adv

致长期以来一直关注solidot的海内外朋友,请点击这里查看。

信息流

  •  

    Not In My Name Dept.

    11-24 THE NEW YORKER 64

    Not In My Name Dept.

    发表评论 查看更多 翻译此文

    收起

  • Singapore plans to introduce driverless buses on its public roads by 2022. From a report: The government says they will be piloted in three new neighbourhoods which will have less-crowded roads designed to accommodate the buses. The buses will be used to help residents travel in their communities, and to nearby train and bus stations. Densely-populated Singapore hopes driverless technology will help the country manage its land constraints and manpower shortages. "The autonomous vehicles will greatly enhance the accessibility and connectivity of our public transport system, particularly for the elderly, families with young children and the less mobile," the Transport Minister Khaw Boon Wan said. The autonomous buses are expected to complement existing manned bus services, and will initially operate during off-peak hours. Additionally, the government plans to let commuters hail on-demand shuttles using their mobile phones.

    发表评论 查看更多 翻译此文

    收起

  • SAGE: A Test to Detect Signs of Alzheimer's and Dementia

    发表评论 查看更多 翻译此文

    收起

  • Road design: Sustainable safety and ‘shared space’

    发表评论 查看更多 翻译此文

    收起

  • A boy searches for music in the Land of the Dead in a plot twistier than a telenovela.

    发表评论 查看更多 翻译此文

    收起

  • The Intel Management Engine (ME), which is a separate processor and operating system running outside of user control on most x86 systems, has long been of concern to users who are security and privacy conscious. Google and others have been working on ways to eliminate as much of that functionality as possible (while still being able to boot and run the system). Ronald Minnich from Google came to Prague to talk about those efforts at the 2017 Embedded Linux Conference Europe.

    发表评论 查看更多 翻译此文

    收起

  •  

    Quantum Algorithm Zoo

    11-23 Hacker News 61

    Quantum Algorithm Zoo

    发表评论 查看更多 翻译此文

    收起

  • Security updates have been issued by Arch Linux (jbig2dec), Debian (libspring-ldap-java, sam2p, and xorg-server), Fedora (postgresql), openSUSE (cacti, cacti-spine), and Ubuntu (ldns and libraw).

    发表评论 查看更多 翻译此文

    收起

  • Taylor Plimpton on growing up as a Detroit Lions fan thanks to his father, George Plimpton, and on passing down the team to his own children.

    发表评论 查看更多 翻译此文

    收起

  •  

    Thanksgiving: How Will You Keep the Peace?

    11-23 THE NEW YORKER 58

    Emily Flake’s humorous cartoon of ways to keep Thanksgiving festivities civil this year.

    发表评论 查看更多 翻译此文

    收起

  •  

    Still No Science Advisor at the White House

    11-23 MIT Technology 58

    Science issues stack up as President Trump overlooks an appointment.

    发表评论 查看更多 翻译此文

    收起

  • Speed training—but not memory or reasoning training—did the trick.

    发表评论 查看更多 翻译此文

    收起

  • The ability to boot DOS and other legacy relics is going to disappear.

    发表评论 查看更多 翻译此文

    收起

  •  

    Spam is back

    11-22 Hacker News 58

    Spam is back

    发表评论 查看更多 翻译此文

    收起

  • Security updates have been issued by Arch Linux (roundcubemail), Debian (optipng, samba, and vlc), Fedora (compat-openssl10, fedpkg, git, jbig2dec, ldns, memcached, openssl, perl-Net-Ping-External, python-copr, python-XStatic-jquery-ui, rpkg, thunderbird, and xen), SUSE (tomcat), and Ubuntu (db, db4.8, db5.3, linux, linux-raspi2, linux-aws, linux-azure, linux-gcp, and samba).

    发表评论 查看更多 翻译此文

    收起

  • Report URI's journey to a permanent redirect

    发表评论 查看更多 翻译此文

    收起

  • Security updates have been issued by Debian (ldns and swauth), Fedora (kernel and postgresql), Mageia (botan, krb5, and sssd), and Ubuntu (apport, linux, linux-aws, linux-gke, linux-kvm, linux-raspi2, linux-snapdragon, linux, linux-raspi2, linux-hwe, linux-lts-xenial, procmail, and samba).

    发表评论 查看更多 翻译此文

    收起

  •  

    Peeling Away Memory Chips

    11-22 IEEE 57

    As consumers demand smaller memory chips with greater capacity, engineers optimize the manufacturing process to ensure the chips will hold up.

    发表评论 查看更多 翻译此文

    收起

  • Almost 14 years ago, way back in 2003, Sun Microsystems unveiled Project Looking Glass, a 3D desktop environment written in Java and making extensive use of Java 3D. The demo, by Jonathan Schwartz, always stuck with me over the years, and since YouTube recommended the demo to me today, I figured it'd be interesting to you remind you all of simpler times, when flipping windows around and 3D rendering in Java actually managed to get us excited (something no other project would ever manage to... Wait.). Project Looking Glass was developed for about three years, and it actually saw a 1.0 release in late 2006. It's one of those random projects exploring what we then thought could be the future of computing, right before the iPhone came onto the scene and changed everything. While nothing came out of Project Looking Glass, Schwartz' demo did teach me the phrase "arbitrarily clever", which I'm unusually attached to.

