article stringlengths 0 456k | abstract stringlengths 0 65.5k |
|---|---|
in the five decades since antineutrinos were first detected using a nuclear reactor as the source , these facilities have played host to a large number of neutrino physics experiments . during this time our understanding of neutrino physics and the technologyused to detect antineutrinos have matured to the extent that... | nuclear reactors have served as the antineutrino source for many fundamental physics experiments . the techniques developed by these experiments make it possible to use these very weakly interacting particles for a practical purpose . the large flux of antineutrinos that leaves a reactor carries information about two q... |
in recent years , fifth generation ( 5 g ) wireless networks have attracted extensive research interest . according to the 3rd generation partnership project ( 3gpp ) , 5 g networks should support three major families of applications , including enhanced mobile broadband ( embb ) ; massive machine type communications (... | fifth generation ( 5 g ) wireless networks face various challenges in order to support large - scale heterogeneous traffic and users , therefore new modulation and multiple access ( ma ) schemes are being developed to meet the changing demands . as this research space is ever increasing , it becomes more important to a... |
current research on human dynamics is limited to data collected under normal and stationary circumstances , capturing the regular daily activity of individuals .yet , there is exceptional need to understand how people change their behavior when exposed to rapidly changing or unfamiliar conditions , such as life - th... | despite recent advances in uncovering the quantitative features of stationary human activity patterns , many applications , from pandemic prediction to emergency response , require an understanding of how these patterns change when the population encounters unfamiliar conditions . to explore societal response to extern... |
semiconductor devices have been continuously downscaled ever since the invention of the first transistor , such that the size of the single building component of modern electronic devices has already reached to a few nanometers ( nm ) .in such a regime , two conceptual changes are required in the device modeling method... | numerical utilities of the contact block reduction ( cbr ) method in evaluating the retarded green s function , are discussed for 3-d multi - band open systems that are represented by the atomic tight - binding ( tb ) and continuum ( kp ) band model . it is shown that the methodology to approximate solutions of open sy... |
among biometrics , fingerprints are probably the best - known and widespread because of the fingerprint properties : universality , durability and individuality .unfortunately it has been shown that fingerprint scanners are vulnerable to presentation attacks with an artificial replica of a fingerprint .therefore , it i... | a spoof attack , a subset of presentation attacks , is the use of an artificial replica of a biometric in an attempt to circumvent a biometric sensor . liveness detection , or presentation attack detection , distinguishes between live and fake biometric traits and is based on the principle that additional information c... |
[ secintro ] dyadic data are common in psychosocial and behavioral studies [ ] .many social phenomena , such as dating and marital relationships , are interpersonal by definition , and , as a result , related observations do not refer to a single person but rather to both persons involved in the dyadic relationship . m... | dyadic data are common in the social and behavioral sciences , in which members of dyads are correlated due to the interdependence structure within dyads . the analysis of longitudinal dyadic data becomes complex when nonignorable dropouts occur . we propose a fully bayesian selection - model - based approach to analyz... |
the study of complex networks has notably increased in the last years with applications to a variety of fields ranging from computer science and biology to social science and finance .a central problem in network science is the study of the random walks ( rw ) on a graph , and in particular of the relation between the ... | we present a new approach of topology biased random walks for undirected networks . we focus on a one parameter family of biases and by using a formal analogy with perturbation theory in quantum mechanics we investigate the features of biased random walks . this analogy is extended through the use of parametric equatio... |
the ability to gain control of a huge amount of internet hosts could be easily achieved by the exploitation of worms which self - propagate through popular internet applications and services .internet worms have already proven their capability of inflicting massive - scale disruption and damage to the internet infrastr... | active peer - to - peer ( p2p ) worms present serious threats to the global internet by exploiting popular p2p applications to perform rapid topological self - propagation . active p2p worms pose more deadly threats than normal scanning worms because they do not exhibit easily detectable anomalies , thus many existing ... |
there has been an increasing interest over the last decade in performing large - scale simulations of colloidal systems , proteins , micelles and other biological assemblies .simulating such systems , and the phenomena that take place in them , typically requires a description of dynamical events that occur over a wide... | a general framework for performing event - driven simulations of systems with semi - flexible or rigid bodies interacting under impulsive torques and forces is outlined . two different approaches are presented . in the first , the dynamics and interaction rules are derived from lagrangian mechanics in the presence of c... |
classification of networked data is a quite attractive field with applications in computer vision , bioinformatics , spam detection and text categorization . in recent yearsnetworked data have become widespread due to the increasing importance of social networks and other web - related applications .this growing intere... | we introduce a scalable algorithm , mucca for multiclass node classification in weighted graphs . unlike previously proposed methods for the same task , mucca works in time linear in the number of nodes . our approach is based on a game - theoretic formulation of the problem in which the test labels are expressed as a ... |
epidemic models are classically phrased in ordinary differential equation ( ode ) systems for the host population divided in classes of susceptible individuals and infected ones ( sis system ) , or in addition , a class of recovered individuals due to immunity after an infection to the respective pathogen ( sir epidemi... | we analyse an epidemiological model of competing strains of pathogens and hence differences in transmission for first versus secondary infection due to interaction of the strains with previously aquired immunities , as has been described for dengue fever ( in dengue known as antibody dependent enhancement , ade ) . suc... |
over the course of the last decade , network science has attracted an ever growing interest since it provides important insights on a large class of interacting complex systems .one of the features that has drawn much attention is the structure of interactions highlighted by the network representation .indeed , it has ... | community detection is the process of assigning nodes and links in significant communities ( e.g. clusters , function modules ) and its development has led to a better understanding of complex networks . when applied to sizable networks , we argue that most detection algorithms correctly identify prominent communities ... |
