful
Trimmer lasted 3 years and blower not great. I wouldn't buy again. Battery also doesn't last long. I do not have a big yard and the battery would be dead after trimming and blowing once. Don't forget to charge after every use if you need it more than 10 minutes!
|
We present a new K-selected, optical-to-near-infrared photometric catalog of
the Extended Chandra Deep Field South (ECDFS), making it publicly available to
the astronomical community. The dataset is founded on publicly available
imaging, supplemented by original zJK imaging data obtained as part of the
MUltiwavelength Survey by Yale-Chile (MUSYC). The final photometric catalog
consists of photometry derived from nine band U-K imaging covering the full
0.5x0.5 sq. deg. of the ECDFS, plus H band data for approximately 80% of the
field. The 5sigma flux limit for point-sources is K = 22.0 (AB). This is also
the nominal completeness and reliability limit of the catalog: the empirical
completeness for 21.75 < K < 22.00 is 85+%. We have verified the quality of the
catalog through both internal consistency checks, and comparisons to other
existing and publicly available catalogs. As well as the photometric catalog,
we also present catalogs of photometric redshifts and restframe photometry
derived from the ten band photometry. We have collected robust spectroscopic
redshift determinations from published sources for 1966 galaxies in the
catalog. Based on these sources, we have achieved a (1sigma) photometric
redshift accuracy of Dz/(1+z) = 0.036, with an outlier fraction of 7.8%. Most
of these outliers are X-ray sources. Finally, we describe and release a utility
for interpolating restframe photometry from observed SEDs, dubbed InterRest.
Particularly in concert with the wealth of already publicly available data in
the ECDFS, this new MUSYC catalog provides an excellent resource for studying
the changing properties of the massive galaxy population at z < 2. (Abridged)
|
Despite the advances in the representational capacity of approximate
distributions for variational inference, the optimization process can still
limit the density that is ultimately learned. We demonstrate the drawbacks of
biasing the true posterior to be unimodal, and introduce Annealed Variational
Objectives (AVO) into the training of hierarchical variational methods.
Inspired by Annealed Importance Sampling, the proposed method facilitates
learning by incorporating energy tempering into the optimization objective. In
our experiments, we demonstrate our method's robustness to deterministic warm
up, and the benefits of encouraging exploration in the latent space.
|
It is well known that orthodox quantum mechanics does not make unambiguous
predictions for the statistics in arrival time (or time-of-flight) experiments.
Bohmian mechanics (or de Broglie-Bohm theory) offers a distinct conceptual
advantage in this regard, owing to the well defined concepts of point particles
and trajectories embedded in this theory. We revisit a recently proposed
experiment [S. Das and D. D\"urr, Sci. Rep. (2019)], the numerical analysis of
which revealed a striking spin dependence in the (Bohmian) time-of-arrival
distributions of a spin-1/2 particle. We present here a mathematically
tractable variant of the same experiment, where the predicted effects can be
established rigorously. We also obtain some new results that can be compared
with experiment.
|
A spectrometer for resonant inelastic X-ray scattering (RIXS) is proposed
where imaging and dispersion actions in two orthogonal planes are combined to
deliver full two-dimensional map of RIXS intensity in one shot with parallel
detection in incoming hvin and outgoing hvout photon energies. Preliminary
ray-tracing simulations with a typical undulator beamline demonstrate a
resolving power well above 11000 in both hvin and hvout near a photon energy of
930 eV, with a vast potential for improvement. Combining such a spectrometer -
nicknamed hv2 - with an XFEL source allows efficient time-resolved RIXS
experiments.
|
The Koopman operator has emerged as a powerful tool for the analysis of
nonlinear dynamical systems as it provides coordinate transformations to
globally linearize the dynamics. While recent deep learning approaches have
been useful in extracting the Koopman operator from a data-driven perspective,
several challenges remain. In this work, we formalize the problem of learning
the continuous-time Koopman operator with deep neural networks in a
measure-theoretic framework. Our approach induces two types of models:
differential and recurrent form, the choice of which depends on the
availability of the governing equations and data. We then enforce a structural
parameterization that renders the realization of the Koopman operator provably
stable. A new autoencoder architecture is constructed, such that only the
residual of the dynamic mode decomposition is learned. Finally, we employ
mean-field variational inference (MFVI) on the aforementioned framework in a
hierarchical Bayesian setting to quantify uncertainties in the characterization
and prediction of the dynamics of observables. The framework is evaluated on a
simple polynomial system, the Duffing oscillator, and an unstable cylinder wake
flow with noisy measurements.
|
Poorly designed hinge.
My rating is based on just one thing and that is the hinge. Mine did not work properly and as time went on (just over a month) you could not open it. In a fit of rage, I ripped it in half like The Hulk throwing a tantrum. A foolish childish move that cost me $90 to vent. I'm just tired of products not performing ad it always seems to be me that gets "that one"
|
You claim you don't care if President Trump is Trustworthy. Yet you are willing to put your "trust" in Donald Trump to right this country as long as it serves your purpose! If Germany, China, etc continue to walk all over us as you say, you don't care as long as anything Trump does serves your purpose, "make my retirement accounts go up"
.
When is it the governments responsibility to make sure you make good investments? Should Donald Trump make the decisions for all of America and not for your specific retirement account.
.
Was it I who said "Saint" "walked all over", "for the last 8 years", Saint Steve.
.
Ditto on the 4th.
|
I really liked this movie, it totally reminds me of my high school days. The soundtrack is awesome. I am a huge nic cage fan and this is my favorite movie that he is in. I love the storyline, it is a total love story, against the odds kind of thing. I think anyone who graduated in the early eighties (1980-1984) should see the movie. It totally brought back memories of high school for me.
|
The local and global thermal phase structure for asymptotically anti-de
Sitter black holes charged under an abelian gauge group, with both Gauss-Bonnet
and quartic field strength corrections, is mapped out for all parameter space.
We work in the grand canonical ensemble where the external electric potential
is held fixed. The analysis is performed in an arbitrary number of dimensions,
for all three possible horizon topologies - spherical, flat or hyperbolic. For
spherical horizons, new metastable configurations are exhibited both for the
pure Gauss-Bonnet theory as well as the pure higher derivative gauge theory and
combinations thereof. In the pure Gauss-Bonnet theory with negative coefficient
and five or more spatial dimensions, two locally thermally stable black hole
solutions are found for a given temperature. Either one or both of them may be
thermally favored over the anti-de Sitter vacuum - corresponding to a single or
a double decay channel for the metastable black hole. Similar metastable
configurations are uncovered for the theory with pure quartic field strength
corrections, as well combinations of the two types of corrections, in three or
more spatial dimensions. Finally, a secondary Hawking-Page transition between
the smaller thermally favored black hole and thermal anti-de Sitter space is
observed when both corrections are turned on and their couplings are both
positive.
|
We analyze the behavior of a Cooper Pair Box (CPB) that is coupled to charge
fluctuators that reside in the dielectric barrier layer in the box's
ultra-small tunnel junction. We derive the Hamiltonian of the combined system
and find the coupling between the CPB and the fluctuators as well as a coupling
between the fluctuators that is due to the CPB. We then find the energy levels
and transition spectrum numerically for the case of a CPB coupled to a single
charge fluctuator, where we treat the fluctuator as a two-level system that
tunnels between two sites. The resulting spectra show the usual transition
spectra of the CPB plus distinctive transitions due to excitation of the
fluctuator; the fluctuator transitions are 2-e periodic and resemble saw-tooth
patterns when plotted as a function of the gate voltage applied to the box. The
combined CPB fluctuator spectra show small second-order avoided crossings with
a size that depends on the gate voltage. Finally, we discuss how the
microscopic parameters of the model, such as the charge times the hopping
distance, the tunneling rate between the hopping sites, and the energy
difference between the hopping sites, can be extracted from CPB spectra, and
why this yields more information than can be found from similar spectra from
phase qubits.
|
1The outbreak of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) led to a global pandemic that disrupted and impacted lives in unprecedented ways. Within less than a year after the beginning of the COVID-19 pandemic, vaccines developed by several research teams were emergency-use authorized and made their way to distribution sites across the US and other countries. COVID-19 vaccines were tested in clinical trials with thousands of participants before authorization, and were administered to over a billion people across the globe in the following 6 months. Post-authorization safety monitoring was performed using pre-existing systems (such as the World Health Organizations platform VigiBase or US Vaccine Adverse Event Reporting System, VAERS) and newly developed post-vaccination health checkers (such as V-safe in the US). Vaccinated individuals were also posting their experiences on multiple social media groups created on Facebook, Reddit, Telegram and other platforms, but the groups were often removed as "proliferating false claims". These forms of reporting are susceptible to biases and misclassifications and do not reach all vaccinated individuals, raising questions about risks of exacerbating health inequalities as well as security and privacy vulnerabilities.