    发表评论 查看更多 翻译此文

    收起

  • European researchers assemble the components for a new kind of cochlear implant

    发表评论 查看更多 翻译此文

    收起

  • Happiness is an elusive state of mind that many people aim to maximize. Now researchers have found a way to predict happiness levels using smart watch data.

    发表评论 查看更多 翻译此文

    收起

  •  

    Security updates for Monday

    11-21 LWN 57

    Security updates have been issued by Arch Linux (icu and lib32-icu), CentOS (firefox), Debian (imagemagick, konversation, libspring-ldap-java, libxml-libxml-perl, lynx-cur, ming, opensaml2, poppler, procmail, shibboleth-sp2, and xen), Fedora (firefox, java-9-openjdk, jbig2dec, kernel, knot, knot-resolver, qt5-qtwebengine, and roundcubemail), Gentoo (adobe-flash, couchdb, icedtea-bin, and phpunit), Mageia (apr, bluez, firefox, jq, konversation, libextractor, and quagga), Oracle (firefox), Red Hat (firefox), and Scientific Linux (firefox).

    发表评论 查看更多 翻译此文

    收起

  •  

    Fundamentals of a RF Design

    11-17 IEEE 85

    This paper discusses the RF design fundamentals of an RF communication system, including the transmission medium, wave propagation, free space path loss, the transmit and receive portion, link design and key components with the intent to provide practical knowledge on the process for designing an RF system.

    发表评论 查看更多 翻译此文

    收起

  • Catalin Cimpanu, writing for BleepingComputer: Mozilla will soon block the loading of data URIs in the Firefox navigation bar as part of a crackdown on phishing sites that abuse this protocol. The data: URI scheme (RFC 2397) was deployed in 1998 when developers were looking for ways to embed files in other files. What they came up with was the data: URI scheme that allows a developer to load a file represented as an ASCII-encoded octet stream inside another document. Since then, the URI scheme has become very popular with website developers as it allows them to embed text-based (CSS or JS) files or image (PNG, JPEG) files inside HTML documents instead of loading each resource via a separate HTTP request. This practice became hugely popular because search engines started ranking websites based on their page loading speed and the more HTTP requests a website made, the slower it loaded, and the more it affected a site's SERP position.

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader shares an Associated Press report: Leading researchers castigated a federal plan that would use artificial intelligence methods to scrutinize immigrants and visa applicants, saying it is unworkable as written and likely to be "inaccurate and biased" if deployed. The experts, a group of more than 50 computer and data scientists, mathematicians and other specialists in automated decision-making, urged the Department of Homeland Security to abandon the project, dubbed the "Extreme Vetting Initiative." That plan has its roots in President Donald Trump's repeated pledge during the 2016 campaign to subject immigrants seeking admission to the United States to more intense ideological scrutiny -- or, as he put it, "extreme vetting." Over the summer, DHS published a "statement of objectives" for a system that would use computer algorithms to scan social media and other material in order to automatically flag undesirable entrants -- and to continuously scan the activities of

    发表评论 查看更多 翻译此文

    收起

  • Locations in Google Maps get smarter and get a new look.

    发表评论 查看更多 翻译此文

    收起

  • Eren Orbey writes about a photography project by Josephine Sittenfeld that features portraits of her Princeton classmates from junior year and at a fifteen-year reunion.

    发表评论 查看更多 翻译此文

    收起

  • All 500 of the world's top 500 supercomputers are running Linux

    发表评论 查看更多 翻译此文

    收起

  • Bayesian ranking of items with up and downvotes of 5 star ratings (2015)

    发表评论 查看更多 翻译此文

    收起

  • Choosy Eggs May Pick Sperm for Their Genes, Defying Mendel’s Law

    发表评论 查看更多 翻译此文

    收起

  • Computer scientists, cognitive scientists, and legal scholars say AI systems should be able to explain their decisions without revealing all their secrets.

