31,279 research outputs found

    Natural Language Inference by Tree-Based Convolution and Heuristic Matching

    Full text link
    In this paper, we propose the TBCNN-pair model to recognize entailment and contradiction between two sentences. In our model, a tree-based convolutional neural network (TBCNN) captures sentence-level semantics; then heuristic matching layers like concatenation, element-wise product/difference combine the information in individual sentences. Experimental results show that our model outperforms existing sentence encoding-based approaches by a large margin.Comment: Accepted by ACL'16 as a short pape

    Guarding a Subspace in High-Dimensional Space with Two Defenders and One Attacker

    Full text link
    This paper considers a subspace guarding game in high-dimensional space which consists of a play subspace and a target subspace. Two faster defenders cooperate to protect the target subspace by capturing an attacker which strives to enter the target subspace from the play subspace without being captured. A closed-form solution is provided from the perspectives of kind and degree. Contributions of the work include the use of the attack subspace (AS) method to construct the barrier, by which the game winner can be perfectly predicted before the game starts. In addition to this inclusion, with the priori information about the game result, a critical payoff function is designed when the defenders can win the game. Then, the optimal strategy for each player is explicitly reformulated as a saddle-point equilibrium. Finally, we apply these theoretical results to a half-space guarding game in three-dimensional space. Since the whole achieved developments are analytical, they require a little memory without computational burden and allow for real-time updates, beyond the capacity of traditional Hamilton-Jacobi-Isaacs method. It is worth noting that this is the first time in the current work to consider the target guarding games for arbitrary high-dimensional space, and in a fully analytical form.Comment: 12 pages, 2 figure

    Moving Target Defense for Deep Visual Sensing against Adversarial Examples

    Full text link
    Deep learning based visual sensing has achieved attractive accuracy but is shown vulnerable to adversarial example attacks. Specifically, once the attackers obtain the deep model, they can construct adversarial examples to mislead the model to yield wrong classification results. Deployable adversarial examples such as small stickers pasted on the road signs and lanes have been shown effective in misleading advanced driver-assistance systems. Many existing countermeasures against adversarial examples build their security on the attackers' ignorance of the defense mechanisms. Thus, they fall short of following Kerckhoffs's principle and can be subverted once the attackers know the details of the defense. This paper applies the strategy of moving target defense (MTD) to generate multiple new deep models after system deployment, that will collaboratively detect and thwart adversarial examples. Our MTD design is based on the adversarial examples' minor transferability to models differing from the one (e.g., the factory-designed model) used for attack construction. The post-deployment quasi-secret deep models significantly increase the bar for the attackers to construct effective adversarial examples. We also apply the technique of serial data fusion with early stopping to reduce the inference time by a factor of up to 5 while maintaining the sensing and defense performance. Extensive evaluation based on three datasets including a road sign image database and a GPU-equipped Jetson embedded computing board shows the effectiveness of our approach

    A chiral quark model study of Z+(4430)Z^+(4430) in the molecular picture

    Full text link
    We investigated the bound state problem of the S wave charged D1DˉD_1 \bar{D}^* (D1DˉD_1' \bar{D}^*) system in a chiral quark model by solving the resonating group method equation. Our preliminary study does not favor the molecular assumption of Z+(4430)Z^+(4430). On the contrary, if Z+(4430)Z^+(4430) is really a molecule, its partner with opposite GG-parity should also exist and probably may be found in the π+ηc(2S)\pi^+\eta_c(2S), J/ψπ+π0J/\psi \pi^+\pi^0, or ψπ+π0\psi'\pi^+\pi^0 channel. For the bottom systems, we found the existence of both IGI^G=1+1^+ and IGI^G=11^- B1BˉB_1 \bar{B}^* (B1BˉB_1' \bar{B}^*) molecules is possible.Comment: 6 pages, 3 figure

    Pc(4457)+P_c(4457)^+, Pc(4440)+P_c(4440)^+, and Pc(4312)+P_c(4312)^+: molecules or compact pentaquarks?