The objective of this paper is to present the protocol for a community-based participatory research approach enabling long-term monitoring of health effects, strengthening community participation via transparent messaging and support, and addressing challenges of transitioning to a new normal.
|
Generative adversarial networks have led to significant advances in
cross-modal/domain translation. However, typically these networks are designed
for a specific task (e.g., dialogue generation or image synthesis, but not
both). We present a unified model, M3D-GAN, that can translate across a wide
range of modalities (e.g., text, image, and speech) and domains (e.g.,
attributes in images or emotions in speech). Our model consists of modality
subnets that convert data from different modalities into unified
representations, and a unified computing body where data from different
modalities share the same network architecture. We introduce a universal
attention module that is jointly trained with the whole network and learns to
encode a large range of domain information into a highly structured latent
space. We use this to control synthesis in novel ways, such as producing
diverse realistic pictures from a sketch or varying the emotion of synthesized
speech. We evaluate our approach on extensive benchmark tasks, including
image-to-image, text-to-image, image captioning, text-to-speech, speech
recognition, and machine translation. Our results show state-of-the-art
performance on some of the tasks.
|
Pretty, but flimsy clasp
Pretty color combinations that are eye catching, but the clasp is VERY flimsy and I'm a little afraid that it'll break with little to no resistance. The overall materials are plastic and up close it's obvious, however not many people are looking that closely at my ankles and I like it regardless :).
|
In this paper we prove several results regarding decidability of the
membership problem for certain submonoids in amalgamated free products and HNN
extensions of groups. These general results are then applied to solve the
prefix membership problem for a number of classes of one-relator groups which
are low in the Magnus-Moldavanski\u{\i} hierarchy. Since the prefix membership
problem for one-relator groups is intimately related to the word problem for
one-relator special inverse monoids in the $E$-unitary case (as discovered in
2001 by Ivanov, Margolis and Meakin), these results yield solutions of the word
problem for several new classes of one-relator special inverse monoids. In
establishing these results, we introduce a new theory of conservative
factorisations of words which provides a link between the prefix membership
problem of a one-relator group and the group of units of the corresponding
one-relator special inverse monoid. Finally, we exhibit the first example of a
one-relator group, defined by a reduced relator word, that has an undecidable
prefix membership problem.
|
I love the writing and I am thrilled for Homer and ...
I love the writing and I am thrilled for Homer and to Gwen for rescuing him. It took a lot of time, patience and love on Gwen's part and trust on Homer's. I just felt that at times the book got off track and rambled on. All in all I am glad I purchased this book and it is a very heartfelt read
|
Water inside a nanocapillary becomes ordered, resulting in unconventional
behavior. A profound enhancement of water flow inside nanometer thin
capillaries made of graphene has been observed [B. Radha et.al., Nature
(London) 538, 222 (2016)]. Here we explain this enhancement as due to the large
density and the extraordinary viscosity of water inside the graphene
nanocapillaries. Using the Hagen-Poiseuille theory with slippage-boundary
condition and incorporating disjoining pressure term in combination with
results from molecular dynamics (MD) simulations, we present an analytical
theory that elucidates the origin of the enhancement of water flow inside
hydrophobic nanocapillaries.
Our work reveals a distinctive dependence of water flow in a nanocapillary on
the structural properties of nanoconfined water in agreement with experiment,
which opens a new avenue in nanofluidics.
|
Electrifying addition to your daily routine!
I had a friend with one of these gloves and I wanted one so badly. So I finally decided to treat myself. I couldn't be happier with that decision. The item shipped quickly, arrived well packaged and had all of the materials I needed to use it right away. Powerful little massage tips with three speeds means that you can create different experiences when working on different areas. If you want to add something new to your routine, you can't go wrong. I would buy it again with no hesitation.
|
Pretty Satisfied!
It is a comfy daily bag which I can bring it to the school, work and gym. This is 90% similar to the product that I was looking for, and I'm glad that I found this one. The only thing that I don't satisfied with is the pockets inside which are too small. Other than that, it is worth spending money!
|
In this work we consider a cosmological model in which dark energy is
portrayed by a canonical scalar field which is allowed to couple to the other
species by means of a disformal transformation of the metric. We revisit the
current literature by assuming that the disformal function in the metric
transformation can depend both on the scalar field itself and on its
derivatives, encapsulating a wide variety of scalar-tensor theories. This
generalisation also leads to new and richer phenomenology, explaining some of
the features found in previously studied models. We present the background
equations and perform a detailed dynamical analysis, from where new disformal
fixed points emerge, that translate into novel cosmological features. These
include early scaling regimes between the coupled species and broader stability
parameter regions. However, viable cosmological models seem to have suppressed
disformal late-time contributions.
|
Well acted drama based on a novel by Arthur Miller. Something as simple as a pair of glasses becomes life altering. Lawrence Newman(William H. Macy)is a man that has chosen to be satisfied with his mundane life; the same job for twenty years and still living with his mother. He is told by his boss to correct his vision with a pair of glasses. Newman's life drastically changes and delves him into hell. The glasses he chose makes him look Jewish. He looses his job and becomes the object of heavy scrutiny by his Brooklyn neighborhood. Searching for a job, he encounters the attractive and outspoken Gertrude(Laura Dern), herself living with conflict because of her Jewish appearance. Soon the couple's new life together becomes a nightmare filled with humiliation and bigotry driven attacks. A very apt cast that features: Joseph Ziegler, Peter Oldring, Kay Hawtrey and of musical fame, Meat Loaf.
|
The construction of invariants of three-dimensional manifolds with a
triangulated boundary, proposed earlier by the author for the case when the
boundary consists of not more than one connected component, is generalized to
any number of components. These invariants are based on the torsion of acyclic
complexes of geometric origin. The relevant tool for studying our invariants
turns out to be F.A. Berezin's calculus of anti-commuting variables; in
particular, they are used in the formulation of the main theorem of the paper,
concerning the composition of invariants under a gluing of manifolds. We show
that the theory obeys a natural modification of M. Atiyah's axioms for
anti-commuting variables.
|
Two gapped quantum ground states in the same phase are connected by an
adiabatic evolution which gives rise to a local unitary transformation that
maps between the states. On the other hand, gapped ground states remain within
the same phase under local unitary transformations. Therefore, local unitary
transformations define an equivalence relation and the equivalence classes are
the universality classes that define the different phases for gapped quantum
systems. Since local unitary transformations can remove local entanglement, the
above equivalence/universality classes correspond to pattern of long range
entanglement, which is the essence of topological order. The local unitary
transformation also allows us to define a wave function renormalization scheme,
under which a wave function can flow to a simpler one within the same
equivalence/universality class. Using such a setup, we find conditions on the
possible fixed-point wave functions where the local unitary transformations
have \emph{finite} dimensions. The solutions of the conditions allow us to
classify this type of topological orders, which generalize the string-net
classification of topological orders. We also describe an algorithm of wave
function renormalization induced by local unitary transformations. The
algorithm allows us to calculate the flow of tensor-product wave functions
which are not at the fixed points. This will allow us to calculate topological
orders as well as symmetry breaking orders in a generic tensor-product state.
|
We probe the phase structure of the regular AdS black holes using the null
geodesics. The radius of photon orbit and minimum impact parameter shows a
non-monotonous behaviour below the critical values of the temperature and the
pressure, corresponding to the phase transition in extended phase space. The
respective differences of the radius of unstable circular orbit and the minimum
impact parameter can be seen as the order parameter for the small-large black
hole phase transition, with a critical exponent $1/2$. Our study shows that
there exists a close relationship between the gravity and thermodynamics for
the regular AdS black holes.
|
You get what you pay for
It does the job, but only just. The pictures do not sit in the frame very snuggly and it is very difficult to hang on a wall. I'll probably end up getting a better, more expensive, frame in the future, but this one will work for now.
|
We investigate heat current fluctuations induced by a periodic train of
Lorentzian-shaped pulses, carrying an integer number of electronic charges, in
a Hong-Ou-Mandel interferometer implemented in a quantum Hall bar in the
Laughlin sequence. We demonstrate that the noise in this collisional experiment
cannot be reproduced in a setup with a single drive, in contrast to what is
observed in the charge noise case. Nevertheless, the simultaneous collision of
two identical levitons always leads to a total suppression even for the
Hong-Ou-Mandel heat noise at all filling factors, despite the presence of
emergent anyonic quasi-particle excitations in the fractional regime.
Interestingly, the strong correlations characterizing the fractional phase are
responsible for a remarkable oscillating pattern in the HOM heat noise, which
is completely absent in the integer case. These oscillations can be related to
the recently predicted crystallization of levitons in the fractional quantum
Hall regime.
|
they are rolled, not flat.