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes a report from Bloomberg: The U.S. Federal Communications Commission under its Republican chairman plans to vote in December to kill the net neutrality rules passed during the Obama era, said two people briefed on the plans. Chairman Ajit Pai in April proposed gutting the rules that he blamed for depressing investment in broadband, and said he intended to "finish the job" this year. The chairman has decided to put his proposal to a vote at the FCC next month, said the people. The agency's monthly meeting is to be held Dec. 14. The people asked not to be identified because the plan hasn't been made public. It's not clear what language Pai will offer to replace the rules that passed with only Democratic votes at the FCC in 2015. He has proposed that the FCC end the designation of broadband companies such as AT&T Inc. and Comcast Corp. as common carriers. That would remove the legal authority that underpins the net neutrality rules. One of the people said Pai

    发表评论 查看更多 翻译此文

    收起

  • Reader cdreimer writes: According to a report in The Wall Street Journal (possibly paywalled), two-thirds of Americans have reported being bullied in the workplace in the last year (up from half in 1989) and boorish behavior by bosses and coworkers are causing companies in lost productivity. The report reads: One of the first things visitors notice when they enter the Irvine, Calif., offices of Bryan Cave LLP is the granite plaque etched with the law firm's 10-point code of civility. The gray slab, displayed in the law firm's reception area, proclaims that employees always say please and thank you, welcome feedback and acknowledge the contributions of others. Such rules may seem more at home in a kindergarten than a law firm, but Stuart Price, a longtime partner, says they serve as a daily reminder to keep things civil at work. Incivility -- and its more extreme cousin, bullying -- is becoming a bigger problem in workplaces. Nearly two-thirds of Americans reported that they were bullie

    发表评论 查看更多 翻译此文

    收起

  • Closest Temperate World Orbiting Quiet Star Discovered

    发表评论 查看更多 翻译此文

    收起

  • China fires up next-generation neutron-science facility

    发表评论 查看更多 翻译此文

    收起

  • mirandakatz writes: This summer, Backchannel reported that Anthony Levandowski, the controversial engineer at the heart of the Uber/Waymo lawsuit, had filed paperwork for a new religion called the Way of the Future. Today, investigative reporter Mark Harris has all the details on what that AI-based religion actually likes -- and Levandowski granted him his first interview about the new religion and his only public interview since Waymo filed its suit in February. As Levandowski tells him, we can see a hint of how a superhuman intelligence might treat humanity in our current relationships with animals -- and that's why it's so important that we treat AI as a god, not a demon to be warded off. "Do you want to be a pet or livestock?" he asks. "We give pets medical attention, food, grooming, and entertainment. But an animal that's biting you, attacking you, barking and being annoying? I don't want to go there."

    发表评论 查看更多 翻译此文

    收起

  • Alexa has a new Canadian English accent.

    发表评论 查看更多 翻译此文

    收起

  • Code together in real time with Teletype for Atom

    发表评论 查看更多 翻译此文

    收起

  •  

    Elon Musk's 'Scientific Method'

    11-16 Slashdot 86

    From a new wide-ranging interview of Elon Musk: An unfortunate fact of human nature is that when people make up their mind about something, they tend not to change it -- even when confronted with facts to the contrary. "It's very unscientific," Musk says. "There's this thing called physics, which is this scientific method that's really quite effective for figuring out the truth." The scientific method is a phrase Musk uses often when asked how he came up with an idea, solved a problem or chose to start a business. Here's how he defines it for his purposes, in mostly his own words: 1. Ask a question. 2. Gather as much evidence as possible about it. 3. Develop axioms based on the evidence, and try to assign a probability of truth to each one. 4. Draw a conclusion based on cogency in order to determine: Are these axioms correct, are they relevant, do they necessarily lead to this conclusion, and with what probability? 5. Attempt to disprove the conclusion. Seek refutation from others to f

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader shares a Motherboard report: Every year, Forbes' 30 Under 30 list recognizes people blessed with both youth and exceptional talent in their field -- including celebrities, startup founders, doctors, and artists. These are smart, savvy professionals -- and when some of them include information security pros, they're bound to go poking around for vulnerabilities. That's what Yan Zhu, a privacy engineer who made the 2015 list, was doing when she found a gaping privacy hole in the way Forbes handles recipients' personal information. Once you make the list, Yan told me in a Twitter direct message, Forbes asks you to register for its annual Under 30 Summit conference. "They send you a link for conference registration, but it's not tied to your email address," she said. "So you can literally enter anyone's email address who is also a 30 Under 30 member and it shows you their personal info." That information carries over into all future years, she said.

    发表评论 查看更多 翻译此文

    收起

  • NIST researchers develop an underlying architecture for a new class of quantum photonic circuits

    发表评论 查看更多 翻译此文

    收起

  • This paper concerns the viscous and non-resistive MHD systems which govern the motion of electrically conducting fluids interacting with magnetic fields. We consider an initial-boundary value problem for both compressible and (nonhomogeneous and homogeneous) incompressible fluids in an infinite flat layer. We prove the global well-posedness of the systems around a uniform magnetic field which is vertical to the layer. Moreover, the solution converges to the steady state at an almost exponential rate as time goes to infinity. Our proof relies on a two-tier energy method for the reformulated systems in Lagrangian coordinates.

    发表评论 查看更多 翻译此文

    收起

  • We consider the one dimensional bilinear Schroedinger equations on compact quantum graphs. We study two different types of controllability and how the structure of the graph affects them.