multiple sequence alignment ( msa ) is one of the most fundamental tasks in bioinformatics .while there are many attempts to handle comparative sequence analyses without relying on msa , it still represents a starting point for most evolutionary biology methods .pairwise sequence alignment has been conceptualized as ea... | we propose an approach for multiple sequence alignment ( msa ) derived from the dynamic time warping viewpoint and recent techniques of curve synchronization developed in the context of functional data analysis . starting from pairwise alignments of all the sequences ( viewed as paths in a certain space ) , we construc... |
the motivation for this paper stems from an important , but seemingly forgotten 1982 report by prof .marshall p. tulin presented during the symposium on naval hydrodynamics , titled _ an exact theory of gravity wave generation by moving bodies , its approximation and its implications _some thirty years after its public... | in 1982 , marshall p. tulin published a report proposing a framework for reducing the equations for gravity waves generated by moving bodies into a single nonlinear differential equation solvable in closed form [ _ proc . 14th symp . on naval hydrodynamics _ , 1982 , pp.1951 ] . several new and puzzling issues were hig... |
) by .the lines represent the numerical results for the delta function ( i.e. , all nodes have same activity potential ) and power - law activity distributions .the arrows indicate ^{-1}12 & 12#1212_12%12[1][0] link:\doibase 10.1088/1367 - 2630/18/7/073013[ * * , ( ) ] https://www.amazon.com/guide-temporal-networks-c... | social contact networks underlying epidemic processes in humans and animals are highly dynamic . the spreading of infections on such temporal networks can differ dramatically from spreading on static networks . we theoretically investigate the effects of concurrency , the number of neighbors that a node has at a given ... |
there is already a considerable but widely varying literature on the application of category theory to the life and cognitive sciences such as the work of robert rosen ( , ) and his followers as well as andre ehresmann and jean - paul vanbremeersch and their commentators .the approach taken here is based on a specific ... | there is some consensus among orthodox category theorists that the concept of adjoint functors is the most important concept contributed to mathematics by category theory . we give a heterodox treatment of adjoints using heteromorphisms ( object - to - object morphisms between objects of different categories ) that par... |
a central goal of the gaia mission is to teach us how the galaxy functions and how it was assembled .we can only claim to understand the structure of the galaxy when we have a dynamical model galaxy that reproduces the data .therefore the construction of a satisfactory dynamical model is in a sense a primary goal of th... | techniques for the construction of dynamical galaxy models should be considered essential infrastructure that should be put in place before gaia flies . three possible modelling techniques are discussed . although one of these seems to have significantly more potential than the other two , at this stage work should be ... |
the analysis of dynamic processes taking place in complex networks is a major research area with a wide range of applications in social , biological , and technological systems .the spread of information in online social networks , the evolution of an epidemic outbreak in human contact networks , and the dynamics of ca... | in this paper , we study the dynamics of epidemic processes taking place in adaptive networks of arbitrary topology . we focus our study on the adaptive susceptible - infected - susceptible ( asis ) model , where healthy individuals are allowed to temporarily cut edges connecting them to infected nodes in order to prev... |
the complexity of a large variety of systems , from infrastructures to the cell , is rooted in a network of interactions between their constituents .quantifying the robustness of complex networks is one of the main challenges of network of networks with implications in fields as different as biology or policy making an... | recently much attention has been paid to the study of the robustness of interdependent and multiplex networks and , in particular , networks of networks . the robustness of interdependent networks can be evaluated by the size of a mutually connected component when a fraction of nodes have been removed from these networ... |
electronically tuned microwave oscillators are key components used in a wide variety of microwave communications systems . the phase of the output signal exhibits fluctuations in time about the steady state oscillations giving rise to phase noise a very important characteristic that influences the overall performance e... | we have developed a new methodology and a time - domain software package for the estimation of the oscillation frequency and the phase noise spectrum of non - linear noisy microwave circuits based on the direct integration of the system of stochastic differential equations representing the circuit . our theoretical eva... |
let be independent and identically distributed ( i.i.d . ) -variate random vectors generated from the following model : where is a -dimensional unknown vector of means , and are i.i.d .random vectors with zero mean and common covariance . for the sample, is a sequence of weakly stationary dependent random variables wit... | we consider two alternative tests to the higher criticism test of donoho and jin [ _ ann . statist . _ * 32 * ( 2004 ) 962994 ] for high - dimensional means under the sparsity of the nonzero means for sub - gaussian distributed data with unknown column - wise dependence . the two alternative test statistics are constru... |
when imperative programmers think of lists , they commonly choose doubly linked lists , instead of the singly linked lists that logic and functional programmers use . in the same way ,it is extremely common for trees to be given parent links , whether they are really needed or not .a typical c example might be .... ty... | imperative programmers often use cyclically linked trees in order to achieve o(1 ) navigation time to neighbours . some logic programmers believe that cyclic terms are necessary to achieve the same in logic - based languages . an old but little - known technique provides o(1 ) time and space navigation without cyclic l... |
as hetnet provides flexible and efficient topology to boost spectral efficiency , it has recently aroused immense interest in both academia and industry . as illustrated in fig .[ fig : hetnet_2tiers ] , a hetnet consists of a diverse set of regular macro base stations ( bs ) overlaid with low power pico bss .since thi... | interference is a major performance bottleneck in heterogeneous network ( hetnet ) due to its multi - tier topological structure . we propose almost blank resource block ( abrb ) for interference control in hetnet . when an abrb is scheduled in a macro bs , a resource block ( rb ) with blank payload is transmitted and ... |
[ sec:1 ] * remark .* notation is equivalent to where } _ { n\times 1 } \ , & \rho & = & \rho_{ij } & = & \underbrace { \left [ \begin{array}{c } \rho_{1j } \\ \vdots \\ \rho_{nj } \\ \end{array } \right ] } _ { n \times 1 } \ . \end{array}\ ] ] notation is equivalent to where }_{n \times n } } \ .\end{array}\ ] ] le... | we present statistics ( s - statistics ) based only on random variable ( not random value ) with a mean squared error of mean estimation as a concept of error . |
social media has evolved from friendship based networks to become a major source for the consumption of news ( nist , 2008 ) . on social media, news is decentralised as it provides everyone the means to efficiently report and spread information .in contrast to traditional news wire , information on social media is spre... | rumour detection is hard because the most accurate systems operate retrospectively , only recognising rumours once they have collected repeated signals . by then the rumours might have already spread and caused harm . we introduce a new category of features based on novelty , tailored to detect rumours early on . to co... |