Do not buy these! I just received my order of two of these and they came rolled up into a cylinder shape in an oblong box. they are now concaved and cannot be used and are ruined! Even if these are able to be unrolled by some lucky means, the adhesive will be distorted and cannot lay on the screen perfectly flat! now I have to try to return these terribly packaged junk items.
|
Great machine.......with HUGE Flaw!!!!
I loved this machine. stores very easily, works well. Tested it out for a few minutes when it first arrived. Worked well so I was happy. Also read the researched the company & was very impressed. Then I went to use it on a real project. The unit turns on comes up to pressure & then the motor goes quiet, just as its supposed to. Only if not in use and turned on the motor continuously turns on & off....endlessly. So I have to keep switching it off manually when using it. It will drive you insane!!!!! Maybe I got a defective machine. Guess if the company cares they will replace it.
|
Recent detailed analysis within the Loop Quantum Gravity calculation of black
hole entropy shows a stair-like structure in the behavior of entropy as a
function of horizon area. The non-trivial distribution of the degeneracy of the
black hole horizon area eigenstates is at the origin of this behavior. This
degeneracy distribution is analyzed and a phenomenological model is put forward
to study the implications of this distribution in the black hole radiation
spectrum. Some qualitative quantum effects are obtained within the isolated
horizon framework. This result provides us with a possible observational test
of this model for quantum black holes.
|
We show the existence of global-in-time weak solutions to a general class of
coupled FENE-type bead-spring chain models that arise from the kinetic theory
of dilute solutions of polymeric liquids with noninteracting polymer chains.
The class of models involves the unsteady incompressible Navier-Stokes
equations in a bounded domain in two or three space dimensions for the velocity
and the pressure of the fluid, with an elastic extra-stress tensor appearing on
the right-hand side in the momentum equation. The extra-stress tensor stems
from the random movement of the polymer chains and is defined by the Kramers
expression through the associated probability density function that satisfies a
Fokker-Planck-type parabolic equation, a crucial feature of which is the
presence of a center-of-mass diffusion term. We require no structural
assumptions on the drag term in the Fokker-Planck equation; in particular, the
drag term need not be corotational. With a square-integrable and
divergence-free initial velocity datum for the Navier-Stokes equation and a
nonnegative initial probability density function for the Fokker-Planck
equation, which has finite relative entropy with respect to the Maxwellian of
the model, we prove the existence of a global-in-time weak solution to the
coupled Navier-Stokes-Fokker-Planck system. It is also shown that in the
absence of a body force, the weak solution decays exponentially in time to the
equilibrium solution, at a rate that is independent of the choice of the
initial datum and of the centre-of-mass diffusion coefficient.
|
I guess I was attracted to this film both because of the sound of the story and the leading actor, so I gave it a chance, from director Gregor Jordan (Buffalo Soldiers). Basically Ned Kelly (Heath Ledger) is set up by the police, especially Superintendent Francis Hare (Geoffrey Rush), he is forced to go on the run forming a gang and go against them to clear his own and his family's names. That's really all I can say about the story, as I wasn't paying the fullest attention to be honest. Also starring Orlando Bloom as Joseph Byrne, Naomi Watts as Julia Cook, Laurence Kinlan as Dan Kelly, Philip Barantini as Steve Hart, Joel Edgerton as Aaron Sherritt, Kiri Paramore as Constable Fitzpatrick, Kerry Condon as Kate Kelly, Emily Browning as Grace Kelly and Rachel Griffiths as Susan Scott. Ledger makes a pretty good performance, for what it's worth, and the film does have it's eye-catching moments, particularly with a gun battle towards the end, but I can't say I enjoyed it as I didn't look at it all. Okay!
|
Microlensing light curves are typically computed either by ray-shooting maps
or by contour integration via Green's theorem. We present an improved version
of the second method that includes a parabolic correction in Green's line
integral. In addition, we present an accurate analytical estimate of the
residual errors, which allows the implementation of an optimal strategy for the
contour sampling. Finally, we give a prescription for dealing with
limb-darkened sources reaching arbitrary accuracy. These optimizations lead to
a substantial speed-up of contour integration codes along with a full mastery
of the errors.
|
In this paper, second post-Newtonian approximation of Einstein-aether theory
is obtained by Chandrasekhar's approach. Five parameterized post-Newtonian
parameters in first post-Newtonian approximation are presented after a time
transformation and they are identical with previous works, in which $\gamma=1$,
$\beta=1$ and two preferred-frame parameters remain. Meanwhile, in second
post-Newtonian approximation, a parameter, which represents third order
nonlinearity for gravity, is zero the same as in general relativity. For an
application for future deep space laser ranging missions, we reduce the metric
coefficients for light propagation in a case of $N$ point masses as a
simplified model of the solar system. The resulting light deflection angle in
second post-Newtonian approximation poses another constraint on the
Einstein-aether theory.
|
Enjoyed it
I liked the storyline and the writing. It was well written with very few errors. I liked the story and the character, the pace of the book, the setting. And there were surrounding characters but not overburdened with too much interaction. I will be looking for more of this author's books.
|
BackgroundA rapid increase in incidence of the SARS-CoV-2 Omicron variant occurred in France in December 2021, while the Delta variant was prevailing since July 2021. We aimed to determine whether the risk of a severe hospital event following symptomatic SARS-CoV-2 infection differs for Omicron versus Delta.
MethodsWe conducted a retrospective cohort study to compare severe hospital events (admission to intensive care unit or death) between Omicron and Delta symptomatic cases matched according to week of virological diagnosis and age. The analysis was adjusted for age, sex, vaccination status, presence of comorbidities and region of residence, using Cox proportional hazards model.
FindingsBetween 06/12/2021-28/01/2022, 184 364 cases were included, of which 931 had a severe hospital event (822 Delta, 109 Omicron). The risk of severe event was lower among Omicron versus Delta cases; the difference in severity between the two variants decreased with age (aHR=0{middle dot}11 95%CI: 0{middle dot}07-0{middle dot}17 among 40-64 years, aHR=0{middle dot}51 95%CI: 0{middle dot}26-1{middle dot}01 among 80+ years). The risk of severe event increased with the presence of comorbidities (for very-high-risk comorbidity, aHR=4{middle dot}18 95%CI: 2{middle dot}88-6{middle dot}06 among 40-64 years) and in males (aHR=2{middle dot}29 95%CI: 1{middle dot}83-2{middle dot}86 among 40-64 years) and was higher in unvaccinated compared to primo-vaccinated (aHR=6{middle dot}90 95%CI: 5{middle dot}26-9{middle dot}05 among 40-64 years). A booster dose reduced the risk of severe hospital event in 80+ years infected with Omicron (aHR=0{middle dot}27; 95%CI: 0{middle dot}11-0{middle dot}65).
InterpretationThis study confirms the lower severity of Omicron compared to Delta. However, the difference in disease severity is less marked in the elderly.
|
I generally won't review movies I haven't seen in awhile, so I'll pop them in or rent them to give a full and fresh take on the film. In the case of 'A Sound of Thunder,' I remembered my vow of never seeing this movie ever again, so I'll just go on memory. In fact, I haven't thought of how badly made this movie was until I read someone else's review and remembered the experience I had back in 2005, when I actually saw this in the theater. My movie buddy forced me to see it, though I wasn't interested, and wow. (Later on, I forced him to see 'Basic Instinct 2' in the theater, reminding him he made me see this crap. So, I guess that made us even.) I certainly had my share of deep laughs (at the movie's expense, of course,) which didn't make him happy as he really wanted to see it. The time-travel/butterfly effect film had so many bad graphics, the loudest chuckles from me was whenever they showed the dinosaur (God, I loved seeing that dino and them actually being scared of it it was hilarious!) or just simply, Ben Kingsley. It's great, Kingsley can remind us on how human actors can be: going from 'Gandhi' and 'Schindler's List' to, uh, this. (Even a Meryl Streep can do a 'She-Devil' from time to time, so they're forgiven.) For months, I pulled an MST3k with my buddy, consistently referencing this movie to any low-rent sci-fi film or Kingsley flick. Yes, the movie would be a great movie to see drunk (or otherwise inebriated): horrible over-the-top acting, "special" FX that even the Nintendo64 would turn away and ridiculous plot twists. The biggest disappointment was that the Razzies didn't even nominate this film for any award.
|
A new sufficient condition for a list of real numbers to be the spectrum of a
symmetric doubly stochastic matrix is presented; this is a contribution to the
classical spectral inverse problem for symmetric doubly stochastic matrices
that is still open in its full generality. It is proved that whenever
$\lambda_2, \ldots, \lambda_n$ are non-positive real numbers with $1 +
\lambda_2 + \ldots + \lambda_n \geqslant 1/2$, then there exists a symmetric,
doubly stochastic matrix whose spectrum is precisely $(1, \lambda_2, \ldots,
\lambda_n)$. We point out that this criterion is incomparable to the classical
sufficient conditions due to Perfect-Mirsky, Soules, and their modern
refinements due to Nader et al. We also provide some examples and applications
of our results.
|
Automated Program Repair (APR) is an emerging research field. Many APR
techniques, for different programming language and platforms, have been
proposed and evaluated on several Benchmarks. However, for our best knowledge,
there not exists a well-defined benchmark based on mobile projects,
consequently, there is a gap to leverage APR methods for mobile development.
