20,520 research outputs found
Computing a rectilinear shortest path amid splinegons in plane
We reduce the problem of computing a rectilinear shortest path between two
given points s and t in the splinegonal domain \calS to the problem of
computing a rectilinear shortest path between two points in the polygonal
domain. As part of this, we define a polygonal domain \calP from \calS and
transform a rectilinear shortest path computed in \calP to a path between s and
t amid splinegon obstacles in \calS. When \calS comprises of h pairwise
disjoint splinegons with a total of n vertices, excluding the time to compute a
rectilinear shortest path amid polygons in \calP, our reduction algorithm takes
O(n + h \lg{n}) time. For the special case of \calS comprising of concave-in
splinegons, we have devised another algorithm in which the reduction procedure
does not rely on the structures used in the algorithm to compute a rectilinear
shortest path in polygonal domain. As part of these, we have characterized few
of the properties of rectilinear shortest paths amid splinegons which could be
of independent interest
Controlling Restricted Random Testing: An Examination of the Exclusion Ratio Parameter
In Restricted Random Testing (RRT), the main control parameter is the Target Exclusion Ratio (R), the proportion of the input domain to be excluded from test case generation at each iteration. Empirical investigations have consistently indicated that best failure-finding performance is achieved when the value for the Target Exclusion Ratio is maximised, i.e. close to 100%. This paper explains an algorithm to calculate the Actual Exclusion Ratio for RRT, and applies the algorithm to several simulations, confirming that previous empirically determined values for the Maximum Target Exclusion Ratio do give Actual Exclusion Ratios close to 100%. Previously observed trends of improvement in failure-finding efficiency of RRT corresponding to increases in Target Exclusion Ratios are also identified for Actual Exclusion Ratios.published_or_final_versio
Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud
The increasing massive data generated by various sources has given birth to
big data analytics. Solving large-scale nonlinear programming problems (NLPs)
is one important big data analytics task that has applications in many domains
such as transport and logistics. However, NLPs are usually too computationally
expensive for resource-constrained users. Fortunately, cloud computing provides
an alternative and economical service for resource-constrained users to
outsource their computation tasks to the cloud. However, one major concern with
outsourcing NLPs is the leakage of user's private information contained in NLP
formulations and results. Although much work has been done on
privacy-preserving outsourcing of computation tasks, little attention has been
paid to NLPs. In this paper, we for the first time investigate secure
outsourcing of general large-scale NLPs with nonlinear constraints. A secure
and efficient transformation scheme at the user side is proposed to protect
user's private information; at the cloud side, generalized reduced gradient
method is applied to effectively solve the transformed large-scale NLPs. The
proposed protocol is implemented on a cloud computing testbed. Experimental
evaluations demonstrate that significant time can be saved for users and the
proposed mechanism has the potential for practical use.Comment: Ang Li and Wei Du equally contributed to this work. This work was
done when Wei Du was at the University of Arkansas. 2018 EAI International
Conference on Security and Privacy in Communication Networks (SecureComm
The Emergence of Interactive Behaviour: A Model of Rational Menu Search
One reason that human interaction with technology is difficult to understand is because the way in which people perform interactive tasks is highly adaptive. One such interactive task is menu search. In the current article we test the hypothesis that menu search is rationally adapted to (1) the ecological structure
of interaction, (2) cognitive and perceptual limits, and
(3) the goal to maximise the trade-off between speed and accuracy.
Unlike in previous models, no assumptions are made
about the strategies available to or adopted by users, rather the menu search problem is specified as a reinforcement learning problem and behaviour emerges by finding the optimal policy.
The model is tested against existing empirical findings
concerning the effect of menu organisation and menu length.
The model predicts the effect of these variables on task completion time and eye movements. The discussion considers the pros and cons of the modelling approach relative to other well-known modelling approaches
Ellagic acid, a phenolic compound, exerts anti-angiogenesis effects via VEGFR-2 signaling pathway in breast cancer
Anti-angiogenesis targeting VEGFR-2 has been considered as an important strategy for cancer therapy. Ellagic acid is a naturally existing polyphenol widely found in fruits and vegetables. It was reported that ellagic acid interfered with some angiogenesis-dependent pathologies. Yet the mechanisms involved were not fully understood. Thus, we analyzed its anti-angiogenesis effects and mechanisms on human breast cancer utilizing in-vitro and in-vivo methodologies. The in-silico analysis was also carried out to further analyze the structure-based interaction between ellagic acid and VEGFR-2. We found that ellagic acid significantly inhibited a series of VEGF-induced angiogenesis processes including proliferation, migration, and tube formation of endothelial cells. Besides, it directly inhibited VEGFR-2 tyrosine kinase activity and its downstream signaling pathways including MAPK and PI3K/Akt in endothelial cells. Ellagic acid also obviously inhibited neo-vessel formation in chick chorioallantoic membrane and sprouts formation of chicken aorta. Breast cancer xenografts study also revealed that ellagic acid significantly inhibited MDA-MB-231 cancer growth and P-VEGFR2 expression. Molecular docking simulation indicated that ellagic acid could form hydrogen bonds and aromatic interactions within the ATP-binding region of the VEGFR-2 kinase unit. Taken together, ellagic acid could exert anti-angiogenesis effects via VEGFR-2 signaling pathway in breast cancer. © 2012 The Author(s).published_or_final_versio
