1,385 research outputs found

    Robust rank correlation based screening

    Full text link
    Independence screening is a variable selection method that uses a ranking criterion to select significant variables, particularly for statistical models with nonpolynomial dimensionality or "large p, small n" paradigms when p can be as large as an exponential of the sample size n. In this paper we propose a robust rank correlation screening (RRCS) method to deal with ultra-high dimensional data. The new procedure is based on the Kendall \tau correlation coefficient between response and predictor variables rather than the Pearson correlation of existing methods. The new method has four desirable features compared with existing independence screening methods. First, the sure independence screening property can hold only under the existence of a second order moment of predictor variables, rather than exponential tails or alikeness, even when the number of predictor variables grows as fast as exponentially of the sample size. Second, it can be used to deal with semiparametric models such as transformation regression models and single-index models under monotonic constraint to the link function without involving nonparametric estimation even when there are nonparametric functions in the models. Third, the procedure can be largely used against outliers and influence points in the observations. Last, the use of indicator functions in rank correlation screening greatly simplifies the theoretical derivation due to the boundedness of the resulting statistics, compared with previous studies on variable screening. Simulations are carried out for comparisons with existing methods and a real data example is analyzed.Comment: Published in at http://dx.doi.org/10.1214/12-AOS1024 the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org). arXiv admin note: text overlap with arXiv:0903.525

    Rethinking China's underurbanization: An evaluation of its county-to-city upgrading policy

    Get PDF
    "It has been argued in the literature that China is underurbanized in large part because of restrictions on migration. While the presence of migration barriers can help explain why existing cities fail to achieve their optimal size, it cannot explain the lack of cities. Although migration has become much easier over time, the number of cities in China has been rather stagnant. In this paper, we argue that lack of appropriate mechanisms for creating new cities is another reason for underurbanization. Under China's hierarchical governance structure, the only way to create new cities is through the centralized policy of upgrading existing counties or prefectures into cities. However, in practice the implementation of the county-to-city upgrading policy was more complicated than expected. Based on a county-level panel dataset, this paper shows that jurisdictions that were upgraded to cities prior to 1998 do not perform better relative to their counterparts that remain to be counties in terms of both economic growth and providing public services. The policy was retracted in 1997, freezing the number of county-level cities since then. This, in turn, contributes to the observed underurbanization." from authors' abstractUrbanization, City creation, Governance structure, Political centralization, Development strategies,

    Influence of increasing number of mating partners on mating behaviour and reproduction in Brandt’s voles

    Get PDF
    The influence of increasing number of mating partners on the copulatory behavior and reproduction in Brandt’s voles (Microtus brandti) was studied. Compared with the control group of 1 ♂ + 1 ♀, our results showed when increasing only female partners, the mating opportunity was increased in males while decreased in female in the treatment group of 1 ♂ + 2 ♀♀; the mating opportunity of male and female were both decreased significantly in the treatment group of 1 ♂ + 3 ♀♀. When increasing only male partners, male mating opportunity in treatment groups 2 ♂♂ + 1 ♀ and 3 ♂♂+ 1 ♀ decreased significantly while no change was significant in females in both treatment groups. When increasing the number of male and female partners simultaneously in the treatment group of 2 ♂♂ + 2 ♀♀, the mating opportunity for both males and females was decreased significantly. Comparing with the control, the mean litter size in all five-treatment groups lessened significantly and female pregnancy rate dropped significantly if they copulated less than five times. From these results, we have demonstrated a significant reproductive interference due to mate competition in Brandt’s voles and thus, competitively reproductive interference may be an important behavioral mechanism in regulating population density in this rodent species. However, due to possible laboratory artifacts, we still need further study, especially in the field, to validate our results