Therefore, regarding the amount of Android Applications around the world, we
present DroidBugs, an introductory benchmark based on the analyzes of 360 open
projects for Android, each of them with more than 5,000 downloads. From five
applications, DroidBugs contains 13 single-bugs classified by the type of test
that exposed them. By using an APR tool, called Astor4Android, and two common
Fault Localization strategy, it was observed how challenging is to find and fix
mobile bugs.
|
We investigate superfluid phase transitions of asymmetric nuclear matter at
finite temperature ($T$) and density ($\rho$) with a low proton fraction
($Y_{\rm p} \le 0.2$) which is relevant to the inner crust and outer core of
neutron stars. A strong-coupling theory developed for two-component atomic
Fermi gases is generalized to the four-component case and is applied to the
system of spin-$1/2$ neutrons and protons. The empirical phase shifts of
neutron-neutron (nn), proton-proton (pp) and neutron-proton (np) interactions
up to $k = 2$ ${\rm fm}^{-1}$ are described by multi-rank separable potentials.
We show that (i) the critical temperature of the neutron superfluidity $T_{\rm
c}^{\rm nn}$ at $Y_{\rm p}=0$ agrees well with Monte Carlo data at low
densities and takes a maximum value $T_{\rm c}^{\rm nn}=1.68$ MeV at
$\rho/\rho_0 = 0.14$ with $\rho_0=0.17$ fm$^{-3}$, (ii) the critical
temperature of the proton superconductivity $T_{\rm c}^{\rm pp}$ for $Y_{\rm p}
\le 0.2$ is substantially suppressed at low densities due to np-pairing
fluctuations and starts to dominate over $T_{\rm c}^{\rm nn}$ only above
$\rho/\rho_0 = 0.70$ $(0.77)$ for $Y_p =0.1$ $(0.2)$, and (iii) the deuteron
condensation temperature $T_{\rm c}^{\rm d}$ is suppressed at $Y_{\rm p}\le
0.2$ due to the large mismatch of the two Fermi surfaces.
|
We study a non-Hermitian $PT-$symmetric generalization of an $N$-particle,
two-mode Bose-Hubbard system, modeling for example a Bose-Einstein condensate
in a double well potential coupled to a continuum via a sink in one of the
wells and a source in the other. The effect of the interplay between the
particle interaction and the non-Hermiticity on characteristic features of the
spectrum is analyzed drawing special attention to the occurrence and unfolding
of exceptional points (EPs). We find that for vanishing particle interaction
there are only two EPs of order $N+1$ which under perturbation unfold either
into $[(N+1)/2]$ eigenvalue pairs (and in case of $N+1$ odd, into an additional
zero-eigenvalue) or into eigenvalue triplets (third-order eigenvalue rings) and
$(N+1)\mod 3$ single eigenvalues, depending on the direction of the
perturbation in parameter space. This behavior is described analytically using
perturbational techniques. More general EP unfoldings into eigenvalue rings up
to $(N+1)$th order are indicated.
|
We observed the recently predicted quantum suppression of dynamical Coulomb
blockade on short coherent conductors by measuring the conductance of a quantum
point contact embedded in a tunable on-chip circuit. Taking advantage of the
circuit modularity we measured most parameters used by the theory. This allowed
us to perform a reliable and quantitative experimental test of the theory.
Dynamical Coulomb blockade corrections, probed up to the second conductance
plateau of the quantum point contact, are found to be accurately normalized by
the same Fano factor as quantum shot noise, in excellent agreement with the
theoretical predictions.
|
Information security awareness (ISA) is a practice focused on the set of
skills, which help a user successfully mitigate a social engineering attack.
Previous studies have presented various methods for evaluating the ISA of both
PC and mobile users. These methods rely primarily on subjective data sources
such as interviews, surveys, and questionnaires that are influenced by human
interpretation and sincerity. Furthermore, previous methods for evaluating ISA
did not address the differences between classes of social engineering attacks.
In this paper, we present a novel framework designed for evaluating the ISA of
smartphone users to specific social engineering attack classes. In addition to
questionnaires, the proposed framework utilizes objective data sources: a
mobile agent and a network traffic monitor; both of which are used to analyze
the actual behavior of users. We empirically evaluated the ISA scores assessed
from the three data sources (namely, the questionnaires, mobile agent, and
network traffic monitor) by conducting a long-term user study involving 162
smartphone users. All participants were exposed to four different security
challenges that resemble real-life social engineering attacks. These challenges
were used to assess the ability of the proposed framework to derive a relevant
ISA score. The results of our experiment show that: (1) the self-reported
behavior of the users differs significantly from their actual behavior; and (2)
ISA scores derived from data collected by the mobile agent or the network
traffic monitor are highly correlated with the users' success in mitigating
social engineering attacks.
|
Murray's theory of constrained minimum-power branchings is critically
reviewed in a generalised framework for a range of cases: channels with
arbitrary cross-section shape, laminar flows of Newtonian and non-Newtonian
fluids, and low and high Reynolds-number turbulent flows of Newtonian fluids.
The theory states that the sum of hydraulic and metabolic power is minimised if
and only if all channels satisfy the same relation between flow rate and
effective radius. This relation leads to a generalised form of Murray's law. It
is shown that, satisfying Murray's law is a necessary requirement for power
minimisation, but not a sufficient requirement. The generalisation of Kamiya &
Togawa's law that holds for minimum-volume branchings, also holds for
minimum-power branchings. It is a necessary requirement but not a sufficient
requirement for both minimum-power and minimum-volume branchings. For symmetric
branchings the two generalised laws of Murray and Kamiya & Togawa become
identical.
|
This is basically the text of a survey talk (entitled 'Painleve, Klein and
the icosahedron') given at Hitchin's 60th birthday conference. It discusses the
search for and construction of algebraic solutions of the sixth Painleve
differential equation, which may be viewed as a nonlinear analogue of the Gauss
hypergeometric equation. Both algebraic and transcendental methods are used and
the story involves affine Weyl groups, braid groups and cubic surfaces. Some
emphasis is given to the interpretation of the sixth Painleve equation as the
explicit form of the simplest nonabelian Gauss-Manin connection, i.e. as a
nonlinear differential equation 'coming from geometry', much as Picard-Fuchs
equations arise in the case of cohomology with abelian coefficients.
|
Model-agnostic meta-learners aim to acquire meta-learned parameters from
similar tasks to adapt to novel tasks from the same distribution with few
gradient updates. With the flexibility in the choice of models, those
frameworks demonstrate appealing performance on a variety of domains such as
few-shot image classification and reinforcement learning. However, one
important limitation of such frameworks is that they seek a common
initialization shared across the entire task distribution, substantially
limiting the diversity of the task distributions that they are able to learn
from. In this paper, we augment MAML with the capability to identify the mode
of tasks sampled from a multimodal task distribution and adapt quickly through
gradient updates. Specifically, we propose a multimodal MAML (MMAML) framework,
which is able to modulate its meta-learned prior parameters according to the
identified mode, allowing more efficient fast adaptation. We evaluate the
proposed model on a diverse set of few-shot learning tasks, including
regression, image classification, and reinforcement learning. The results not
only demonstrate the effectiveness of our model in modulating the meta-learned
prior in response to the characteristics of tasks but also show that training
on a multimodal distribution can produce an improvement over unimodal training.
|
We present a system to help designers create icons that are widely used in
banners, signboards, billboards, homepages, and mobile apps. Designers are
tasked with drawing contours, whereas our system colorizes contours in
different styles. This goal is achieved by training a dual conditional
generative adversarial network (GAN) on our collected icon dataset. One
condition requires the generated image and the drawn contour to possess a
similar contour, while the other anticipates the image and the referenced icon
to be similar in color style. Accordingly, the generator takes a contour image
and a man-made icon image to colorize the contour, and then the discriminators
determine whether the result fulfills the two conditions. The trained network
is able to colorize icons demanded by designers and greatly reduces their
workload. For the evaluation, we compared our dual conditional GAN to several
state-of-the-art techniques. Experiment results demonstrate that our network is
over the previous networks. Finally, we will provide the source code, icon
dataset, and trained network for public use.
|
Making use of generalized Eliashberg equations, we describe the
Altshuler-Aronov (AA) effect and superconductivity on equal footing. We derive
explicit expressions for the Coulomb pseudopotential in 3D, taking into account
also the anomalous diffusion. We present a full numerical solution for two
normal-state and two anomalous self-energies. In the normal state, we amend the
known results for the purely electronic AA effect; with electron-phonon
coupling turned on, we find additional anomalies in the density of states close
to the phonon energy. We study how the critical temperature and density of
states of strongly disordered 3D superconductors change with normal-state
resistivity. We find that the type of transition from the superconducting to
the insulating state depends on the strength of electron-phonon coupling: at
weak coupling there exists an intermediate normal state, whereas at strong
coupling the transition is direct.
|
Decent Compression Sleeve for Achilles Tendonitis
I used this sleeve to give me support for my achilles tendonitis when I play basketball. I usually use KT tape and wear Nike elite socks which gives me a decent amount of support, but the sleeve was a good addition. Then compression was not as tight as I expected especially since I wore the sleeve over my socks. If it was a little bit tighter I would have given it 4 stars but it wasn't too bulky and I had decent range of movement with it on.
|
The case was fine it was supposed to come with a Stylo pen ...