    发表评论 查看更多 翻译此文

    收起

  • Augmented Lagrangian method (ALM) has been popularly used for solving constrained optimization problems. Its convergence and local convergence speed have been extensively studied. However, its global convergence rate is still open for problems with nonlinear inequality constraints. In this paper, we work on general constrained convex programs. For these problems, we establish the global convergence rate of ALM and its inexact variants. We first assume exact solution to each subproblem in the ALM framework and establish an $O(1/k)$ ergodic convergence result, where $k$ is the number of iterations. Then we analyze an inexact ALM that approximately solves the subproblems. Assuming summable errors, we prove that the inexact ALM also enjoys $O(1/k)$ convergence if smaller stepsizes are used in the multiplier updates. Furthermore, we apply the inexact ALM to a constrained composite convex problem with each subproblem solved by Nesterov's optimal first-order method. We show that $O(\varepsilo

    发表评论 查看更多 翻译此文

    收起

  • We propose a general theory whose main component are functorial assignments $$\mathbf{\Sigma} \mapsto \Omega_{\mathbf{\Sigma}} \in \mathbf{E}(\mathbf{\Sigma}),$$ for a large class of functors $\mathbf{E}$ from a certain category of bordered surfaces (${\mathbf \Sigma}$'s) to a suitable a target category of topological vector spaces. The construction is done by summing appropriate compositions of the initial data over all homotopy classes of successive excisions of embedded pair of pants. We provide sufficient conditions to guarantee these infinite sums converge and as a result, we can generate mapping class group invariant vectors $\Omega_{\mathbf \Sigma}$ which we call amplitudes. The initial data encode the amplitude for pair of pants and tori with one boundary, as well as the "recursion kernels" used for glueing. We give this construction the name of "geometric recursion", abbreviated GR. As an illustration, we show how to apply our formalism to various spaces of continuous function

    发表评论 查看更多 翻译此文

    收起

  • Gamma-positivity is an elementary property that polynomials with symmetric coefficients may have, which directly implies their unimodality. The idea behind it stems from work of Foata, Sch\"utzenberger and Strehl on the Eulerian polynomials; it was revived independently by Br\"and\'en and Gal in the course of their study of poset Eulerian polynomials and face enumeration of flag simplicial spheres, respectively, and has found numerous applications since then. This paper surveys some of the main results and open problems on gamma-positivity, appearing in various combinatorial or geometric contexts, as well as some of the diverse methods that have been used to prove it.

    发表评论 查看更多 翻译此文

    收起

  • We investigate the precoding, remote radio head (RRH) selection and signal splitting in the simultaneous wireless information and power transferring (SWIPT) cloud radio access networks \mbox{(C-RANs)}. The objective is to minimize the power consumption of the SWIPT C-RAN. Different from the existing literature, we consider the nonlinear fronthaul power consumption and the multiple antenna RRHs. By switching off the unnecessary RRHs, the group sparsity of the precoding coefficients is introduced, which indicates that the precoding process and the RRH selection are coupled. In order to overcome these issues, a group sparse precoding and signal splitting algorithm is proposed based on the majorization-minimization framework, and the convergence behavior is established. Numerical results are used to verify our proposed studies.

    发表评论 查看更多 翻译此文

    收起

  • For a degree sequence, we define the set of edges that appear in every labeled realization of that sequence as forced, while the edges that appear in none as forbidden. We examine structure of graphs whose degree sequences contain either forced or forbidden edges. Among the things we show, we determine the structure of the forced or forbidden edge sets, the relationship between the sizes of forced and forbidden sets for a sequence, and the resulting structural consequences to their realizations. This includes showing that the diameter of every realization of a degree sequence containing forced or forbidden edges is no greater than 3, and that these graphs are maximally edge-connected.

    发表评论 查看更多 翻译此文

    收起

  • In this paper, we show that the maximal divisible subgroup of groups $K_1$ and $K_2$ of an elliptic curve $E$ over a function field is uniquely divisible. Further those $K$-groups modulo this uniquely divisible subgroup are explicitly computed. We also calculate the motivic cohomology groups of the minimal regular model of $E$, which is an elliptic surface over a finite field.

    发表评论 查看更多 翻译此文

    收起

  • This article, based on a talk, treats some elementary, but not completely simple examples from probability. They concern multiple birthday coincidences, throwing dice, the combinatorics of the German card game "Doppelkopf", and the properties of products of uniformly distributed random numbers. The material, a lot of which was not taken from or found in other sources, should be of interest to all those who lecture or plan to lecture on probability, especially on an elementary or introductory level, and are looking for challenging examples or problems.

