14,552 research outputs found

    Further Results on Geometric Properties of a Family of Relative Entropies

    Full text link
    This paper extends some geometric properties of a one-parameter family of relative entropies. These arise as redundancies when cumulants of compressed lengths are considered instead of expected compressed lengths. These parametric relative entropies are a generalization of the Kullback-Leibler divergence. They satisfy the Pythagorean property and behave like squared distances. This property, which was known for finite alphabet spaces, is now extended for general measure spaces. Existence of projections onto convex and certain closed sets is also established. Our results may have applications in the R\'enyi entropy maximization rule of statistical physics.Comment: 7 pages, Prop. 5 modified, in Proceedings of the 2011 IEEE International Symposium on Information Theor

    Loss of adiabaticity with increasing tunneling gap in non-integrable multistate Landau-Zener models

    Full text link
    We consider the simplest non-integrable model of multistate Landau-Zener transition. In this model two pairs of levels in two tunnel coupled quantum dots are swept passed each other by the gate voltage. Although this 2 * 2 model is non-integrable, it can be solved analytically in the limit when the inter-level energy distance is much smaller than their tunnel splitting. The result is contrasted to the similar 2 * 1 model, in which one of the dots contains only one level. The latter model does not allow interference of the virtual transition amplitudes, and it is exactly solvable. In 2 * 1 model, the probability for a particle, residing at time t -> -\infty in one dot, to remain in the same dot at t -> \infty falls off exponentially with tunnel coupling. By contrast, in 2 * 2 model, this probability grows exponentially with tunnel coupling. The physical origin of this growth is the formation of the tunneling-induced collective states in the system of two dots. This can be viewed as manifestation of the Dicke effect.Comment: 8 pages, 3 figure

    Black Box Variational Inference

    Full text link
    Variational inference has become a widely used method to approximate posteriors in complex latent variables models. However, deriving a variational inference algorithm generally requires significant model-specific analysis, and these efforts can hinder and deter us from quickly developing and exploring a variety of models for a problem at hand. In this paper, we present a "black box" variational inference algorithm, one that can be quickly applied to many models with little additional derivation. Our method is based on a stochastic optimization of the variational objective where the noisy gradient is computed from Monte Carlo samples from the variational distribution. We develop a number of methods to reduce the variance of the gradient, always maintaining the criterion that we want to avoid difficult model-based derivations. We evaluate our method against the corresponding black box sampling based methods. We find that our method reaches better predictive likelihoods much faster than sampling methods. Finally, we demonstrate that Black Box Variational Inference lets us easily explore a wide space of models by quickly constructing and evaluating several models of longitudinal healthcare data

    The Transformation of Microfinance in India: Experiences, Options and Future

    Get PDF
    The paper looks at the growth and transformation of microfinance organisations (MFO) in India. We first, define microfinance and identify its "value attributes". Having chosen only those MFOs that have microfinance as the core, we look at the transformation experiences. To understand the transformation experiences better, we identify issues that trigger transformation viz: size, diversity of services, financial sustainability, focus and taxation. Having identified these we look at transformation experiences internationally. We examine the Bolivian, Kenyan, Bangladeshi and the Indonesian experience. We then look at the Indian experiences. We argue that the transformation experiences in India are not large in number. However, we have found that there are three forms of organisations that seem to be popular in the microfinance sector - the Non-Banking Finance Companies, the Banks - both Local Area Banks and Urban Co-operative Banks and the Co-operatives. We then argue that in the Indian case, we find that the MFO spins off from the NGO rather than the NGO transforming itself. Having examined various options, we conclude that there is no ideal or easy path for MFOs to mainstream in India. This has implications for regulatory framework. We argue that there should be regulatory changes that allow smaller MFOs to get into more complex forms as they grow organically. We also argue that NGOs should be allowed to invest in the equity of MFOs and MFO promoted banks, as is the case in Bolivia and Africa. We maintain that entry norms on capitalisation for the current forms of organisations (NBFCs, Co-ops and Banks) need not be changed to ensure only genuine MFOs make use of the legislation and not other organisations masquerading as MFOs.

    A Lightweight and Attack Resistant Authenticated Routing Protocol for Mobile Adhoc Networks

    Full text link
    In mobile ad hoc networks, by attacking the corresponding routing protocol, an attacker can easily disturb the operations of the network. For ad hoc networks, till now many secured routing protocols have been proposed which contains some disadvantages. Therefore security in ad hoc networks is a controversial area till now. In this paper, we proposed a Lightweight and Attack Resistant Authenticated Routing Protocol (LARARP) for mobile ad hoc networks. For the route discovery attacks in MANET routing protocols, our protocol gives an effective security. It supports the node to drop the invalid packets earlier by detecting the malicious nodes quickly by verifying the digital signatures of all the intermediate nodes. It punishes the misbehaving nodes by decrementing a credit counter and rewards the well behaving nodes by incrementing the credit counter. Thus it prevents uncompromised nodes from attacking the routes with malicious or compromised nodes. It is also used to prevent the denial-of-service (DoS) attacks. The efficiency and effectiveness of LARARP are verified through the detailed simulation studies.Comment: 14 Pages, IJWM
    corecore