The case was fine it was supposed to come with a Stylo pen and it wasn't in the package. Amazon refunded me and let me keep the case which was nice but I was kind of irresponsible of the third party to not make sure everything was in the package
|
We propose a new heuristic algorithm for solving random subset sum instances
$a_1, \ldots, a_n, t \in \mathbb{Z}_{2^n}$, which play a crucial role in
cryptographic constructions. Our algorithm is search tree-based and solves the
instances in a divide-and-conquer method using the representation method. From
a high level perspective, our algorithm is similar to the algorithm of
Howgrave-Graham-Joux (HGJ) and Becker-Coron-Joux (BCJ), but instead of
enumerating the initial lists we sample candidate solutions. So whereas HGJ and
BCJ are based on combinatorics, our analysis is stochastic. Our sampling
technique introduces variance that increases the amount of representations and
gives our algorithm more optimization flexibility. This results in the
remarkable and natural property that we improve with increasing search tree
depth.
Whereas BCJ achieves the currently best known (heuristic) run time
$2^{0.291n}$ for random subset sum, we improve (heuristically) down to
$2^{0.255n}$ using a search tree of depth at least $13$.
We also apply our subset algorithm to the decoding of random binary linear
codes, where we improve the best known run time of the Becker-Joux-May-Meurer
algorithm from $2^{0.048n}$ in the half distance decoding setting down to
$2^{0.042n}$.
|
In recent years the understanding on the limits of the smallest possible
droplet of the Quark Gluon Plasma has been called into question. Experimental
results from both the Large Hadron Collider and the Relativistic Heavy Ion
Collider have provided hints that the Quark Gluon Plasma may be produced in
systems as small as that formed in pPb or dAu collisions. Yet alternative
explanations still exist from correlations arising from quarks and gluons in a
color glass condensate picture. In order to resolve these two scenarios, a
system size scan has been proposed at the Large Hadron Collider for collisions
of ArAr and OO. Here we make predictions for a possible future run of ArAr and
OO collisions at the Large Hadron Collider and study the system size dependence
of a variety of flow observables. We find that linear response (from the
initial conditions to the final flow harmonics) becomes more dominant in
smaller systems whereas linear+cubic response can accurately predict
multi-particle cumulants for a wide range of centralities in large systems.
|
In this paper we offer a metric similar to graph edit distance which measures
the distance between two (possibly infinite)weighted graphs with finite norm
(we define the norm of a graph as the sum of absolute values of its edges). The
main result is the completeness of the space. Some other analytical properties
of this space are also investigated. The introduced metric could have some
applications in pattern recognition and face recognition methods.
|
Don’t waste Your $$$$$$
This worked the first 4 times I used it and then it falls apart.... but only where it’s important to stay together ... I have bought another brand and it was more sturdy, less shaking, less expensive, and worked better for my usage needs. Do not buy if u ever want to adjust it. This feels like money out the window
|
lol Joe who? Pathetic....what's worse than the lame duck do nothing Obama? Now you know ,and on the taxpayers 'dime' yet! Totally meaningless and useless trip from a former U.S. administration discredited and mocked on the world stage. Something worse than Joe who? I guess having a little potato and Communist China sellout as a leader....when not flooding the country with future Muslim terrorists. A few more months until President Trump gets his little potato masher out for the airhead and bubble brained 'leadership' in this former great country!
|
The certification of entanglement dimensionality is of great importance in
characterizing quantum systems. Recently, it is pointed out that quantum
correlation of high-dimensional states can be simulated with a sequence of
lower-dimensional states. Such problem may render existing characterization
protocols unreliable---the observed entanglement may not be a truly
high-dimensional one. Here, we introduce the notion of irreducible entanglement
to capture its dimensionality that is indecomposable in terms of a sequence of
lower-dimensional entangled systems. We prove this new feature can be detected
in a measurement-device-independent manner with an entanglement witness
protocol. To demonstrate the practicability of this technique, we
experimentally apply it on a 3-dimensional bipartite state and the result
certifies the existence of irreducible (at least) 3-dimensional entanglement.
|
The discovery of the extremely luminous supernova SN 2006gy, possibly
interpreted as a pair instability supernova, renewed the interest in very
massive stars. We explore the evolution of these objects, which end their life
as pair instability supernovae or as core collapse supernovae with relatively
massive iron cores, up to about $3 M_\odot$.
|
We derive effective Hubbard-type Hamiltonians of $\kappa$-(ET)$_2X$, using an
{\em ab initio} downfolding technique, for the first time for organic
conductors. They contain dispersions of the highest occupied Wannier-type
molecular orbitals with the nearest neighbor transfer $t$$\sim$0.067 eV for a
metal $X$=Cu(NCS)$_2$ and 0.055 eV for a Mott insulator $X$=Cu$_2$(CN)$_3$, as
well as screened Coulomb interactions. It shows unexpected differences from the
conventional extended H\"uckel results, especially much stronger onsite
interaction $U$$\sim$0.8 eV ($U/t$$\sim$12-15) than the H\"uckel estimates
($U/t$$\sim$7-8) as well as an appreciable longer-ranged interaction.
Reexamination on physics of this family of materials is required from this
realistic basis.
|
I strongly disagree with the assertion that Hawaiians/Kanaka Maoli do not get involved ("visits or cares") until someone proposes some alternative use for the parcel. On the contrary, Hawaiians are actively involved - it's only when the land use takes a drastic shift that Hawaiians then take to drastic measures in opposition.
More often than not, the land at issue is agricultural land, which is later slated for rezoning and eventually urban development. In a natural state, the land still possesses cultural value for Hawaiians. Obviously, the same cannot be said when urban development levels a parcel and wipes out all traces of Hawaiian existence.
If a parcel of land, covered with ancient Hawaiian archaeological sites, is left alone to grow grass, then the likelihood of those sites being disturbed is at minimal. Clearly, that likelihood increases by leaps and bounds when a developer proposes to turn the parcel into a golf course or subdivision.
|
Mendelian Randomization (MR) is a valuable tool for inferring causal relationships among a wide range of traits using summary statistics from genome-wide association studies (GWASs). Existing summary-level MR methods often rely on strong assumptions, resulting in many false positive findings. To relax MR assumptions, ongoing research has been primarily focused on accounting for confounding due to pleiotropy. Here we show that sample structure is another major confounding factor, including population stratification, cryptic relatedness, and sample overlap. We propose a unified MR approach, MR-APSS, which (i) accounts for pleiotropy and sample structure simultaneously by leveraging genome-wide information; and (ii) allows to include more genetic variants with moderate effects as instrument variables (IVs) to improve statistical power without inflating type I errors. We first evaluated MR-APSS using comprehensive simulations and negative controls, and then applied MR-APSS to study the causal relationships among a collection of diverse complex traits. The results suggest that MR-APSS can better identify plausible causal relationships with high reliability. In particular, MR-APSS can perform well for highly polygenic traits, where the IV strengths tend to be relatively weak and existing summary-level MR methods for causal inference are vulnerable to confounding effects.
|
We develop distributed algorithms to allocate resources in multi-hop wireless
networks with the aim of minimizing total cost. In order to observe the
fundamental duplexing constraint that co-located transmitters and receivers
cannot operate simultaneously on the same frequency band, we first devise a
spectrum allocation scheme that divides the whole spectrum into multiple
sub-bands and activates conflict-free links on each sub-band. We show that the
minimum number of required sub-bands grows asymptotically at a logarithmic rate
with the chromatic number of network connectivity graph. A simple distributed
and asynchronous algorithm is developed to feasibly activate links on the
available sub-bands. Given a feasible spectrum allocation, we then design
node-based distributed algorithms for optimally controlling the transmission
powers on active links for each sub-band, jointly with traffic routes and user
input rates in response to channel states and traffic demands. We show that
under specified conditions, the algorithms asymptotically converge to the
optimal operating point.
|
We derived simple polynomial equations to determine the entire resonance
spectra of split ring structures. For double stacking split rings made with
flat wires, we showed that the resonance frequency depends linearly on the
ring-ring separation. In particular, we found that the wavelength of the lowest
resonance mode can be made as large as the geometrical size of the ring for
realistic experimental conditions, whereas for current systems this ratio is of
the order of 10. Finite-difference-time-domain simulations on realistic
structures verified the analytic predictions.
|
We investigate the effects of Active Galactic Nuclei (AGN) on the gas
kinematics of their host galaxies, using MaNGA data for a sample of 62 AGN
hosts and 109 control galaxies (inactive galaxies). We compare orientation of
the line of nodes (kinematic Position Angle - PA) measured from the gas and
stellar velocity fields for the two samples. We found that AGN hosts and
control galaxies display similar kinematic PA offsets between gas and stars.