    发表评论 查看更多 翻译此文

    收起

  • In the early 1980's Almgren developed a theory of Dirichlet energy minimizing multi-valued functions, proving that the Hausdorff dimension of the singular set (including branch points) of such a function is at most $(n-2),$ where $n$ is the dimension of its domain. Almgren used this result in an essential way to show that the same upper bound holds for the dimension of the singular set of an area minimizing $n$-dimensional rectifiable current of arbitrary codimension. In either case, the dimension bound is sharp. We develop estimates to study the asymptotic behaviour of a multi-valued Dirichlet energy minimizer on approach to its singular set. Our estimates imply that a Dirichlet energy minimizer at ${\mathcal H}^{n-2}$ a.e. point of its singular set has a unique set of homogeneous multi-valued cylindrical tangent functions (blow-ups) to which the minimizer, modulo a set of single-valued harmonic functions, decays exponentially fast upon rescaling. A corollary is that the singular set

    发表评论 查看更多 翻译此文

    收起

  • We use the Haar function system in order to study the $L_2$ discrepancy of a class of digital $(0,n,2)$-nets. Our approach yields exact formulas for this quantity, which measures the irregularities of distribution of a set of points in the unit interval. We will obtain such formulas not only for the classical digital nets, but also for shifted and symmetrized versions thereof. The basic idea of our proofs is to calculate all Haar coefficents of the discrepancy function exactly and insert them into Parseval's identity. We will also discuss reasons why certain (symmetrized) digital nets fail to achieve the optimal order of $L_2$ discrepancy and use the Littlewood-Paley inequality in order to obtain results on the $L_p$ discrepancy for all $p\in (1,\infty)$.

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader shares a report: Amazon is giving Whole Foods shoppers an early gift for the holidays. The grocer announced Wednesday it's slashing prices again, this time on several "holiday staples," including sweet potatoes, canned pumpkin and turkey. If you're an Amazon Prime member, you'll pay even less for turkey: Whole Foods slashed turkey prices to $1.99 per pound (compared to $2.49 for non-Prime members), or $2.99 per pound for an organic turkey ($3.49 for non-Prime members).

    发表评论 查看更多 翻译此文

    收起

  • We propose and analyze a new hybridizable discontinuous Galerkin (HDG) method for second-order elliptic problems. Our method is obtained by inserting the $L^2$-orthogonal projection onto the approximate space for a numerical trace into all facet integrals in the usual HDG formulation. The orders of convergence for all variables are optimal if we use polynomials of degree $k+l$, $k+1$ and $k$, where $k$ and $l$ are any non-negative integers, to approximate the vector, scalar and trace variables, which implies that our method can achieve superconvergence for the scalar variable without postprocessing. Numerical results are presented to verify the theoretical results.

    发表评论 查看更多 翻译此文

    收起

  • This work presents an extension of discretely entropy stable discontinuous Galerkin (DG) methods to the resistive magnetohydrodynamics (MHD) equations. Although similar to the compressible Navier-Stokes equations at first sight, there are some important differences concerning the resistive MHD equations that need special focus. The continuous entropy analysis of the ideal MHD equations, which are the advective parts of the resistive MHD equations, shows that the divergence-free constraint on the magnetic field components must be incorporated as a non-conservative term in a form either proposed by Powell or Janhunen. Consequently, this non-conservative term needs to be discretized, such that the approximation is consistent with the entropy. As an extension of the ideal MHD system, we address in this work the continuous analysis of the resistive MHD equations and show that the entropy inequality holds. Thus, our first contribution is the proof that the resistive terms are symmetric and p

    发表评论 查看更多 翻译此文

    收起

  • The change in Holographic entanglement entropy (HEE) for small fluctuations about pure anti De Sitter (AdS) is obtained by a perturbative expansion of the area functional in terms of the change in the bulk metric and the embedded extremal surface. However, it is known that change in the embedding appears in second order or higher. It was shown that these changes in the embedding can be calculated in the $2+1$ dimensional case by solving a generalized geodesic deviation equation. We generalize this result to arbitrary dimensions by deriving an inhomogeneous form of the Jacobi equation for minimal surfaces. The solutions of this equation map a minimal surface in a given space time to a minimal surface in a space time which is a perturbation over the initial space time. Using this we perturbatively calculate the changes in HEE upto second order for boosted black brane like perturbations over $AdS 4$ .

    发表评论 查看更多 翻译此文

    收起

  • Adapt time-tested methods to meet new engineering challenges

    发表评论 查看更多 翻译此文

    收起

  • Let $D$ be a bounded domain in $\mathbb C^n$. We study approximation of (not necessarily bounded from above) $m-$subharmonic function $D$ by continuous $m-$subharmonic ones defined on neighborhoods of $\overline{D}$. We also consider the existence of a $m-$subharmonic function on $D$ whose boundary values coincides with a given real valued continuous function on $\partial D$ except for a sufficiently small subset of $\partial D.$

    发表评论 查看更多 翻译此文

    收起

  • Kenmotsu's formula describes surfaces in Euclidean 3-space by their mean curvature functions and Gauss maps. In Lorentzian 3-space, Akutagawa-Nishikawa's formula and Magid's formula are Kenmotsu-type formulas for spacelike surfaces and for timelike surfaces, respectively. We apply them to a few problems concerning rotational or helicoidal surfaces with constant mean curvature. Before that, we show that the three formulas above can be written in a unified single equation.