Different mechanisms of cis-9,trans-11- and trans-10,cis-12- conjugated linoleic acid affecting lipid metabolism in 3T3-L1 cells
Conjugated linoleic acid (CLA) has been shown to reduce body fat mass in various experimental animals. It is valuable to identify its influence on enzymes involved in energy expenditure, apoptosis, fatty acid oxidation and lipolysis. We investigated isomer-specific effects of high dose, long treatment of CLA (75.4 Μmol/L, 8 days) on protein and gene expression of these enzymes in cultured 3T3-L1 cells. Proteomics identified significant up- or down-regulation of 52 proteins by either CLA isomer. Protein and gene expression of uncoupling protein (UCP) 1, UCP3, perilipin and peroxisome proliferator-activated receptor (PPAR) α increased whereas UCP2 reduced for both CLA isomers. And eight-day treatment of trans-10,. cis-12 CLA, but not cis-9,. trans-11 CLA, significantly up-regulated protein and mRNA levels of PKA (P<05), CPT-1 and TNF-α (P<01). Compared to protein expression, both isomers did not significantly influence the mRNA expression of HSL, ATGL, ACO and leptin. In conclusion, high-dose, long treatment of cis-9,. trans-11 CLA did not promote apoptosis, fatty acid oxidation and lipolysis in adipocytes, but may induce an increase in energy expenditure. trans-10,. cis-12 CLA exhibited greater influence on lipid metabolism, stimulated adipocyte energy expenditure, apoptosis and fatty acid oxidation, but its effect on lipolysis was not obvious. © 2010 Elsevier Inc.postprin
Study of psi(2S) decays to X J/psi
Using J/psi -> mu^+ mu^- decays from a sample of approximately 4 million
psi(2S) events collected with the BESI detector, the branching fractions of
psi(2S) -> eta J/psi, pi^0 pi^0 J/psi, and anything J/psi normalized to that of
psi(2S) -> pi^+ pi^- J/psi are measured. The results are B(psi(2S) -> eta
J/psi)/B(psi(2S) -> pi^+ pi^- J/psi) = 0.098 \pm 0.005 \pm 0.010, B(psi(2S) ->
pi^0 pi^0 J/psi)/B(psi(2S) -> pi^+ pi^- J/psi) = 0.570 \pm 0.009 \pm 0.026, and
B(psi(2S) -> anything J/psi)/B(psi(2S) -> pi^+ pi^- J/psi) = 1.867 \pm 0.026
\pm 0.055.Comment: 13 pages, 8 figure
The effect of cigarette price increase on the cigarette consumption in Taiwan: evidence from the National Health Interview Surveys on cigarette consumption
BACKGROUND: This study uses cigarette price elasticity to evaluate the effect of a new excise tax increase on cigarette consumption and to investigate responses from various types of smokers. METHODS: Our sample consisted of current smokers between 17 and 69 years old interviewed during an annual face-to-face survey conducted by Taiwan National Health Research Institutes between 2000 to 2003. We used Ordinary Least Squares (OLS) procedure to estimate double logarithmic function of cigarette demand and cigarette price elasticity. RESULTS: In 2002, after Taiwan had enacted the new tax scheme, cigarette price elasticity in Taiwan was found to be -0.5274. The new tax scheme brought about an average annual 13.27 packs/person (10.5%) reduction in cigarette consumption. Using the cigarette price elasticity estimate from -0.309 in 2003, we calculated that if the Health and Welfare Tax were increased by another NT$ 3 per pack and cigarette producers shifted this increase to the consumers, cigarette consumption would be reduced by 2.47 packs/person (2.2%). The value of the estimated cigarette price elasticity is smaller than one, meaning that the tax will not only reduce cigarette consumption but it will also generate additional tax revenues. Male smokers who had no income or who smoked light cigarettes were found to be more responsive to changes in cigarette price. CONCLUSIONS: An additional tax added to the cost of cigarettes would bring about a reduction in cigarette consumption and increased tax revenues. It would also help reduce incidents smoking-related illnesses. The additional tax revenues generated by the tax increase could be used to offset the current financial deficiency of Taiwan's National Health Insurance program and provide better public services
First observation of psi(2S)-->K_S K_L
The decay psi(2S)-->K_S K_L is observed for the first time using psi(2S) data
collected with the Beijing Spectrometer (BESII) at the Beijing Electron
Positron Collider (BEPC); the branching ratio is determined to be
B(psi(2S)-->K_S K_L) = (5.24\pm 0.47 \pm 0.48)\times 10^{-5}. Compared with
J/psi-->K_S K_L, the psi(2S) branching ratio is enhanced relative to the
prediction of the perturbative QCD ``12%'' rule. The result, together with the
branching ratios of psi(2S) decays to other pseudoscalar meson pairs
(\pi^+\pi^- and K^+K^-), is used to investigate the relative phase between the
three-gluon and the one-photon annihilation amplitudes of psi(2S) decays.Comment: 5 pages, 4 figures, 2 tables, submitted to Phys. Rev. Let
Designing cost-sharing methods for Bayesian games
We study the design of cost-sharing protocols for two fundamental resource allocation problems, the Set Cover and the Steiner Tree Problem, under environments of incomplete information (Bayesian model). Our objective is to design protocols where the worst-case Bayesian Nash equilibria, have low cost, i.e. the Bayesian Price of Anarchy (PoA) is minimized. Although budget balance is a very natural requirement, it puts considerable restrictions on the design space, resulting in high PoA. We propose an alternative, relaxed requirement called budget balance in the equilibrium (BBiE).We show an interesting connection between algorithms for Oblivious Stochastic optimization problems and cost-sharing design with low PoA. We exploit this connection for both problems and we enforce approximate solutions of the stochastic problem, as Bayesian Nash equilibria, with the same guarantees on the PoA. More interestingly, we show how to obtain the same bounds on the PoA, by using anonymous posted prices which are desirable because they are easy to implement and, as we show, induce dominant strategies for the players
- …
