Search results for "computer programming"
showing 10 items of 741 documents
On the Bishop–Phelps–Bollobás theorem for multilinear mappings
2017
Abstract We study the Bishop–Phelps–Bollobas property and the Bishop–Phelps–Bollobas property for numerical radius. Our main aim is to extend some known results about norm or numerical radius attaining operators to multilinear and polynomial cases. We characterize the pair ( l 1 ( X ) , Y ) to have the BPBp for bilinear forms and prove that on L 1 ( μ ) the numerical radius and the norm of a multilinear mapping are the same. We also show that L 1 ( μ ) fails the BPBp-nu for multilinear mappings although L 1 ( μ ) satisfies it in the operator case for every measure μ.
Electronics for Application of Ion Beams in Nanoscience
2009
The breadth of ion-beam nanoscience methods discussed in the proceeding chapters implies that the control and readout systems also span a wide range of techniques. For many nanoscience and technology applications the need to process or characterise a batches of samples has lead to a convergence of data acquisition systems and control systems. This coupled with the development of high-performance lowcost computing over the past decades has lead to a progressive evolution in data acquisition technology. Historically, much of the electronics used in nanoscience and technology using ion beams is based on nuclear analogue pulse counting and spectrometry where NIM (Nuclear Instrumentation Modules…
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
2020
Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…
A Measure of Trust: The Italian Regional Divide in a Latent Class Approach
2017
Social differences within countries may partly explain the lack of economic convergence and the persistence of regional disparities. The case of Italy is emblematic: economic gap between North and South remains at high levels with large differences in social capital and in trust. In this paper, we use the micro data from the ISTAT “Aspects of Daily Life” Survey to build a measure of “trust in others” and a measure of “trust in institutions” through a latent class model to attribute a trust score to the Italian households and the Italian regions and, in this way, to add elements of knowledge useful to policies. Our measures confirm a persistent territorial divide although the regional mappin…
CONCEPTS IN BIOLOGY
2014
Professor Henry C. Rebsamen, General Director of Normal Education, as proof of his great efforts for the advancement of the youth education, started the class in Concepts in Biology, doing us the honor of proposing a class in this interesting subject, and obtaining from the Ministry of Justice and Public Instruction their gracious respective appointment.
PT-symmetry and Schrödinger operators. The double well case
2015
We study a class of $PT$-symmetric semiclassical Schrodinger operators, which are perturbations of a selfadjoint one. Here, we treat the case where the unperturbed operator has a double-well potential. In the simple well case, two of the authors have proved in [6] that, when the potential is analytic, the eigenvalues stay real for a perturbation of size $O(1)$. We show here, in the double-well case, that the eigenvalues stay real only for exponentially small perturbations, then bifurcate into the complex domain when the perturbation increases and we get precise asymptotic expansions. The proof uses complex WKB-analysis, leading to a fairly explicit quantization condition.
How Do Students Value the Importance of Twenty-first Century Skills?
2014
Frameworks of twenty-first century skills have attained a central role in school development and curriculum changes all over the world. There is a common understanding of the need for meta-skills such as problem solving, reasoning, collaboration, and self-regulation. This article presents results from a Finnish study, in which 718 school pupils aged 11 to 15 years were asked to anticipate the skills they would need in the future. Accordingly, they were asked to value and rank the twenty-first century skills listed in existing frameworks and pick out those they regarded as the most important they had learned. Social skills and collaboration were ranked highest, both in the listed frameworks …
Crowd Models for Emergency Evacuation: A Review Targeting Human-Centered Sensing
2013
Emergency evacuation of crowds is a fascinating phenomenon that has attracted researchers from various fields. Better understanding of this class of crowd behavior opens up for improving evacuation policies and smarter design of buildings, increasing safety. Recently, a new class of disruptive technology has appeared: Human-centered sensing which allows crowd behavior to be monitored in real-time, and provides the basis for real-time crowd control. The question then becomes: to what degree can previous crowd models incorporate this development, and what areas need further research? In this paper, we provide a survey that describes some widely used crowd models and discuss their advantages a…
Supervised Quantum Learning without Measurements
2017
We propose a quantum machine learning algorithm for efficiently solving a class of problems encoded in quantum controlled unitary operations. The central physical mechanism of the protocol is the iteration of a quantum time-delayed equation that introduces feedback in the dynamics and eliminates the necessity of intermediate measurements. The performance of the quantum algorithm is analyzed by comparing the results obtained in numerical simulations with the outcome of classical machine learning methods for the same problem. The use of time-delayed equations enhances the toolbox of the field of quantum machine learning, which may enable unprecedented applications in quantum technologies. The…
Modeling epidemics through ladder operators
2020
Highlights • We propose an operatorial model to describe epidemics. • The model describes well the asymptotic numbers of the epidemics. • Ladder operators are used to model exchanges between the “actors” of the system.