    发表评论 查看更多 翻译此文

    收起

  • This paper analyzes a time-stepping discontinuous Galerkin method for modified anomalous subdiffusion problems with two time fractional derivatives of orders $ \alpha $ and $ \beta $ ($ 0 < \alpha < \beta < 1 $). The stability of this method is established, the temporal accuracy of $ O(\tau^{m+1-\beta/2}) $ is derived, where $m$ denotes the degree of polynomials for the temporal discretization. It is shown that, even the solution has singularity near $ t = {0+} $, this temporal accuracy can still be achieved by using the graded temporal grids. Numerical experiments are performed to verify the theoretical results.

    发表评论 查看更多 翻译此文

    收起

  • Servicing the school transportation demand safely with a minimum number of buses is one of the highest financial goals for school transportation directors. To achieve that objective, a good and efficient way to solve the routing and scheduling problem is required. Due to the growth of the computing power, the spotlight has been shed on solving the combined problem of the school bus routing and scheduling. A recent attempt tried to model the routing problem by maximizing the trip compatibilities with the hope of requiring fewer buses in the scheduling problem. However, an over-counting problem associated with trip compatibility could diminish the performance of this approach. An extended model is proposed in this paper to resolve this issue along with an iterative solution algorithm. This extended model is an integrated model for multi-school bus routing and scheduling problem. The result shows better solutions for 8 test problems can be found with a fewer number of buses (up to 25%) an

    发表评论 查看更多 翻译此文

    收起

  • We consider Sturm-Liouville operators on geometrical graphs without cycles (trees) with singular potentials from the class $W_2^{-1}$. We suppose that the potentials are known on a part of the graph, and study the so-called partial inverse problem, which consists in recovering the potentials on the remaining part of the graph from some parts of several spectra. The main results of the paper are the uniqueness theorem and a constructive procedure for the solution of the partial inverse problem. Our method is based on the completeness and the Riesz-basis property of special systems of vector functions, and the reduction of the partial inverse problem to the complete one on a part of the graph.

    发表评论 查看更多 翻译此文

    收起

  • A new lower bound for the maximal length of a multivector is obtained. It is much closer to the best known upper bound than previously reported lower bound estimates. The maximal length appears to be unexpectedly large for $n$-vectors, with n>2, since the few exactly known values seem to grow linearly with vector space dimension, whereas the new lower bound has a polynomial order equal to n-1 like the best known upper bound. This result has implications for quantum chemistry.

    发表评论 查看更多 翻译此文

    收起

  • In this paper we focus on high order finite element approximations of the electric field combined with suitable preconditioners, to solve the time-harmonic Maxwell's equations in waveguide configurations.The implementation of high order curl-conforming finite elements is quite delicate, especially in the three-dimensional case. Here, we explicitly describe an implementation strategy, which has been embedded in the open source finite element software FreeFem++ (this http URL). In particular, we use the inverse of a generalized Vandermonde matrix to build basis functions in duality with the degrees of freedom, resulting in an easy-to-use but powerful interpolation operator. We carefully address the problem of applying the same Vandermonde matrix to possibly differently oriented tetrahedra of the mesh over the computational domain. We investigate the preconditioning for Maxwell's equations in the time-harmonic regime, which is an underdeveloped issue in the literature, particularly for hi

    发表评论 查看更多 翻译此文

    收起

  • The supply of electrical energy is being increasingly sourced from renewable generation resources. The variability and uncertainty of renewable generation, compared to a dispatch-able plant, is a significant dissimilarity of concern to the traditionally reliable and robust distribution systems. In order to reach the optimal operation of community Micro-grids including various Distributed Energy Resource, the stochastic nature of renewable generation should be considered in the decision-making process. To this end, this paper proposes a stochastic scenario based model for optimal dynamic energy management of Micro-grids with the goal of cost and emission minimization as well as reliability maximization. In the proposed model, the uncertainties of load consumption and also, the available output power of wind and photo-voltaic units are modeled by a scenario-based stochastic programming. Through this method, the inherent stochastic nature of the proposed problem is released and the proble

    发表评论 查看更多 翻译此文

    收起

  • The embedded discontinuous Galerkin (EDG) method by Cockburn et al. [SIAM J. Numer. Anal., 2009, 47(4), 2686-2707] is obtained from the hybridizable discontinuous Galerkin method by changing the space of the Lagrangian multiplier from discontinuous functions to continuous ones, and adopts piecewise polynomials of equal degrees on simplex meshes for all variables. In this paper, we analyze a new EDG method for second order elliptic problems on polygonal/polyhedral meshes. By using piecewise polynomials of degrees $k+1$, $k+1$, $k$ ($k\geq 0$) to approximate the potential, numerical trace and flux, respectively, the new method is shown to yield optimal convergence rates for both the potential and flux approximations. Numerical experiments are provided to confirm the theoretical results.