However, we note that AGN have larger fractional velocity dispersion $\sigma$
differences between gas and stars [$\sigma_{frac}=(\sigma_{\rm
gas}-\sigma_{stars})/\sigma_{\rm stars}$] when compared to their controls, as
obtained from the velocity dispersion values of the central (nuclear) pixel
(2.5" diameter). The AGN have a median value of $\sigma_{\rm frac}$ of
$<\sigma_{frac}>_{\rm AGN}=0.04$, while the the median value for the control
galaxies is $<\sigma_{frac}>_{\rm CTR}=-0.23$. 75% of the AGN show
$\sigma_{frac}>-0.13$, while 75% of the normal galaxies show $\sigma_{\rm
frac}<-0.04$, thus we suggest that the parameter $\sigma_{\rm frac}$ can be
used as an indicative of AGN activity. We find a correlation between the
[OIII]$\lambda$5007 luminosity and $\sigma_{frac}$ for our sample. Our main
conclusion is that the AGN already observed with MaNGA are not powerful enough
to produce important outflows at galactic scales, but at 1-2 kpc scales, AGN
feedback signatures are always present on their host galaxies.
|
Depth estimation from a single image is a fundamental problem in computer
vision. In this paper, we propose a simple yet effective convolutional spatial
propagation network (CSPN) to learn the affinity matrix for depth prediction.
Specifically, we adopt an efficient linear propagation model, where the
propagation is performed with a manner of recurrent convolutional operation,
and the affinity among neighboring pixels is learned through a deep
convolutional neural network (CNN). We apply the designed CSPN to two depth
estimation tasks given a single image: (1) To refine the depth output from
state-of-the-art (SOTA) existing methods; and (2) to convert sparse depth
samples to a dense depth map by embedding the depth samples within the
propagation procedure. The second task is inspired by the availability of
LIDARs that provides sparse but accurate depth measurements. We experimented
the proposed CSPN over two popular benchmarks for depth estimation, i.e. NYU v2
and KITTI, where we show that our proposed approach improves in not only
quality (e.g., 30% more reduction in depth error), but also speed (e.g., 2 to 5
times faster) than prior SOTA methods.
|
This product looks great but first time using the magnet part and driving ...
This product looks great but first time using the magnet part and driving around and my phone goes flying while driving the magnet came apart. NOT glued on well. I have not used the ring part but seems stiff so I didn't try to move it.
|
Over the past two decades several different approaches to defining a geometry
over ${\mathbb F}_1$ have been proposed. In this paper, relying on To\"en and
Vaqui\'e's formalism, we investigate a new category
${\mathsf{Sch}}_{\widetilde{\mathsf B}}$ of schemes admitting a Zariski cover
by affine schemes relative to the category of blueprints introduced by
Lorscheid. A blueprint, that may be thought of as a pair consisting of a monoid
$M$ and a relation on the semiring $M \otimes_{{\mathbb F}_1} \mathbb N$, is a
monoid object in a certain symmetric monoidal category $\mathsf B$, which is
shown to be complete, cocomplete, and closed. We prove that every
$\widetilde{\mathsf B}$-scheme $\Sigma$ can be associated, through adjunctions,
with both a classical scheme $\Sigma_{\mathbb Z}$ and a scheme
$\underline{\Sigma}$ over ${\mathbb F}_1$ in the sense of Deitmar, together
with a natural transformation $\Lambda\colon \Sigma_{\mathbb Z}\to
\underline{\Sigma}\otimes_{{\mathbb F}_1} {\mathbb Z}$. Furthermore, as an
application, we show that the category of "${\mathbb F}_1$-schemes" defined by
A. Connes and C. Consani can be naturally merged with that of
$\widetilde{\mathsf B}$-schemes to obtain a larger category, whose objects we
call "${\mathbb F}_1$-schemes with relations".
|
We present maps of the cosmic large-scale structure around the twelve most
distant galaxy clusters from the Massive Cluster Survey (MACS) as traced by the
projected surface density of galaxies on the cluster red sequence. Taken with
the Suprime-Cam wide-field camera on the Subaru telescope, the images used in
this study cover a 27x27 arcmin^2 area around each cluster, corresponding to 10
x 10 Mpc^2 at the median redshift of z = 0.55 of our sample. We directly detect
satellite clusters and filaments extending over the full size of our imaging
data in the majority of the clusters studied, supporting the picture of mass
accretion via infall along filaments suggested by numerical simulations of the
growth of clusters and the evolution of large-scale structure. A comparison of
the galaxy distribution near the cluster cores with the X-ray surface
brightness as observed with Chandra reveals, in several cases, significant
offsets between the gas and galaxy distribution, indicative of ongoing merger
events. The respective systems are ideally suited for studies of the dynamical
properties of gas, galaxies, and dark matter. In addition, the large-scale
filaments viewed at high contrast in these MACS clusters are prime targets for
the direct detection and study of the warm-hot intergalactic medium (WHIM).
|
We present a doctrinal approach to category theory, obtained by abstracting
from the indexed inclusions (via discrete fibrations and opfibrations) of the
left and of the right actions of X in Cat in categories over X. Namely, a "weak
temporal doctrine" consists essentially of two indexed functors with the same
codomain, such that the induced functors have both left and right adjoints
satisfying some exactness conditions, in the spirit of categorical logic. The
derived logical rules include some adjunction-like laws, involving the
truth-values-enriched hom and tensor functors, which display a nice symmetry
and condense several basic categorical properties. The symmetry becomes more
apparent in the slightly stronger context of "temporal doctrines", which we
initially treat and which include as an instance the inclusion of lower and
upper sets in the parts of a poset, as well as the inclusion of left and right
actions of a graph in the graphs over it.
|
This paper studies optimal bandwidth and power allocation in a cognitive
radio network where multiple secondary users (SUs) share the licensed spectrum
of a primary user (PU) under fading channels using the frequency division
multiple access scheme. The sum ergodic capacity of all the SUs is taken as the
performance metric of the network. Besides all combinations of the peak/average
transmit power constraints at the SUs and the peak/average interference power
constraint imposed by the PU, total bandwidth constraint of the licensed
spectrum is also taken into account. Optimal bandwidth allocation is derived in
closed-form for any given power allocation. The structures of optimal power
allocations are also derived under all possible combinations of the
aforementioned power constraints. These structures indicate the possible
numbers of users that transmit at nonzero power but below their corresponding
peak powers, and show that other users do not transmit or transmit at their
corresponding peak power. Based on these structures, efficient algorithms are
developed for finding the optimal power allocations.
|
Maybe they do, but it's a hard case to make.
Protestants don't believe in the Eucharist
Don't believe in Sacred Tradition
Don't believe in the Pope
Don't believe in the same Bible
Don't believe in exegesis / Magisterium
Don't believe in the same Sacraments
Most have a different understanding of grace.
Don't understand the Mass.
Don't understand how Redemption in the same way.
Have a hard time with "space and time" of Jesus's salvific work (they try to put Jesus in a time box)
They don't believe in the Catholic understanding of suffering
Most Protestants have a defective understanding of the temporal world.
They do believe in reading and knowing the Word of God; but they believe in private interpretation.
