The third Gravitational-Wave Transient Catalog (GWTC-3) describes signals detected with Advanced LIGO and Advanced Virgo up to the end of their third observing run. Updating the previous GWTC-2.1, we present candidate...
详细信息
The third Gravitational-Wave Transient Catalog (GWTC-3) describes signals detected with Advanced LIGO and Advanced Virgo up to the end of their third observing run. Updating the previous GWTC-2.1, we present candidate gravitational waves from compact binary coalescences during the second half of the third observing run (O3b) between 1 November 2019, 15∶00 Coordinated Universal Time (UTC) and 27 March 2020, 17∶00 UTC. There are 35 compact binary coalescence candidates identified by at least one of our search algorithms with a probability of astrophysical origin pastro>0.5. Of these, 18 were previously reported as low-latency public alerts, and 17 are reported here for the first time. Based upon estimates for the component masses, our O3b candidates with pastro>0.5 are consistent with gravitational-wave signals from binary black holes or neutron-star–black-hole binaries, and we identify none from binary neutron stars. However, from the gravitational-wave data alone, we are not able to measure matter effects that distinguish whether the binary components are neutron stars or black holes. The range of inferred component masses is similar to that found with previous catalogs, but the O3b candidates include the first confident observations of neutron-star–black-hole binaries. Including the 35 candidates from O3b in addition to those from GWTC-2.1, GWTC-3 contains 90 candidates found by our analysis with pastro>0.5 across the first three observing runs. These observations of compact binary coalescences present an unprecedented view of the properties of black holes and neutron stars.
In this work the inverse problem of identification of structural stiffness coefficients of a damped spring-mass system is tackled. The problem is solved by using different versions of Ant Colony Optimization (ACO) met...
详细信息
In this work the inverse problem of identification of structural stiffness coefficients of a damped spring-mass system is tackled. The problem is solved by using different versions of Ant Colony Optimization (ACO) metaheuristic solely or coupled with the Hooke-Jeeves (HJ) local search algorithm. The evaluated versions of ACO are based on a discretization procedure to deal with the continuous domain design variables together with different pheromone evaporation and deposit strategies and also on the frequency of calling the local search algorithm. The damage estimation is evaluated using noiseless and noisy synthetic experimental data assuming a damage configuration throughout the structure. The reported results show the hybrid method as the best choice when both rank-based pheromone deposit and a new heuristic information based on the search history are used.
The article takes a look at an algorithm of decision making in educational management data system based on the Analytic Hierarchy Process. This technique allows to choose the best of the proposed alternatives, the cha...
详细信息
The article takes a look at an algorithm of decision making in educational management data system based on the Analytic Hierarchy Process. This technique allows to choose the best of the proposed alternatives, the characteristics of which are vectors with heterogeneous individual components including those that are not clearly defined. The architecture of a decision-making support system that implements the proposed algorithm is suggested.
Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstr...
详细信息
Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behavior on demand. We test it on two practical QC systems for key distribution and coin tossing, and show that newly created deviations lead to side channels. This reveals that laser damage is a potential security risk to existing QC systems, and necessitates their testing to guarantee security.
The most recent video compression standard is the High Efficient Video Coding (HEVC). It was created with the goal of reaching better videos compression compared to the existing ones. One of the most time-consuming mo...
详细信息
The most recent video compression standard is the High Efficient Video Coding (HEVC). It was created with the goal of reaching better videos compression compared to the existing ones. One of the most time-consuming modules of HEVC encoder is the Sum of Absolute Transform Differences (SATD), which is used in intra prediction mode decision and in Fractional pixel Motion Estimation (FME) modules. This paper proposes a dedicated architecture for SATD, based on 2-D 8×8 Hadamard Transform, which is divided into 1-D horizontal and 1-D vertical transforms. The architecture was synthesized to ASIC 45 nm technology and to FPGA. The results show that the whole SATD architecture consumes a total cell area of 12231 μm2, dissipates 3765.6 μW of total power and consumes 50.85 pJ of energy per SATD operation.
We present the results of a search for gravitational-wave transients associated with core-collapse supernova SN 2023ixf, which was observed in the galaxy Messier 101 via optical emission on 2023 May 19, during the LIG...
This paper proposes the use of approximate adder circuits for 3×3 and 5×5 Gaussian filter implementations. The Gaussian filter is a convolution operator which is used to blur images and to remove noise, whos...
详细信息
This paper proposes the use of approximate adder circuits for 3×3 and 5×5 Gaussian filter implementations. The Gaussian filter is a convolution operator which is used to blur images and to remove noise, whose convolution implementation can be designed in hardware using only shifts and addition operations. In this work we evaluate the levels of approximations in computing or loss of accuracy in the arithmetic dataflow that the Gaussian filter can tolerate for a set of eight images. Our work deals with different levels of approximation in Ripple Carry Adders (RCA) which are part of the Gaussian filters adder tree implemented in hardware, and later compared to the best precise implementation of the same filter. Our results show an average energy savings of up to 40% and 25% for the approximate 3×3 and 5×5 Gaussian filters, respectively, without compromising the overall filtered images quality.
In recent years, human identification based on face recognition has attracted the attention of the scientific community and the general public due to its wide range of applications. A face recognition system involves ...
详细信息
ISBN:
(纸本)9781479919611
In recent years, human identification based on face recognition has attracted the attention of the scientific community and the general public due to its wide range of applications. A face recognition system involves three important phases: face detection, feature extraction and classification (identification and/or verification). The robustness of face recognition could be improved by treating the variations in these stages. One of the main issues in design of face recognition system is how to extract discriminative facial features. A precise extraction of a representative feature set will improve the performance of a face recognition system. Various techniques have been used to represent images efficiently, of which the most well-known and widely applied are Wavelet, Contourlet, Shearlet and Curvelet Transform. Their ability to capture localized time-frequency information of image motivates their use for feature extraction. In this paper, we conduct a systematic empirical study on these transforms as feature extractors from face images. To further reduce the feature dimensionality, we adopt Principal Component Analysis and Linear Discriminant Analysis to select the most discriminative feature sets. The performance levels delivered by each transform are contrasted in terms of the accuracy measure computed over the outputs generated by the Support Vector Machine classifier (SVM). Experimental results conducted on a publicly available database are reported whereby we observe that the Curvelet Transform followed by the Wavelet Transform significantly outperform the others according to accuracy measure calculated over the SVM classifier.
Chronic care manages long-term, progressive conditions, while acute care addresses short-term conditions. Chronic conditions increasingly strain health systems, which are often unprepared for these demands. This study...
In this paper, we seek the optimal combination of dedicated radix-2~m multiplication blocks, and adder trees schemes for the realization of optimized radix-2~m array multipliers. The operands of the multipliers are ge...
详细信息
ISBN:
(纸本)9781509002474
In this paper, we seek the optimal combination of dedicated radix-2~m multiplication blocks, and adder trees schemes for the realization of optimized radix-2~m array multipliers. The operands of the multipliers are generated by 2's complement radix-4, radix-16, radix-256, and radix-65536 dedicated multiplication blocks. The operands are added using different adder trees schemes such as Wallace, RBA, and compressors. The number of operands defines the amount of adders blocks used in the addition tree of the array multiplier. The logic synthesis was realized using Cadence Encounter RTL Compiler tool with Nangate 45nm Open Cell library. Area, delay and power consumption results are presented for the synthesized proposed multipliers. As will be presented, the combination of radix-4 or radix-16 dedicated multiplication block and multi-operand adder tree schemes yields the best power - performance results in the radix-2~m array multipliers.
暂无评论