    Full text link
    In a chromomagnetic model, we analyse the properties of the newly observed Pc(4457)+P_c(4457)^+, Pc(4440)+P_c(4440)^+, and Pc(4312)+P_c(4312)^+ states. We estimate the masses of the (uud)8c(ccˉ)8c(uud)_{8_c}(c\bar{c})_{8_c} and (uds)8c(ccˉ)8c(uds)_{8_c}(c\bar{c})_{8_c} pentaquark states by considering the isospin breaking effects. Their values are determined by calculating mass distances from the Σc++D\Sigma_c^{++}D^- and Ξc+D\Xi_c^{\prime+}D^- thresholds, respectively. It is found that the isospin breaking effects on the spectrum are small. From the uncertainty consideration and the rearrangement decay properties in a simple model, we find that it is possible to assign the Pc(4457)+P_c(4457)^+, Pc(4440)+P_c(4440)^+, and Pc(4312)+P_c(4312)^+ as JP=3/2J^P=3/2^-, 1/21/2^-, and 3/23/2^- pentaquark states, respectively. The assignment in the molecule picture can be different, in particular for the Pc(4312)+P_c(4312)^+. The information from open-charm channels, e.g. B[PcΣc++D]/B[PcJ/ψp]{\cal B}[P_c\to\Sigma_c^{++}D^-]/{\cal B}[P_c\to J/\psi p], will play an important role in distinguishing the inner structures of the PcP_c states. Discussions and predictions based on the calculations are also given.Comment: 15 pages, 2 figures, 8 tables. Version accepted by PR

    A method for teleporting an unknown quantum state and its application

    Full text link
    We suggest a method for teleporting an unknown quantum state. In this method the sender Alice first uses a Controlled-Not operation on the particle in the unknown quantum state and an ancillary particle which she wants to send to the receiver Bob. Then she sends ancillary particle to Bob. When Alice is informed by Bob that the ancillary particle is received, she performs a local measurement on the particle and sends Bob the outcome of the local measurement via a classical channel. Depending on the outcome Bob can restore the unknown quantum state, which Alice destroyed, on the ancillary particle successfully. As an application of this method we propose a quantum secure direct communication protocol.Comment: 3 pages, no figur

    Evolution of Filament Barbs

    Full text link
    We present a selected few cases in which the sense of chirality of filament barbs changed within as short as hours. We investigate in detail a quiescent filament on 2003 September 10 and 11. Of its four barbs displaying such changes only one overlay a small polarity inversion line inside the EUV filament channel (EFC). No magnetic elements with magnitude above the noise level were detected at the endpoints of all barbs. In particular, a pair of barbs first approached toward and then departed from each other in H-alpha, with the barb endpoints migrating as far as ~10". We conclude that the evolution of the barbs was driven by flux emergence and cancellation of small bipolar units at the EFC border.Comment: To appear in the Proceedings of the 25th NSO Worksho

    Heavy quark spin selection rules in meson-antimeson states

    Full text link
    In the heavy quark limit, we discuss the spin of the charm-anticharm pair JccˉJ_{c\bar{c}} in an S-wave meson-antimeson molecule or resonance. One finds two cases that JccˉJ_{c\bar{c}} cannot be 0: (a) J=j2j41J=|j_2-j_4|-1 or J=j2+j4+1J=j_2+j_4+1 where JJ is the total spin of the system and j2j_2 (j4j_4) is the total angular momentum of the light degree of freedom in a charmed meson (antimeson); (b) JC=1+,2,3+,...J^C=1^+,2^-,3^+,..., if the two different mesons belong to the same doublet. The decays to spin-singlet charmonium states are suppressed when one of the two conditions is satisfied. We discuss constrained decay properties for selected systems.Comment: 9 pages, 1 table. Comments and suggestions are welcom

    Central Limit Theorems for Supercritical Branching Nonsymmetric Markov Processes

    Full text link
    In this paper, we establish a spatial central limit theorem for a large class of supercritical branching, not necessarily symmetric, Markov processes with spatially dependent branching mechanisms satisfying a second moment condition. This central limit theorem generalizes and unifies all the central limit theorems obtained recently in \cite{RSZ2} for supercritical branching symmetric Markov processes. To prove our central limit theorem, we have to carefully develop the spectral theory of nonsymmetric strongly continuous semigroups which should be of independent interest

    Charmed dibaryon resonances in the potential quark model

    Full text link
    Charmed dibaryon states with the spin-parity Jπ=0+J^{\pi}=0^+, 1+1^+, and 2+2^+are predicted for the two-body YcNY_cN (=Λc=\Lambda_c, Σc\Sigma_c, or Σc\Sigma^*_c) systems. We employ the complex scaling method for the coupled channel Hamiltonian with the YcNY_cN-CTNN potentials, which were proposed in our previous study. We find four sharp resonance states near the ΣcN\Sigma_c N and ΣcN\Sigma^*_c N thresholds. From the analysis of the binding energies of partial channel systems, we conclude that these resonance states are Feshbach resonances. We compare the results with the YcNY_c N resonance states in the heavy quark limit, where the ΣcN\Sigma_c N and ΣcN\Sigma^*_c N thresholds are degenerate, and find that they form two pairs of the heavy-quark doublets in agreement with the heavy quark spin symmetry.Comment: Proceedings of the International Workshop "New Aspects of the Hadron and Astro/Nuclear Physics
    corecore