Increasing they do share things with some strains of Catholics
Church hopping
The homily/sermon is all
Making up their own moral criteria (contraception, abortion, divorce)
So in a SMALL sense this article has a point.
|
We present a new estimator for causal effects with panel data that builds on
insights behind the widely used difference in differences and synthetic control
methods. Relative to these methods we find, both theoretically and empirically,
that this "synthetic difference in differences" estimator has desirable
robustness properties, and that it performs well in settings where the
conventional estimators are commonly used in practice. We study the asymptotic
behavior of the estimator when the systematic part of the outcome model
includes latent unit factors interacted with latent time factors, and we
present conditions for consistency and asymptotic normality.
|
In this paper we present a data driven approach for approximating dynamical
systems. A dynamics is approximated using basis functions, which are derived
from maximization of the information-theoretic entropy, and can be generated
directly from the data provided. This approach has advantages over other
methods, where a dictionary of basis functions have to be provided by the user,
which is non trivial in some applications. We compare the accuracy of the
proposed data-driven modeling approach to existing methods in the literature,
and demonstrate that for some applications the maximum entropy basis functions
provide significantly more accurate models.
|
Let $K$ be the number field determined by a monic irreducible polynomial
$f(x)$ with integer coefficients. In previous papers we parameterized the prime
ideals of $K$ in terms of certain invariants attached to Newton polygons of
higher order of the defining equation $f(x)$. In this paper we show how to
carry out the basic operations on fractional ideals of $K$ in terms of these
constructive representations of the prime ideals. From a computational
perspective, these results facilitate the manipulation of fractional ideals of
$K$ avoiding two heavy tasks: the construction of the maximal order of $K$ and
the factorization of the discriminant of $f(x)$. The main computational
ingredient is Montes algorithm, which is an extremely fast procedure to
construct the prime ideals.
|
We prove that, in the coupon collector's problem, the point processes given
by the times of $r$-th arrivals for coupons of each type, centered and
normalized in a proper way, converge toward a non-homogeneous Poisson point
process. This result is then used to derive some generalizations and
infinite-dimensional extensions of classical limit theorems on the topic.
|
AimAlthough ecological niche models have been instrumental in understanding the widespread species distribution shifts under global change, rapid niche shifts limit model transferability to novel locations or time periods. Niche shifts during range expansion have been studied extensively in invasive species, but may also occur in native populations tracking climate change. We compared niche shifts during both types of range expansion in a Mediterranean annual plant to ask (i) whether the species native range expansion tracked climate change, (ii) whether further range expansion was promoted by niche expansion, and (iii) how these results changed forecasts of two ongoing invasions in Australia and California.
LocationEurasian Holarctic, California and Australia
TaxonDittrichia graveolens (L.) Greuter (Asteraceae)
MethodsNiche shifts were quantified in both environmental and geographic space, using the framework of niche centroid shift, overlap, unfilling, and expansion (COUE) as well as Maximum Entropy modelling. We used the historic native distribution and climate data (1901-1930) to project the expected distribution in the present climate (1990-2019), and compared it to the observed current distribution of D. graveolens. Finally, we compared invasion forecasts based on the historic and present native niches.
ResultsWe found that D. graveolens expanded its native range well beyond what would be sufficient to track climate change, associated with a 5.5% niche expansion towards more temperate climates. In contrast, both invasions showed niche conservatism, and were (still) constrained to climatic areas matching the historic native niche.
Main conclusionsour results show that contrary to hypotheses in the literature, niche shifts are not necessarily more rapid in invasions than in native range expansions. We conclude that niche expansion during the process of climate tracking may cause further range expansion than expected based on climate change alone.
|
Love the step by step guide to floral line drawing
Love the step by step guide to floral line drawing! Peggy's book is amazing and packed with tons of floral line drawings. She makes it easy to draw beautiful flowers, cacti, leaves, and more. I totally recommend this book for anyone looking to draw beautiful florals in a simple way.
|
Some aspects of the relationship between conservativeness of a dynamical
system (namely the preservation of a finite measure) and the existence of a
Poisson structure for that system are analyzed. From the local point of view,
due to the Flow-Box Theorem we restrict ourselves to neighborhoods of
singularities. In this sense, we characterize Poisson structures around the
typical zero-Hopf singularity in dimension 3 under the assumption of having a
local analytic first integral with non-vanishing first jet by connecting with
the classical Poincar\'e center problem. From the global point of view, we
connect the property of being strictly conservative (the invariant measure must
be positive) with the existence of a Poisson structure depending on the phase
space dimension. Finally, weak conservativeness in dimension two is introduced
by the extension of inverse Jacobi multipliers as weak solutions of its
defining partial differential equation and some of its applications are
developed. Examples including Lotka-Volterra systems, quadratic isochronous
centers, and non-smooth oscillators are provided.
|
Self modifying code is code that can modify its own instructions during the
execution of the program. It is extensively used by malware writers to
obfuscate their malicious code. Thus, analysing self modifying code is nowadays
a big challenge. In this paper, we consider the LTL model-checking problem of
self modifying code. We model such programs using self-modifying pushdown
systems (SM-PDS), an extension of pushdown systems that can modify its own set
of transitions during execution. We reduce the LTL model-checking problem to
the emptiness problem of self-modifying B\"uchi pushdown systems (SM-BPDS). We
implemented our techniques in a tool that we successfully applied for the
detection of several self-modifying malware. Our tool was also able to detect
several malwares that well-known antiviruses such as BitDefender, Kinsoft,
Avira, eScan, Kaspersky, Qihoo-360, Baidu, Avast, and Symantec failed to
detect.
|
We present the first model-independent measurement of the helicity of $W$
bosons produced in top quark decays, based on a 1 fb$^{-1}$ sample of candidate
$t\bar{t}$ events in the dilepton and lepton plus jets channels collected by
the D0 detector at the Fermilab Tevatron $p\bar{p}$ Collider. We reconstruct
the angle $\theta^*$ between the momenta of the down-type fermion and the top
quark in the $W$ boson rest frame for each top quark decay. A fit of the
resulting \costheta distribution finds that the fraction of longitudinal $W$
bosons $f_0 = 0.425 \pm 0.166 \hbox{(stat.)} \pm 0.102 \hbox{(syst.)}$ and the
fraction of right-handed $W$ bosons $f_+ = 0.119 \pm 0.090 \hbox{(stat.)} \pm
0.053 \hbox{(syst.)}$, which is consistent at the 30% C.L. with the standard
model.
|
I review several old/new approaches to the string/gauge correspondence for
the cusped/lightcone Wilson loops. The main attention is payed to SYM
perturbation theory calculations at two loops and beyond and to the cusped loop
equation.
These three introductory lectures were given at the 48 Cracow School of
Theoretical Physics: "Aspects of Duality", June 13-22, 2008, Zakopane, Poland.
|
There is not as yet full agreement on the mechanism that causes the rapid
damping of the oscillations observed by TRACE in coronal loops. It has been
suggested that the variation of the observed values of the damping time as
function of the corresponding observed values of the period contains
information on the possible damping mechanism. The aim of this Letter is to
show that, for resonant absorption, this is definitely not the case unless
detailed a priori information on the individual loops is available.
|
I lived in California in the 80's. They allowed this to prevent air cooled bikes from overheating in freeway rush hour traffic where speeds would reach an incredible 3 or 4 MPH for long stretches of roadway and bike were only supposed to go about 15 or 20 MPH. Bikes have improved and this is no longer an issue. Any attempt to promote this here is for selfish reasons alone and I say this as a bike rider myself.
|
The Standard Model quark and neutrino mixing matrices are of independent
empirical origin, but they do suggest unification. In this paper I obtained two
united one-parameter quark and neutrino mixing matrices inferred from two
semi-empirical deviation-from-mass-degeneracy (DMD) flavor rules (quadratic
DMD-hierarchy rule and Dirac-Majorana DMD-duality rule) without use of the
common exact-flavor-symmetry suggestions for that particular unification
problem. One small empirical parameter quantitatively defines the pattern of
particle flavor physics. The main predictions are: 1) hierarchical connections
between the 2 large solar and atmospheric neutrino mixing angels, and the 2
small quark mixing angels, 2) universal sequence of 14 equality relations to
that one-empirical-parameter of the quark and neutrino mixing-matrix
parameters, CP-phases and lepton mass ratios, which are free dimensionless
constants in the Standard Model, 3) complementarity connections between doubled
large neutrino and small quark mixing angles, 4) tentative solution of the
CP-violation problem in framework of Standard Model mixing matrix phenomenology
by suggesting a universal set of two nonzero values ~58.8 and ~31.2 degrees for
Dirac and Majorana CP-violating phases.
|
We present an abstract version of Goerss-Hopkins theory in the setting of a
prestable $\infty$-category equipped with a suitable periodicity operator. In
the case of the $\infty$-category of synthetic spectra, this yields
obstructions to realizing a comodule algebra as a homology of a commutative
ring spectrum, recovering the results of Goerss and Hopkins.
|
We present a method for recovery of narrow homogeneous spectral features out
of broad inhomogeneous overlapped profile based on second-derivative processing
of the absorption spectra of alkali metal atomic vapor nanocells. The method is
shown to preserve the frequency positions and amplitudes of spectral
transitions, thus being applicable for quantitative spectroscopy. The proposed
technique was successfully applied and tested for: measurements of hyperfine
splitting and atomic transition probabilities; development of an atomic
frequency reference; determination of isotopic abundance; study of atom-surface
interaction; and determination of magnetic field-induced modification of atomic
transitions frequency and probability. The obtained experimental results are
fully consistent with theoretical modeling.