    Long-distance thermal temporal ghost imaging over optical fibers

    Full text link
    A thermal ghost imaging scheme between two distant parties is proposed and experimentally demonstrated over long-distance optical fibers. In the scheme, the weak thermal light is split into two paths. Photons in one path are spatially diffused according to their frequencies by a spatial dispersion component, then illuminate the object and record its spatial transmission information. Photons in the other path are temporally diffused by a temporal dispersion component. By the coincidence measurement between photons of two paths, the object can be imaged in a way of ghost imaging, based on the frequency correlation between photons in the two paths. In the experiment, the weak thermal light source is prepared by the spontaneous four-wave mixing in a silicon waveguide. The temporal dispersion is introduced by single mode fibers of 50 km, which also could be looked as a fiber link. Experimental results show that this scheme can be realized over long-distance optical fibers

    Influence of male surgical sterilization on the copulatory behavior and reproduction of Brandt\u27s vole

    Get PDF
    The influence of sterilized male on the copulatory behavior and reproduction of Brandt′s vole was studied by using the method of surgical sterilization. Male surgical sterilization did not influence the copulatory behavior of Brandt\u27s vole. Mating times with intact mates and litter size of female Brandt′s voles in male sterilized groups decreased compared with the control groups. The results supported the hypothesis of competitively reproductive interference of sterilized males. Thus, sterilization can be a viable method to control voles

    Jitter analysis of a superconducting nanowire single photon detector

    Full text link
    Jitter is one of the key parameters for a superconducting nanowire single photon detector (SNSPD). Using an optimized time-correlated single photon counting system for jitter measurement, we extensively studied the dependence of system jitter on the bias current and working temperature. The signal-to-noise ratio of the single-photon-response pulse was proven to be an important factor in system jitter. The final system jitter was reduced to 18 ps by using a high-critical-current SNSPD, which showed an intrinsic SNSPD jitter of 15 ps. A laser ranging experiment using a 15-ps SNSPD achieved a record depth resolution of 3 mm at a wavelength of 1550 nm.Comment: 7 pages, 6 figure

    Controlled entanglement routing between two virtual pathways

    Full text link
    We demonstrate controlled entanglement routing between bunching and antibunching path-entangled two-photon states in an unbalanced Mach-Zehnder interferometer (UMZI), in which the routing process is controlled by the relative phase difference in the UMZI. Regarding bunching and antibunching path-entangled two-photon states as two virtual ports, we can consider the UMZI as a controlled entanglement router, which bases on the coherent manipulation of entanglement. Half of the entanglement within the input two-photon state is coherently routed between the two virtual ports, while the other is lost due to the time distinguishability introduced by the UMZI. Pure bunching or antibunching path entangled two-photon states are obtained based on this controlled entanglement router. The results show that we can employ the UMZI as general entanglement router for practical quantum information application.Comment: Comments are welcom

    Experimental preparation and verification of quantum money

    Full text link
    A quantum money scheme enables a trusted bank to provide untrusted users with verifiable quantum banknotes that cannot be forged. In this work, we report an experimental demonstration of the preparation and verification of unforgeable quantum banknotes. We employ a security analysis that takes experimental imperfections fully into account. We measure a total of 3.6×1063.6\times 10^6 states in one verification round, limiting the forging probability to 10710^{-7} based on the security analysis. Our results demonstrate the feasibility of preparing and verifying quantum banknotes using currently available experimental techniques.Comment: 12 pages, 4 figure

    Experimental unconditionally secure covert communication in dense wavelength-division multiplexing networks

    Full text link
    Covert communication offers a method to transmit messages in such a way that it is not possible to detect that the communication is happening at all. In this work, we report an experimental demonstration of covert communication that is provably secure against unbounded quantum adversaries. The covert communication is carried out over 10 km of optical fiber, addressing the challenges associated with transmission over metropolitan distances. We deploy the protocol in a dense wavelength-division multiplexing infrastructure, where our system has to coexist with a co-propagating C-band classical channel. The noise from the classical channel allows us to perform covert communication in a neighbouring channel. We perform an optimization of all protocol parameters and report the transmission of three different messages with varying levels of security. Our results showcase the feasibility of secure covert communication in a practical setting, with several possible future improvements from both theory and experiment.Comment: 13 pages, 5 figure
    corecore