for reliable realization of quantum feedback control , it is indispensable to take into consideration some real - world limitations , such as incomplete knowledge of the physical systems and poor performance of the control devices .various efforts on these issues have been undertaken in these few years , see e.g. , for... | we investigate feedback control of linear quantum systems subject to feedback - loop time delays . in particular , we examine the relation between the potentially achievable control performance and the time delays , and provide theoretical guidelines for the future experimental setup in two physical systems , which are... |
the hungarian - made automated telescope network ( hatnet ; bakos et al .2004 ) survey , has been one of the main contributors to the discovery of transiting exoplanets ( teps ) , being responsible for approximately a quarter of the confirmed teps discovered to date ( fig . 1 ) .it is a wide - field transit survey , si... | we summarize the contribution of the hatnet project to extrasolar planet science , highlighting published planets ( hat - p-1b through hat - p-26b ) . we also briefly discuss the operations , data analysis , candidate selection and confirmation procedures , and we summarize what hatnet provides to the exoplanet communi... |
instrumentation is a technique whereby existing code is modified in order to observe or modify its behaviour .it has a lot of different applications , such as profiling , coverage analysis and cache simulations .one of its most interesting features is however the ability to perform automatic debugging , or at least ass... | adding small code snippets at key points to existing code fragments is called instrumentation . it is an established technique to debug certain otherwise hard to solve faults , such as memory management issues and data races . dynamic instrumentation can already be used to analyse code which is loaded or even generated... |
in a bidirectional relay network , two users exchange information via a relay node .several protocols have been proposed for such a network under the practical half - duplex constraint , i.e. , a node can not transmit and receive at the same time and in the same frequency band .the simplest protocol is the traditional ... | in this paper , we consider the problem of sum rate maximization in a bidirectional relay network with fading . hereby , user 1 and user 2 communicate with each other only through a relay , i.e. , a direct link between user 1 and user 2 is not present . in this network , there exist six possible transmission modes : fo... |
a global economic crisis , such as the recent 2008 - 2009 crisis , is certainly due to a large number of factors . in todays global economy , with strong economic relations between countries , it is important to investigate how a crisis propagates from the country of origin to other countries in the world .indeed , sev... | * we model the spreading of a crisis by constructing a global economic network and applying the susceptible - infected - recovered ( sir ) epidemic model with a variable probability of infection . the probability of infection depends on the strength of economic relations between the pair of countries , and the strength... |
hidden in batse s superb gamma - ray burst lightcurves in different energy bands are temporal and spectral signatures of the fundamental physical processes which produced the observed emission .various techniques have been applied to the batse data to extract these signatures , such as : auto- and crosscorrelations of ... | linear state space modeling determines the hidden autoregressive ( ar ) process in a noisy time series ; for an ar process the time series current value is the sum of current stochastic `` noise '' and a linear combination of previous values . we present preliminary results from modeling a sample of 4 channel batse lad... |
multiple - input multiple - output ( mimo ) systems with large number ( e.g. , tens ) of transmit and receive antennas , referred to as ` large - mimo systems , ' are of interest because of the high capacities / spectral efficiencies theoretically predicted in these systems , .research in low - complexity receive proce... | low - complexity near - optimal detection of large - mimo signals has attracted recent research . recently , we proposed a local neighborhood search algorithm , namely _ reactive tabu search _ ( rts ) algorithm , as well as a factor - graph based _ belief propagation _ ( bp ) algorithm for low - complexity large - mimo... |
one of the most pervasive tendencies of humans is putting things in ranking order . in human societies these tendencies are reflected in their social interactions and networks being hierarchical in many respects .hierarchies and ranks emerge due to individuals subjective perceptions that some other individuals are in s... | in human societies , people s willingness to compete and strive for better social status as well as being envious of those perceived in some way superior lead to social structures that are intrinsically hierarchical . here we propose an agent - based , network model to mimic the ranking behaviour of individuals and its... |
in recent years , gaussian filters have assumed a central role in image filtering and techniques for accurate measurement .the implementation of the gaussian filter in one or more dimensions has typically been done as a convolution with a gaussian kernel , that leads to a high computational cost in its practical applic... | computational kernel of the three - dimensional variational data assimilation ( 3d - var ) problem is a linear system , generally solved by means of an iterative method . the most costly part of each iterative step is a matrix - vector product with a very large covariance matrix having gaussian correlation structure . ... |
the contact pattern among individuals in a population is an essential factor for the spread of infectious diseases . in deterministic models, the transmission is usually modelled using a contact rate function , which depends on the contact pattern among individuals and also on the probability of disease transmission . ... | the transmission dynamics of some infectious diseases is related to the contact structure between individuals in a network . we used five algorithms to generate contact networks with different topological structure but with the same scale - free degree distribution . we simulated the spread of acute and chronic infecti... |
entanglement is considered to be the key resource of the rapidly developing fields of quantum information processing and quantum computation , for an introduction see e.g. . among the early proposals concerning the applications of entangled statesare those for quantum key distribution , quantum dense coding , and qu... | necessary and sufficient conditions for bipartite entanglement are derived , which apply to arbitrary hilbert spaces . motivated by the concept of witnesses , optimized entanglement inequalities are formulated solely in terms of arbitrary hermitian operators , which makes them useful for applications in experiments . t... |
dynamic traffic assignment ( dta ) is the descriptive modeling of time - varying flows on traffic networks consistent with traffic flow theory and travel choice principles .dta models describe and predict departure rates , departure times and route choices of travelers over a given time horizon .it seeks to describe th... | this paper establishes the continuity of the path delay operators for _ dynamic network loading _ ( dnl ) problems based on the lighthill - whitham - richards model , which explicitly capture vehicle spillback . the dnl describes and predicts the spatial - temporal evolution of traffic flow and congestion on a network ... |