|
I noted during last year's campaign season who both choices were terrible but that Trump was worse primarily because of his lack of political experience would lead to him not just stepping on landmines Hillary would avoid but he do so with full volition and with both feet. I just hope that these "unforced errors" are enough to convince the independents and non-partisan that voted for Trump the error they made and have the opportunity to address in 2018's midterm elections.
|
Umm, maybe not:
"..Developing diabetes while already serving in the military, however, is not automatic grounds for separation (retirement) from the military. Several hundred service members (out of more than 1.4 million currently serving) are diagnosed with diabetes each year. Between 1997 and 2007, fewer than 6% of diabetes diagnoses were Type 1 diabetes, 80% were Type 2 diabetes, and the remaining 14% were not consistently reported as either Type 1 or Type 2 diabetes. .."
https://www.diabetesselfmanagement.com/about-diabetes/general-diabetes-information/diabetes-in-the-military/
|
We propose the Square Attack, a score-based black-box $l_2$- and
$l_\infty$-adversarial attack that does not rely on local gradient information
and thus is not affected by gradient masking. Square Attack is based on a
randomized search scheme which selects localized square-shaped updates at
random positions so that at each iteration the perturbation is situated
approximately at the boundary of the feasible set. Our method is significantly
more query efficient and achieves a higher success rate compared to the
state-of-the-art methods, especially in the untargeted setting. In particular,
on ImageNet we improve the average query efficiency in the untargeted setting
for various deep networks by a factor of at least $1.8$ and up to $3$ compared
to the recent state-of-the-art $l_\infty$-attack of Al-Dujaili & O'Reilly.
Moreover, although our attack is black-box, it can also outperform
gradient-based white-box attacks on the standard benchmarks achieving a new
state-of-the-art in terms of the success rate. The code of our attack is
available at https://github.com/max-andr/square-attack.
|
We present constraints on extensions of the minimal cosmological models
dominated by dark matter and dark energy, $\Lambda$CDM and $w$CDM, by using a
combined analysis of galaxy clustering and weak gravitational lensing from the
first-year data of the Dark Energy Survey (DES Y1) in combination with external
data. We consider four extensions of the minimal dark energy-dominated
scenarios: 1) nonzero curvature $\Omega_k$, 2) number of relativistic species
$N_{\rm eff}$ different from the standard value of 3.046, 3) time-varying
equation-of-state of dark energy described by the parameters $w_0$ and $w_a$
(alternatively quoted by the values at the pivot redshift, $w_p$, and $w_a$),
and 4) modified gravity described by the parameters $\mu_0$ and $\Sigma_0$ that
modify the metric potentials. We also consider external information from Planck
CMB measurements; BAO measurements from SDSS, 6dF, and BOSS; RSD measurements
from BOSS; and SNIa information from the Pantheon compilation. Constraints on
curvature and the number of relativistic species are dominated by the external
data; when these are combined with DES Y1, we find
$\Omega_k=0.0020^{+0.0037}_{-0.0032}$ at the 68% confidence level, and $N_{\rm
eff}<3.28\, (3.55)$ at 68% (95%) confidence. For the time-varying
equation-of-state, we find the pivot value $(w_p, w_a)=(-0.91^{+0.19}_{-0.23},
-0.57^{+0.93}_{-1.11})$ at pivot redshift $z_p=0.27$ from DES alone, and $(w_p,
w_a)=(-1.01^{+0.04}_{-0.04}, -0.28^{+0.37}_{-0.48})$ at $z_p=0.20$ from DES Y1
combined with external data; in either case we find no evidence for the
temporal variation of the equation of state. For modified gravity, we find the
present-day value of the relevant parameters to be $\Sigma_0=
0.43^{+0.28}_{-0.29}$ from DES Y1 alone, and $(\Sigma_0,
\mu_0)=(0.06^{+0.08}_{-0.07}, -0.11^{+0.42}_{-0.46})$ from DES Y1 combined with
external data, consistent with predictions from GR.
|
We investigate ultracold magnetic-field-assisted collisions in the so far
unexplored ErYb system. The nonsphericity of the Er atom leads to weakly
anisotropic interactions that provide the mechanism for Feshbach resonances to
emerge. The resonances are moderately sparsely distributed with a density of
$0.1\,{\rm G}^{-1}-0.3\,{\rm G}^{-1}$ and exhibit chaotic statistics
characterized by a Brody parameter $\eta \approx 0.5-0.7$. The chaotic
behaviour of Feshbach resonances is accompanied by strong mixing of magnetic
and rotational quantum numbers in near-threshold bound states. We predict the
existence of broad resonances at fields $<300\,{\rm G}$ that may be useful for
the precise control of scattering properties and magnetoassociation of ErYb
molecules. The high number of bosonic Er-Yb isotopic combinations gives many
opportunities for mass scaling of interactions. Uniquely, two isotopic
combinations have nearly identical reduced masses (differing by less than
$10^{-5}$ relative) that we expect to have strikingly similar Feshbach
resonance spectra, which would make it possible to experimentally measure their
sensitivity to hypothetical variations of proton-to-electron mass ratio.
|
The 2010s made one thing clear: Tech is everywhere in life.
Tech is in our homes with thermostats that heat up our residences before we walk through the door. It’s in our cars with safety features that warn us about vehicles in adjacent lanes. It’s on our television sets, where many of us are streaming shows and movies through apps. We even wear it on ourselves in the form of wristwatches that monitor our health.
In 2020 and the coming decade, these trends are likely to gather momentum. They will also be on display next week at CES, an enormous consumer electronics trade show in Las Vegas that typically serves as a window into the year’s hottest tech developments.
At the show, next-generation cellular technology known as 5G, which delivers data at mind-boggling speeds, is expected to take center stage as one of the most important topics. We are also likely to see the evolution of smart homes, with internet-connected appliances such as refrigerators, televisions and vacuum cleaners working more seamlessly together — and with less human interaction required.
“The biggest thing is connected everything,” said Carolina Milanesi, a technology analyst for the research firm Creative Strategies. “Anything in the home — we’ll have more cameras, more mics, more sensors.”
|
Don't assume you know what Obama would do, you know what assuming means do you not? If you back Trump and Obama is your only supporting evidence then you need to do more research. Trump backers fall on Obama, are you not capable of thinking, because at present it shows you are not.
|
We introduce and analyse the problem of encoding classical information into
different resources of a quantum state. More precisely, we consider a general
class of communication scenarios characterised by encoding operations that
commute with a unique resource destroying map and leave free states invariant.
Our motivating example is given by encoding information into coherences of a
quantum system with respect to a fixed basis (with unitaries diagonal in that
basis as encodings and the decoherence channel as a resource destroying map),
but the generality of the framework allows us to explore applications ranging
from super-dense coding to thermodynamics. For any state, we find that the
number of messages that can be encoded into it using such operations in a
one-shot scenario is upper-bounded in terms of the information spectrum
relative entropy between the given state and its version with erased resources.
Furthermore, if the resource destroying map is a twirling channel over some
unitary group, we find matching one-shot lower-bounds as well. In the
asymptotic setting where we encode into many copies of the resource state, our
bounds yield an operational interpretation of resource monotones such as the
relative entropy of coherence and its corresponding relative entropy variance.
|
I like the shepherd! Sure the acting wasn't good but the fight scenes were nice. Van damme throws some nice kicks and so does adkins. The story was average. A Texas cop battles smugglers. This movie did everything a van damme movie should do which is martial arts and action. Van damme was never a good actor. I think this movie is better than van dammmes last 2. If you're looking for an Oscar winning performance you're not gonna get it here but if you're looking for action and martial arts then this movie is for you. Scott adkins is an amazing martial artist and unfortunately the public has gotten tired of martial art superstars but his movies in this movie are great. Van damme delivers strong kicks and it's good to see him performing martial arts again since he has not in his last 4 or 5 movies. This movie is definitely worth watching if you're a van damme fan.
|
Deep neural networks have been demonstrated to be vulnerable to backdoor
attacks. Specifically, by injecting a small number of maliciously constructed
inputs into the training set, an adversary is able to plant a backdoor into the
trained model. This backdoor can then be activated during inference by a
backdoor trigger to fully control the model's behavior. While such attacks are
very effective, they crucially rely on the adversary injecting arbitrary inputs
that are---often blatantly---mislabeled. Such samples would raise suspicion
upon human inspection, potentially revealing the attack. Thus, for backdoor
attacks to remain undetected, it is crucial that they maintain
label-consistency---the condition that injected inputs are consistent with
their labels. In this work, we leverage adversarial perturbations and
generative models to execute efficient, yet label-consistent, backdoor attacks.
Our approach is based on injecting inputs that appear plausible, yet are hard
to classify, hence causing the model to rely on the (easier-to-learn) backdoor
trigger.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.