    发表评论 查看更多 翻译此文

    收起

  • A standard way of approximating or discretizing a metric space is by taking its Rips complexes. These approximations for all parameters are often bound together into a filtration, to which we apply the fundamental group or the first homology. We call the resulting object persistence. Recent results demonstrate that persistence of a compact geodesic locally contractible space $X$ carries a lot of geometric information. However, by definition the corresponding Rips complexes have uncountably many vertices. In this paper we show that nonetheless, the whole persistence of $X$ may be obtained by an appropriate finite sample (subset of $X$), and that persistence of any subset of $X$ is well interleaved with the persistence of $X$. It follows that the persistence of $X$ is the minimum of persistences obtained by all finite samples. Furthermore, we prove a much improved Stability theorem for such approximations. As a special case we provide for each $r>0$ a density $s>0$, so that for eac

    发表评论 查看更多 翻译此文

    收起

  • Distributed optimization algorithms are essential for training machine learning models on very large-scale datasets. However, they often suffer from communication bottlenecks. Confronting this issue, a communication-efficient primal-dual coordinate ascent framework (CoCoA) and its improved variant CoCoA+ have been proposed, achieving a convergence rate of $\mathcal{O}(1/t)$ for solving empirical risk minimization problems with Lipschitz continuous losses. In this paper, an accelerated variant of CoCoA+ is proposed and shown to possess a convergence rate of $\mathcal{O}(1/t^2)$ in terms of reducing suboptimality. The analysis of this rate is also notable in that the convergence rate bounds involve constants that, except in extreme cases, are significantly reduced compared to those previously provided for CoCoA+. The results of numerical experiments are provided to show that acceleration can lead to significant performance gains.

    发表评论 查看更多 翻译此文

    收起

  • Usually, the additivity property is inherent to the systems obeying linear equations of motion. In this paper I will show that in the systems obeying the nonlinear Schrodinger equation with the general form of nonlinearity, the additivity property is valid at least for the basic integrals of motion calculated for the nonlinear perturbations against a stationary background solution.

    发表评论 查看更多 翻译此文

    收起

  • Dimension profiles were introduced by Falconer and Howroyd to provide formulae for the box-counting and packing dimensions of the orthogonal projections of a set E or a measure on Euclidean space onto almost all m-dimensional subspaces. The original definitions of dimension profiles are somewhat awkward and not easy to work with. Here we rework this theory with an alternative definition of dimension profiles in terms of capacities of E with respect to certain kernels, and this leads to the box-counting dimensions of projections and other images of sets relatively easily. We also discuss other uses of the profiles, such as the information they give on exceptional sets of projections and dimensions of images under certain stochastic processes. We end by relating this approach to packing dimension.

    发表评论 查看更多 翻译此文

    收起

  • The purpose of this note is to prove the existence of a remarkable structure in an iterated sumset derived from a set $P$ in a Cartesian square $\mathbb{F}_p^n\times\mathbb{F}_p^n$. More precisely, we perform horizontal and vertical sums and differences on $P$, that is, operations on the second coordinate when the first one is fixed, or vice versa. The structure we find is the zero set of a family of bilinear forms on a Cartesian product of vector subspaces. The codimensions of the subspaces and the number of bilinear forms involved are bounded by a function $c(\delta)$ of the density $\delta=\lvert P\rvert/p^{2n}$ only. The proof uses various tools of additive combinatorics, such as the (linear) Bogolyubov theorem, the density increment method, as well as the Balog-Szem\'er\'edi-Gowers and Freiman-Ruzsa theorems.

    发表评论 查看更多 翻译此文

    收起

  • Bender and Canfield proved in 1991 that the generating series of maps in higher genus is a rational function of the generating series of planar maps. In this paper, we give the first bijective proof of this result. Our approach starts with the introduction of a canonical orientation that enables us to construct a bijection between $4$-valent bicolorable maps and a family of unicellular blossoming maps.

    发表评论 查看更多 翻译此文

    收起

  • In a recent paper, Duval, Goeckner, Klivans and Martin disproved the longstanding conjecture by Stanley, that every Cohen-Macaulay simplicial complex is partitionable. We construct counterexamples to this conjecture that are even \emph{balanced}, i.e., their underlying graph has a minimal coloring. This answers a question by Duval et al. in the negative.

    发表评论 查看更多 翻译此文

    收起

  • We here present a general and tractable model for line-of-sight (LOS) scenarios, which is based on the product of two independent and non-identically distributed $\kappa$-$\mu$ shadowed random variables. Simple closed-form expressions for the probability density function, cumulative distribution function and moment-generating function are derived, which are as tractable as the corresponding expressions derived from a product of Nakagami-$m$ random variables. This model simplifies the challenging characterization of LOS product channels, as well as combinations of LOS with non-LOS ones. It also shows a higher flexibility when fitting measurements with respect to exact approaches based on the Rician distribution.