within the last few years _ relational database management systems _ ( rdbms or db in short ) have become essential for control system configuration . with availability of generic applications and hardware standards the interplay of components as well asthe adaptation to site specific needs has become crucial .proper n... | the reference rdbms for bessy ii has been set up with a device oriented data model . this has proven adequate for e.g. template based rtdb generation , modelling etc . but since assigned i / o channels have been stored outside the database ( a ) numerous specific conditions had to be maintained within the scripts gener... |
quantum key distribution ( qkd ) enables an unconditionally secure means of distributing secret keys between two spatially separated parties , alice and bob .the security of qkd has been rigorously proven based on the laws of quantum mechanics .nevertheless , owing to the imperfections in real - life implementations ... | a novel protocol , measurement - device - independent quantum key distribution ( mdi - qkd ) , removes all attacks from the detection system , the most vulnerable part in qkd implementations . in this paper , we present an analysis for practical aspects of mdi - qkd . to evaluate its performance , we study various erro... |
quantum information processing has attracted a lot of interest in recent years , following deutsch s investigations concerning the potentiality of a quantum computer , i.e. , a computer where information is stored and processed in quantum systems .their application as quantum information carriers gives rise to outstand... | we investigate the problem of determining the parameters that describe a quantum channel . it is assumed that the users of the channel have at best only partial knowledge of it and make use of a finite amount of resources to estimate it . we discuss simple protocols for the estimation of the parameters of several class... |
the detection of gravitational waves ( g.w . ) is one of the most fascinating and challenging subjects in physics research nowadays . besides checking the general relativity theory , the detection of this phenomenon will mark the beginning of a new phase in the comprehension of astrophysical phenomena by the use of gra... | we determine the transfer functions of two kinds of filters that can be used in the detection of continuous gravitational radiation . the first one optimizes the signal - to - noise ratio , and the second reproduces the wave with minimum error . we analyse the behaviour of these filters in connection with actual detect... |
the recent complete dna sequences of many organisms are available to systematically search of genome structure . for the large amount of dna sequences ,developing methods for extracting meaningful information is a major challenge for bioinformatics . to understand the one - dimensional symbolic sequences composed of th... | global transposable characteristics in the complete dna sequence of the saccharomyces cevevisiae yeast is determined by using the metric representation and recurrence plot methods . in the form of the correlation distance of nucleotide strings , 16 chromosome sequences of the yeast , which are divided into 5 groups , d... |
dans le modle cosmologique , dit de concordance car il est en conformit avec tout un ensemble de donnes observationnelles , la matire ordinaire do nt sont constitus les toiles , le gaz , les galaxies , etc .( essentiellement sous forme baryonique ) ne forme que 4% de la masse - nergie totale , ce qui est dduit de la nu... | pour lastrophysicien qui aborde le puzzle de la matire noire , celle - ci apparat sous deux aspects diffrents : dune part en cosmologie , cest - - dire trs grandes chelles , o elle semble tre forme dun bain de particules , et dautre part lchelle des galaxies , o elle est dcrite par un ensemble de phnomnes trs particuli... |
given an input sequence , _ segmentation _ is the problem of identifying and assigning tags to its subsequences .many natural language processing ( nlp ) tasks can be cast into the segmentation problem , like named entity recognition , opinion extraction , and chinese word segmentation . properly representing _ segment... | many natural language processing ( nlp ) tasks can be generalized into segmentation problem . in this paper , we combine semi - crf with neural network to solve nlp segmentation tasks . our model represents a segment both by composing the input units and embedding the entire segment . we thoroughly study different comp... |
nowadays , digital images and other multimedia files can become very large in size and , therefore , occupy a lot of storage space .in addition , owing to their size , it takes more time to move them from place to place and a larger bandwidth to download and upload them on the internet .so , digital images may pose pro... | in this paper , we present methods for image compression on the basis of eigenvalue decomposition of normal matrices . the proposed methods are convenient and self - explanatory , requiring fewer and easier computations as compared to some existing methods . through the proposed techniques , the image is transformed to... |
we can study the effect of electromagnetic fields on fluids only if we know the stress induced due to the fields in the fluids . despite its importance , this topicis glossed over in most works on the otherwise well - established subjects of fluid mechanics and classical electrodynamics . the resultant force and torque... | a clear understanding of body force densities due to external electromagnetic fields is necessary to study flow and deformation of materials exposed to the fields . in this paper , we derive an expression for stress in continua with viscous and elastic properties in presence of external , static electric or magnetic fl... |
while sports are often analogized to a wide array of other arenas of human activity particularly war well known story lines and elements of sports are conversely invoked to describe other spheres .each game generates a probablistic , rule - based story , and the stories of games provide a range of motifs which map ont... | sports are spontaneous generators of stories . through skill and chance , the script of each game is dynamically written in real time by players acting out possible trajectories allowed by a sport s rules . by properly characterizing a given sport s ecology of ` game stories ' , we are able to capture the sport s capac... |
planetpack is a software tool that facilitates the detection and characterization of exoplanets from the radial velocity ( rv ) data , as well as basic tasks of long - term dynamical simulations in exoplanetary systems . the detailed description of the numeric algorithms implemented in planetpack is given in the paper ... | we briefly overview the new features of planetpack2 , the forthcoming update of planetpack , which is a software tool for exoplanets detection and characterization from doppler radial velocity data . among other things , this major update brings parallelized computing , new advanced models of the doppler noise , handli... |
microarray technology is an important tool to monitor gene - expression in bio - medical studies .a common experimental design is to compare two sets of samples with different phenotypes , e.g. diseased and normal tissue , with the goal of discovering differentially expressed genes .statistical testing procedures , suc... | gene set enrichment analysis ( gsea ) and its variations aim to discover collections of genes that show moderate but coordinated differences in expression . however , such techniques may be ineffective if many individual genes in a phenotype - related gene set have weak discriminative power . a potential solution is to... |
when one is dealing with classical field theories on a spacetime , the metric may appear as a given background field or it may be a genuine dynamic field satisfying the einstein equations .the latter theories are often generally covariant , with the spacetime diffeomorphism group as symmetry group , but the former ofte... | we give an exposition of the parametrization method of in the context of the multisymplectic approach to field theory , as presented in . the purpose of the formalism developed herein is to make any classical field theory , containing a metric as a sole background field , generally covariant ( that is , _ parametrized ... |
