30,547 research outputs found

    Adversarial Deep Structured Nets for Mass Segmentation from Mammograms

    Full text link
    Mass segmentation provides effective morphological features which are important for mass diagnosis. In this work, we propose a novel end-to-end network for mammographic mass segmentation which employs a fully convolutional network (FCN) to model a potential function, followed by a CRF to perform structured learning. Because the mass distribution varies greatly with pixel position, the FCN is combined with a position priori. Further, we employ adversarial training to eliminate over-fitting due to the small sizes of mammogram datasets. Multi-scale FCN is employed to improve the segmentation performance. Experimental results on two public datasets, INbreast and DDSM-BCRP, demonstrate that our end-to-end network achieves better performance than state-of-the-art approaches. \footnote{https://github.com/wentaozhu/adversarial-deep-structural-networks.git}Comment: Accepted by ISBI2018. arXiv admin note: substantial text overlap with arXiv:1612.0597

    Development and Verification of a Flight Stack for a High-Altitude Glider in Ada/SPARK 2014

    Full text link
    SPARK 2014 is a modern programming language and a new state-of-the-art tool set for development and verification of high-integrity software. In this paper, we explore the capabilities and limitations of its latest version in the context of building a flight stack for a high-altitude unmanned glider. Towards that, we deliberately applied static analysis early and continuously during implementation, to give verification the possibility to steer the software design. In this process we have identified several limitations and pitfalls of software design and verification in SPARK, for which we give workarounds and protective actions to avoid them. Finally, we give design recommendations that have proven effective for verification, and summarize our experiences with this new language

    Three-intensity decoy state method for device independent quantum key distribution with basis dependent errors

    Full text link
    We study the measurement device independent quantum key distribution (MDIQKD) in practice with limited resource, when there are only 3 different states in implementing the decoy-state method and when there are basis dependent coding errors. We present general formulas for the decoy-state method for two-pulse sources with 3 different states, which can be applied to the recently proposed MDIQKD with imperfect single-photon source such as the coherent states or the heralded states from the parametric down conversion. We point out that the existing result for secure QKD with source coding errors does not always hold. We find that very accurate source coding is not necessary. In particular, we loosen the precision of existing result by several magnitude orders for secure QKD.Comment: Published version with Eq.(17) corrected. We emphasize that our major result (Eq.16) for the decoy-state part can be applied to generate a key rate very close to the ideal case of using infinite different coherent states, as was numerically demonstrated in Ref.[21]. Published in PRA, 2013, Ja

    Phase structures of strong coupling lattice QCD with overlap fermions at finite temperature and chemical potential

    Full text link
    We perform the first study of lattice QCD with overlap fermions at finite temperature TT and chemical potential μ\mu. We start from the Taylor expanded overlap fermion action, and derive in the strong coupling limit the effective free energy by mean field approximation. On the (μ,T\mu,T) plane and in the chiral limit, there is a tricritical point, separating the second order chiral phase transition line at small μ\mu and large TT, and first order chiral phase transition line at large μ\mu and small TT

    Nanosecond electro-optics of nematic liquid crystal with negative dielectric anisotropy

    Full text link
    We study a nanosecond electro-optic response of a nematic liquid crystal in a geometry where an applied electric field E\textbf{E} modifies the tensor order parameter but does not change the orientation of the optic axis (director N^\hat{\textbf{N}}). We use a nematic with negative dielectric anisotropy with the electric field applied perpendicularly to N^\hat{\textbf{N}}. The field changes the dielectric tensor at optical frequencies (optic tensor) due to the following mechanisms: (a) nanosecond creation of the biaxial orientational order; (b) uniaxial modification of the orientational order that occurs over timescales of tens of nanoseconds, and (c) the quenching of director fluctuations with a wide range of characteristic times up to milliseconds. We develop a model to describe the dynamics of all three mechanisms. We design the experimental conditions to selectively suppress the contributions from fluctuations quenching (c) and from the biaxial order effect (a) and thus, separate the contributions of the three mechanisms in the electro-optic response. As a result, the experimental data can be well fitted with the model. The analysis provides a detailed physical picture of how the liquid crystal responds to a strong electric field on a timescale of nanoseconds. This work provides a useful guide in the current search of the biaxial nematic phase. Namely, the temperature dependence of the biaxial susceptibility allows one to estimate the temperature of the potential uniaxial-to-biaxial phase transition. An analysis of the fluctuations quenching indicates that on a timescale of nanoseconds, the classic model with constant viscoelastic material parameters might reach its limit of validity. The effect of nanosecond electric modification of the order parameter (NEMOP) can be used in applications in which one needs to achieve ultrafast (nanosecond) changes of optical characteristics.Comment: 42 pages, 13 figures, 2 appendice

    The Influence of Magnetic Domain Walls on Longitudinal and Transverse Magnetoresistance in Tensile Strained (Ga,Mn)As Epilayers

    Full text link
    We present a theoretical analysis of recent experimental measurements of magnetoresistance in (Ga,Mn)As epilayers with perpendicular magnetic anisotropy. The model reproduces the field-antisymmetric anomalies observed in the longitudinal magnetoresistance in the planar geometry (magnetic field in the epilayer plane and parallel to the current density), as well as the unusual shape of the accompanying transverse magnetoresistance. The magnetoresistance characteristics are attributed to circulating currents created by the presence of magnetic domain walls

    Association schemes from the action of PGL(2,q)PGL(2,q) fixing a nonsingular conic in PG(2,q)

    Full text link
    The group PGL(2,q)PGL(2,q) has an embedding into PGL(3,q)PGL(3,q) such that it acts as the group fixing a nonsingular conic in PG(2,q)PG(2,q). This action affords a coherent configuration R(q)R(q) on the set L(q)L(q) of non-tangent lines of the conic. We show that the relations can be described by using the cross-ratio. Our results imply that the restrictions R+(q)R_{+}(q) and R(q)R_{-}(q) to the sets L+(q)L_{+}(q) of secant lines and to the set L(q)L_{-}(q) of exterior lines, respectively, are both association schemes; moreover, we show that the elliptic scheme R(q)R_{-}(q) is pseudocyclic. We further show that the coherent configuration R(q2)R(q^2) with qq even allow certain fusions. These provide a 4-class fusion of the hyperbolic scheme R+(q2)R_{+}(q^2), and 3-class fusions and 2-class fusions (strongly regular graphs) of both schemes R+(q2)R_{+}(q^2) and $R_{-}(q^2). The fusion results for the hyperbolic case are known, but our approach here as well as our results in the elliptic case are new.Comment: 33 page
    corecore