    发表评论 查看更多 翻译此文

    收起

  • We consider a distribution grid used to charge electric vehicles subject to voltage stability and various other constraints. We model this as a class of resource-sharing networks known as bandwidth-sharing networks in the communication network literature. Such networks have proved themselves to be an effective flow-level model of data traffic in wired and wireless networks. We focus on resource sharing networks that are driven by a class of greedy control rules that can be implemented in a decentralized fashion. For a large number of such control rules, we can characterize the performance of the system, subject to voltage stability constraints, by a fluid approximation. This leads to a set of dynamic equations that take into account the stochastic behavior of cars. We show that the invariant point of these equations is unique and can be computed by solving a specific ACOPF problem, which admits an exact convex relaxation. For the class of weighted proportional fairness control, we show

    发表评论 查看更多 翻译此文

    收起

  • Heavy-tailed errors impair the accuracy of the least squares estimate, which can be spoiled by a single grossly outlying observation. As argued in the seminal work of Peter Huber in 1973 [{\it Ann. Statist.} {\bf 1} (1973) 799--821], robust alternatives to the method of least squares are sorely needed. To achieve robustness against heavy-tailed sampling distributions, we revisit the Huber estimator from a new perspective by letting the tuning parameter involved diverge with the sample size. In this paper, we develop nonasymptotic concentration results for such an adaptive Huber estimator, namely, the Huber estimator with the tuning parameter adapted to sample size, dimension, and the variance of the noise. Specifically, we obtain a sub-Gaussian-type deviation inequality and a nonasymptotic Bahadur representation when noise variables only have finite second moments. The nonasymptotic results further yield two conventional normal approximation results that are of independent interest, th

    发表评论 查看更多 翻译此文

    收起

  • We consider a group of computation units trying to cooperatively solve a distributed optimization problem with shared linear equality and inequality constraints. Assuming that the computation units are communicating over a network whose topology is described by a time-invariant directed graph, by combining saddle-point dynamics with Lie bracket approximation techniques we derive a methodology that allows to design distributed continuous-time optimization algorithms that solve this problem under minimal assumptions on the graph topology as well as on the structure of the constraints. We discuss several extensions as well as special cases in which the proposed procedure becomes particularly simple.

    发表评论 查看更多 翻译此文

    收起

  • We prove that any rigid representation of $\pi_1\Sigma_g$ in $\mathrm{Homeo}_+(S^1)$ with Euler number at least $g$ is necessarily semi-conjugate to a discrete, faithful representation into $\mathrm{PSL}(2,\mathbb{R})$. Combined with earlier work of Matsumoto, this precisely characterizes Fuchsian actions by a topological rigidity property. Though independent, this work can be read as an introduction to the companion paper {\em rigidity and geometricity for surface group actions on the circle}, by the same authors.

    发表评论 查看更多 翻译此文

    收起

  • Let $H$ be a transfer Krull monoid over a finite ablian group $G$ (for example, rings of integers, holomorphy rings in algebraic function fields, and regular congruence monoids in these domains). Then each nonunit $a \in H$ can be written as a product of irreducible elements, say $a = u_1 \ldots u_k$, and the number of factors $k$ is called the length of the factorization. The set $\mathsf L (a)$ of all possible factorization lengths is the set of lengths of $a$. It is classical that the system $\mathcal L (H) = \{ \mathsf L (a) \mid a \in H \}$ of all sets of lengths depends only on the group $G$, and a standing conjecture states that conversely the system $\mathcal L (H)$ is characteristic for the group $G$. Let $H'$ be a further transfer Krull monoid over a finite ablian group $G'$ and suppose that $\mathcal L (H)= \mathcal L (H')$. We prove that, if $G\cong C_n^r$ with $r\le n-3$ or ($r\ge n-1\ge 2$ and $n$ is a prime power), then $G$ and $G'$ are isomorphic.

    发表评论 查看更多 翻译此文

    收起

  • In this paper we introduce the polynomials $\{d_n^{(r)}(x)\}$ and $\{D_n^{(r)}(x)\}$ given by $d_n^{(r)}(x)=\sum_{k=0}^n\binom{x+r+k}k\binom{x-r}{n-k} \ (n\ge 0)$, $D_0^{(r)}(x)=1,\ D_1^{(r)}(x)=x$ and $D_{n+1}^{(r)}(x)=xD_n^{(r)}(x)-n(n+2r)D_{n-1}^{(r)}(x)\ (n\ge 1).$ We show that $\{D_n^{(r)}(x)\}$ are orthogonal polynomials for $r>-\frac 12$, and establish many identities for $\{d_n^{(r)}(x)\}$ and $\{D_n^{(r)}(x)\}$, especially obtain a formula for $d_n^{(r)}(x)^2$ and the linearization formulas for $d_m^{(r)}(x)d_n^{(r)}(x)$ and $D_m^{(r)}(x)D_n^{(r)}(x)$. As an application we extend recent work of Sun and Guo.

    发表评论 查看更多 翻译此文

    收起