consider a generic factor model with a binary configurational space , , , which is factorized so that the probability to find the system in the state and the partition function are where labels non - negative and finite factor - functions with and represents a subset of variables .relations between factor functions ( c... | the decoding of low - density parity - check codes by the belief propagation ( bp ) algorithm is revisited . we check the iterative algorithm for its convergence to a codeword ( termination ) , we run monte carlo simulations to find the probability distribution function of the termination time , . tested on an example ... |
factor analysis is one of the most useful tools for modeling common dependence among multivariate outputs .suppose that we observe data that can be decomposed as where are unobservable common factors ; are corresponding factor loadings for variable , and denotes the idiosyncratic component that can not be explained by ... | this paper introduces a projected principal component analysis ( projected - pca ) , which employs principal component analysis to the projected ( smoothed ) data matrix onto a given linear space spanned by covariates . when it applies to high - dimensional factor analysis , the projection removes noise components . we... |
the recent proliferation of smartphones and tablets has been seen as a key enabler for anywhere , anytime wireless communications .the rise of online services , such as facebook and youtube , significantly increases the frequency of users online activities . due to this continuously increasing demand for wireless acces... | device - to - device ( d2d ) communication has seen as a major technology to overcome the imminent wireless capacity crunch and to enable new application services . in this paper , we propose a social - aware approach for optimizing d2d communication by exploiting two layers : the social network and the physical wirele... |
several diagnostic protocols are usually adopted by dermatologists for analyzing and classifying skin lesions , such as the so - called _ abcd - rule _ of dermoscopy . due to the subjective nature of examination ,the accuracy of diagnosis is highly dependent upon human vision and dermatologist s expertise .computerized... | we propose an automatic algorithm , named sdi , for the segmentation of skin lesions in dermoscopic images , articulated into three main steps : selection of the image roi , selection of the segmentation band , and segmentation . we present extensive experimental results achieved by the sdi algorithm on the lesion segm... |
evolutionary algorithms ( ea ) are a group of computational techniques , which employ the theory of natural selection to a population of individuals to generate better individuals .genetic programming ( gp ) is a paradigm of ea which uses hierarchical , tree structure , variable length representation to code solutions ... | this paper describes postfix - gp system , postfix notation based genetic programming ( gp ) , for solving symbolic regression problems . it presents an object - oriented architecture of postfix - gp framework . it assists the user in understanding of the implementation details of various components of postfix - gp . p... |
at the end of the last century , the astronomical observations of high redshift type ia supernovae ( snia ) indicated that our universe is not only expanding , but also accelerating , which conflicts with our deepest intuition of gravity . with some other observations , such as cosmic microwave background radiation ( c... | a new cosmological model based on the de sitter gauge theory ( dsgt ) is studied in this paper . by some transformations , we find , in the dust universe , the cosmological equations of dsgt could form an autonomous system . we conduct dynamics analysis to this system , and find 9 critical points , among which there ex... |
neural networks ( nn s ) have become in the last years a very effective instrument for solving many difficult problems in the field of signal processing due to their properties like non - linear dynamics , adaptability , self - organization and high speed computational capability ( see for example and the papers therei... | in this paper a neural networks based approach is presented to identify the noise in the virgo context . virgo is an experiment to detect gravitational waves by means of a laser interferometer . preliminary results appear to be very promising for data analysis of realistic interferometer outputs . |
the internet has become a near indispensable tool with both private individuals and organizations becoming increasingly dependent on internet - based software services , downloadable resources like books and movies , online shopping and banking , and even social networking sites .the issue of network security has becom... | we introduce an ising approach to study the spread of malware . the ising spins up and down are used to represent two states online and offline of the nodes in the network . malware is allowed to propagate amongst online nodes and the rate of propagation was found to increase with data traffic . for a more efficient ne... |
it is well known that quantum key distribution is one of the most interesting subjects in quantum information science , which was pioneered by c.bennett and g.brassard in 1984[1 ] . in the original paper of bennett ,single photon communication was employed as implementation of quantum key distribution . however , despi... | in this report , we simulate practical feature of yuen - kim protocol for quantum key distribution with unconditional secure . in order to demonstrate them experimentally by intensity modulation / direct detection(imdd ) optical fiber communication system , we use simplified encoding scheme to guarantee security for ke... |
due to the importance of the primes , the mathematicians have been investigating about them since long centuries ago . in 1801, carl gauss , one of the greatest mathematician , submitted that the problem of distinguishing the primes among the non - primes has been one of the outstanding problems of arithmetic .proving ... | today , prime numbers attained exceptional situation in the area of numbers theory and cryptography . as we know , the trend for accessing to the largest prime numbers due to using mersenne theorem , although resulted in vast development of related numbers , however it has reduced the speed of accessing to prime number... |
the discontinuous galerkin method nowadays is a well - established method for solving partial differential equations , especially for time - dependent problems .it has been thoroughly investigated by cockburn and shu as well as hesthaven and warburton , who summarized many of their findings in and , respectively . co... | a framework for performing dynamic mesh adaptation with the discontinuous galerkin method ( dgm ) is presented . adaptations include modifications of the local mesh step size ( -adaptation ) and the local degree of the approximating polynomials ( -adaptation ) as well as their combination . the computation of the appro... |
in industrial inspection , there is an ever - growing demand for highly accurate , non - destructive measurements of three - dimensional object geometries .a variety of optical sensors have been developed to meet these demands .these sensors satisfy the requirements at least partially .numerous applications , however ... | we present a novel method for reconstructing the shape of an object from measured gradient data . a certain class of optical sensors does not measure the shape of an object , but its local slope . these sensors display several advantages , including high information efficiency , sensitivity , and robustness . for many ... |
multiple - input , multiple - output(mimo ) wireless transmission systems have been intensively studied during the last decade .the alamouti code for two transmit antennas is a novel scheme for mimo transmission , which , due to its orthogonality properties , allows a low complexity maximum - likelihood ( ml ) decoder ... | this paper presents a low - ml - decoding - complexity , full - rate , full - diversity space - time block code ( stbc ) for a transmit antenna , receive antenna multiple - input multiple - output ( mimo ) system , with coding gain equal to that of the best and well known golden code for any qam constellation . recentl... |
many complex systems in various areas of science exhibit a spatio - temporal dynamics that is inhomogeneous and can be effectively described by a superposition of several statistics on different scales , in short a superstatistics .the superstatistics notion was introduced in , in the mean time many applications for a ... | we provide an overview on superstatistical techniques applied to complex systems with time scale separation . three examples of recent applications are dealt with in somewhat more detail : the statistics of small - scale velocity differences in lagrangian turbulence experiments , train delay statistics on the british r... |
in a typical instance of a combinatorial optimization problem the underlying constraints model a static application frozen in one time step . in many applicationshowever , one needs to solve instances of the combinatorial optimization problem that changes over time . while this is naturally handled by re - solving the ... | this paper is motivated by the fact that many systems need to be maintained continually while the underlying costs change over time . the challenge then is to continually maintain near - optimal solutions to the underlying optimization problems , without creating too much churn in the solution itself . we model this as... |
dependence logic is an extension of first - order logic which adds _ dependence atoms _ of the form to it , with the intended interpretation of `` the value of the term is a function of the values of the terms . ''the introduction of such atoms is roughly equivalent to the introduction of non - linear patterns of depen... | we examine the relationship between dependence logic and game logics . a variant of dynamic game logic , called _ transition logic _ , is developed , and we show that its relationship with dependence logic is comparable to the one between first - order logic and dynamic game logic discussed by van benthem . this sugg... |
most biopolymers , such as rnas , proteins and genomic dna , are found in folded configurations .folding involves the formation of one or more intramolecular interactions , termed contacts .proper folding of these molecules is often necessary for their function .intensive efforts have been made to measure the geometric... | here we report on the translocation of folded polymers through nano - pores using molecular dynamic simulations . two cases are studied ; one in which a folded molecule unfolds upon passage and one in which the folding remains intact as the molecule passes through the nano - pore . the topology of a folded polymer chai... |
a central open question in classical fluid dynamics is whether the incompressible three - dimensional euler equations with smooth initial conditions develop a singularity after a finite time .a key result was established in the late eighties by beale , kato and majda ( bkm ) .the bkm theorem states that blowup ( if it ... | numerical simulations of the incompressible euler equations are performed using the taylor - green vortex initial conditions and resolutions up to . the results are analyzed in terms of the classical analyticity strip method and beale , kato and majda ( bkm ) theorem . a well - resolved acceleration of the time - decay... |
our title clearly alludes to the story of columbus landing in what he called the west indies " , which later on turned out to be part of the new world " .i have substituted antarctica in place of the new world " , following a quip from frank paige after he realized that i was talking all the time about _ penguins_. at ... | discovery voyage into the age of : |
the multiobjective optimization problem ( moop ) is to optimize two or more objective functions simultaneously , subject to given constraints .the multiobjective optimization can be applied to problems where the final decision should be made considering two or more conflicting objectives .moop occurs in various fields ... | we introduce a novel multiobjective optimization algorithm based on the conformational space annealing ( csa ) algorithm , mocsa . it has three characteristic features : ( a ) dominance relationship and distance between solutions in the objective space are used as the fitness measure , ( b ) update rules are based on t... |
_ steganography _ is a scientific discipline within the field known as _ data hiding _ ,concerned with hiding information into a commonly used media , in such a way that no one apart from the sender and the intended recipient can detect the presence of embedded data .a comprehensive overview of the core principles and ... | steganography is an information hiding application which aims to hide secret data imperceptibly into a commonly used media . unfortunately , the theoretical hiding asymptotical capacity of steganographic systems is not attained by algorithms developed so far . in this paper , we describe a novel coding method based on ... |
the scope of the growing field of complexity science `` ( or complex systems '' ) includes a broad variety of problems belonging to different scientific areas .examples for complex systems `` can be found in physics , biology , computer science , ecology , economy , sociology and other fields .a recurring theme in most... | we study the predictability of emergent phenomena in complex systems . using nearest neighbor , one - dimensional cellular automata ( ca ) as an example , we show how to construct local coarse - grained descriptions of ca in all classes of wolfram s classification . the resulting coarse - grained ca that we construct a... |
because many natural systems are organized as networks , in which the nodes ( be they cells , individuals , populations or web servers ) interact in a time - dependent fashion the study of networks has been an important focus in recent research .one of the particular points of interest has been the question of how the ... | many natural systems are organized as networks , in which the nodes interact in a time - dependent fashion . the object of our study is to relate connectivity to the temporal behavior of a network in which the nodes are ( real or complex ) logistic maps , coupled according to a connectivity scheme that obeys certain co... |
frequently it is the case in the study of real - world complex networks that we observe essentially a sample from a larger network .there are many reasons why sampling in networks is often unavoidable and , in some cases , even desirable .sampling , for example , has long been a necessary part of studying internet topo... | the need to produce accurate estimates of vertex degree in a large network , based on observation of a subnetwork , arises in a number of practical settings . we study a formalized version of this problem , wherein the goal is , given a randomly sampled subnetwork from a large parent network , to estimate the actual de... |
in recent years , renewable energy has gained much popularity and attention because of it s potential in economic and environmental advantages . some of the benefits include- high stainability , low carbon emission , reduction of environmental impact , saving fuel cost and so on .other advantages include economical ben... | accurate forecasting is important for cost - effective and efficient monitoring and control of the renewable energy based power generation . wind based power is one of the most difficult energy to predict accurately , due to the widely varying and unpredictable nature of wind energy . although autoregressive ( ar ) tec... |
quantized control problems have been an active research topic in the past two decades .discrete - level actuators / sensors and digital communication channels are typical in practical control systems , and they yield quantized signals in feedback loops .quantization errors lead to poor system performance and even loss ... | in this paper , we study the problem of stabilizing continuous - time switched linear systems with quantized output feedback . we assume that the observer and the control gain are given for each mode . also , the plant mode is known to the controller and the quantizer . extending the result in the non - switched case ,... |
quantum key distribution ( qkd ) is often said to be unconditionally secure .more precisely , qkd can be proven to be secure against any eavesdropping _ given _ that the users ( alice and bob ) devices satisfy some requirements , which often include mathematical characterization of users devices as well as the assumpti... | in this paper , we study the unconditional security of the so - called measurement device independent quantum key distribution ( mdiqkd ) with the basis - dependent flaw in the context of phase encoding schemes . we propose two schemes for the phase encoding , the first one employs a phase locking technique with the us... |
in the past 30 years , the development of linear algebra libraries has been tremendously successful , resulting in a variety of reliable and efficient computational kernels .unfortunately these kernels are limited by a rigid interface that does not allow users to pass knowledge specific to the target problem .if availa... | we present a prototypical linear algebra compiler that automatically exploits domain - specific knowledge to generate high - performance algorithms . the input to the compiler is a target equation together with knowledge of both the structure of the problem and the properties of the operands . the output is a variety o... |
recently , the generalizations of the logarithmic and exponential functions have attracted the attention of researchers .one - parameter logarithmic and exponential functions have been proposed in the context of non - extensive statistical mechanics , relativistic statistical mechanics and quantum group theory .two ... | here we show that a particular one - parameter generalization of the exponential function is suitable to unify most of the popular one - species discrete population dynamics models into a simple formula . a physical interpretation is given to this new introduced parameter in the context of the continuous richards model... |
knowledge - base systems must typically deal with imperfection in knowledge , in particular , in the form of incompleteness , inconsistency , and uncertainty . with this motivation ,several frameworks for manipulating data and knowledge have been proposed in the form of extensions to classical logic programming and ded... | we propose a framework for modeling uncertainty where both belief and doubt can be given independent , first - class status . we adopt probability theory as the mathematical formalism for manipulating uncertainty . an agent can express the uncertainty in her knowledge about a piece of information in the form of a _ con... |
on a daily basis , people undergo numerous interactions with objects that barely register on a conscious level . for instance , imagine a person shopping at a grocery store as shown in figure [ fig : main ] .suppose she picks up a can of juice to load it in her shopping cart .the distance of the can is maintained fixed... | on a minute - to - minute basis people undergo numerous fluid interactions with objects that barely register on a conscious level . recent neuroscientific research demonstrates that humans have a fixed size prior for salient objects . this suggests that a salient object in 3d undergoes a consistent transformation such ... |
recently , the both schools of takemura and takayama have developed a quite interesting minimization method called holonomic gradient descent method(hgd ) .it utilizes grbner basis in the ring of differential operator with rational coefficients .grbner basis in the differential operators plays a central role in derivin... | recently , the school of takemura and takayama have developed a quite interesting minimization method called _ holonomic gradient descent method _ ( hgd ) . it works by a mixed use of pfaffian differential equation satisfied by an objective holonomic function and an iterative optimization method . they successfully app... |
recent progress in quantum communication technology has confirmed that the biggest challenge in using quantum methods of communication is to provide scalable methods for building large - scale quantum networks .the problems arising in this area are related to physical realizations of such networks , as well as to desi... | we develop a model which can be used to analyse the scenario of exploring quantum network with a distracted sense of direction . using this model we analyse the behaviour of quantum mobile agents operating with non - adaptive and adaptive strategies which can be employed in this scenario . we introduce the notion of no... |
the study of processor shared queues has received much attention over the past 45 or so years .the processor sharing ( ps ) discipline has the advantage over , say , first - in first - out ( fifo ) , in that shorter jobs tend to get through the system more rapidly .ps models were introduced during the 1960 s by kleinro... | we consider sojourn or response times in processor - shared queues that have a finite population of potential users . computing the response time of a tagged customer involves solving a finite system of linear odes . writing the system in matrix form , we study the eigenvectors and eigenvalues in the limit as the size ... |
proteins are essential building blocks of living organisms .they function as catalyst , structural elements , chemical signals , receptors , etc . the molecular mechanism of protein functions are closely related to their structures .the study of structure - function relationship is the holy grail of biophysics and has ... | protein function and dynamics are closely related to its sequence and structure . however prediction of protein function and dynamics from its sequence and structure is still a fundamental challenge in molecular biology . protein classification , which is typically done through measuring the similarity between proteins... |
when considering regression with a large number of predictors , variable selection becomes important .numerous methods have been proposed in the literature for the purpose of variable selection , ranging from the classical information criteria such as aic and bic to regularization based modern techniques such as the no... | in linear regression problems with related predictors , it is desirable to do variable selection and estimation by maintaining the hierarchical or structural relationships among predictors . in this paper we propose non - negative garrote methods that can naturally incorporate such relationships defined through effect ... |
in this paper , we consider numerical methods for the computation of the -gradient flow of a planar curve : where is a time - dependent planar curve .the gradient flow is energy dissipative , since = - \int |\operatorname{grad}e({\mathbf{u}})|^2 ds \le 0.\ ] ] here , is an energy functional , and is the frchet derivati... | in this paper , we develop an energy dissipative numerical scheme for gradient flows of planar curves , such as the curvature flow and the elastic flow . our study presents a general framework for solving such equations . to discretize time , we use a similar approach to the discrete partial derivative method , which i... |
coined quantum walks ( qws ) on graphs were firstly defined in ref . and have been extensively analyzed in the literature .many experimental proposals for the qws were given previously , with some actual experimental implementations performed in refs .the key feature of the coined qw model is to use an internal state... | quantum walks are recognizably useful for the development of new quantum algorithms , as well as for the investigation of several physical phenomena in quantum systems . actual implementations of quantum walks face technological difficulties similar to the ones for quantum computers , though . therefore , there is a st... |
millisecond pulsars ( msps ) have for some time been known to exhibit exceptional rotational stability , with decade long observations providing timing measurements with accuracies similar to atomic clocks ( e.g. ) .such stability lends itself well to the pursuit of a wide range of scientific goals , e.g. observations ... | we introduce a method for performing a robust bayesian analysis of non - gaussianity present in pulsar timing data , simultaneously with the pulsar timing model , and additional stochastic parameters such as those describing red spin noise and dispersion measure variations . the parameters used to define the presence o... |
a frequently used method for edge - preserving image denoising is the variational approach which minimizes the rudin - osher - fatemi ( rof ) functional . in a discrete ( penalized )form the rof functional can be written as where is the given corrupted image and denotes the discrete gradient operator which contains us... | in many image and signal processing applications , as interferometric synthetic aperture radar ( sar ) or color image restoration in hsv or lch spaces the data has its range on the one - dimensional sphere . although the minimization of total variation ( tv ) regularized functionals is among the most popular methods fo... |
due to the growing demand in data traffic , large improvements in the spectral efficiency are required .network densification has been identified as a possible way to achieve the desired spectral efficiency gains .this approach consists of deploying a large number of low powered base stations ( bss ) known as small cel... | in this paper we demonstrate the rate gains achieved by two - tier heterogeneous cellular networks ( hetnets ) with varying degrees of coordination between macrocell and microcell base stations ( bss ) . we show that without the presence of coordination , network densification does not provide any gain in the sum rate ... |
throughout this paper , we consider a unique server addressing two parallel queues numbered and , respectively .incoming jobs enter either queue and require random service times ; the server then processes jobs according to the so - called shortest queue first ( sqf ) policy. specifically , let ( resp . ) denote the wo... | we analyze the so - called shortest queue first ( sqf ) queueing discipline whereby a unique server addresses queues in parallel by serving at any time that queue with the smallest workload . considering a stationary system composed of two parallel queues and assuming poisson arrivals and general service time distribut... |
populations of self - sustained oscillators can exhibit various synchronization phenomena .for example , it is well known that a limit - cycle oscillator can exhibit phase locking to a periodic external forcing ; this phenomenon is called the forced synchronization .recently , it was also found that uncoupled identica... | we investigate common - noise - induced phase synchronization between uncoupled identical hele - shaw cells exhibiting oscillatory convection . using the phase description method for oscillatory convection , we demonstrate that the uncoupled systems of oscillatory hele - shaw convection can exhibit in - phase synchroni... |
road traffic prediction plays an important role in intelligent transport systems by providing the required real - time information for traffic management and congestion control , as well as the long - term traffic trend for transport infrastructure planning .road traffic predictions can be broadly classified into short... | based on the observation that the correlation between observed traffic at two measurement points or traffic stations may be time - varying , attributable to the time - varying speed which subsequently causes variations in the time required to travel between the two points , in this paper , we develop a modified space -... |
invasion of influenza virus into a host s upper respiratory tract leads to infection of healthy epithelial cells and subsequent production of progeny virions .infection also triggers a variety of immune responses . in the early stage of infection a temporary non - specific response ( innate immunity ) contributes to th... | myriad experiments have identified an important role for t cell response mechanisms in determining recovery from influenza a virus infection . animal models of influenza infection further implicate multiple elements of the immune response in defining the dynamical characteristics of viral infection . to date , influenz... |
continuous - variable quantum - key distribution ( cvqkd ) , as an unconditionally secure communication scheme between two legitimate parties alice and bob , has achieved advanced improvements in theoretical analysis and experimental implementation in recent years .practical implementation systems , such as fiber - bas... | we consider the security of practical continuous - variable quantum key distribution implementation with the local oscillator ( lo ) fluctuating in time , which opens a loophole for eve to intercept the secret key . we show that eve can simulate this fluctuation to hide her gaussian collective attack by reducing the in... |
oscillatory integrals play an important role in the theory of pseudodifferential operators .they are also a useful tool in mathematical physics , in particular in quantum field theory , where they are used to give meaning to formal fourier integrals in the sense of distributions . for phase functions which are homogene... | a generalized notion of oscillatory integrals that allows for inhomogeneous phase functions of arbitrary positive order is introduced . the wave front set of the resulting distributions is characterized in a way that generalizes the well - known result for phase functions that are homogeneous of order one . |
a recent trend in computer networks and cloud computing is to virtualize network functions , in order to provide higher scalability , reducing maintenance costs , and increasing reliability of network services .virtual network functions as a service ( vnfaas ) is currently under attentive study by telecommunications an... | virtual network functions as a service ( vnfaas ) is currently under attentive study by telecommunications and cloud stakeholders as a promising business and technical direction consisting of providing network functions as a service on a cloud ( nfv infrastructure ) , instead of delivering standalone network appliances... |
in recent years simulations of babcock - leighton type flux - transport ( hereafter blft ) solar dynamos in both 2d and 3d demonstrated the crucial role the sun s global meridional circulation plays in determining solar cycle properties .time variations in speed and profile of meridional circulation have profound influ... | accurate knowledge of time - variation in meridional flow - speed and profile is crucial for estimating a solar cycle s features , which are ultimately responsible for causing space climate variations . however , no consensus has been reached yet about the sun s meridional circulation pattern observations and theories ... |
a rational difference equation is a nonlinear difference equation of the form where the initial conditions are such that the denominator never vanishes for any .+ consider the equation where all the parameters and the initial conditions and are arbitrary complex number . this second order rational difference equati... | the dynamics of the second order rational difference equation with complex parameters and arbitrary complex initial conditions is investigated . in the complex set up , the local asymptotic stability and boundedness are studied vividly for this difference equation . several interesting characteristics of the solutions ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.