title
stringlengths
7
239
abstract
stringlengths
7
2.76k
cs
int64
0
1
phy
int64
0
1
math
int64
0
1
stat
int64
0
1
quantitative biology
int64
0
1
quantitative finance
int64
0
1
Asymmetric Spin-wave Dispersion on Fe(110): Direct Evidence of Dzyaloshinskii--Moriya Interaction
The influence of the Dzyaloshinskii-Moriya interaction on the spin-wave dispersion in an Fe double layer grown on W(110) is measured for the first time. It is demonstrated that the Dzyaloshinskii-Moriya interaction breaks the degeneracy of spin waves and leads to an asymmetric spin-wave dispersion relation. An extend...
0
1
0
0
0
0
Consumption smoothing in the working-class households of interwar Japan
I analyze Osaka factory worker households in the early 1920s, whether idiosyncratic income shocks were shared efficiently, and which consumption categories were robust to shocks. While the null hypothesis of full risk-sharing of total expenditures was rejected, factory workers maintained their households, in that the...
0
0
0
0
0
1
Observations and Modelling of the Pre-Flare Period of the 29 March 2014 X1 Flare
On the 29 March 2014 NOAA active region (AR) 12017 produced an X1 flare which was simultaneously observed by an unprecedented number of observatories. We have investigated the pre-flare period of this flare from 14:00 UT until 19:00 UT using joint observations made by the Interface Region Imaging Spectrometer (IRIS) ...
0
1
0
0
0
0
Wild ramification and K(pi, 1) spaces
We prove that every connected affine scheme of positive characteristic is a K(pi, 1) space for the etale topology. The main ingredient is the special case of the affine space over a field k. This is dealt with by induction on n, using a key "Bertini-type"' statement regarding the wild ramification of l-adic local sys...
0
0
1
0
0
0
A Deep Learning Interpretable Classifier for Diabetic Retinopathy Disease Grading
Deep neural network models have been proven to be very successful in image classification tasks, also for medical diagnosis, but their main concern is its lack of interpretability. They use to work as intuition machines with high statistical confidence but unable to give interpretable explanations about the reported ...
1
0
0
1
0
0
Arabic Multi-Dialect Segmentation: bi-LSTM-CRF vs. SVM
Arabic word segmentation is essential for a variety of NLP applications such as machine translation and information retrieval. Segmentation entails breaking words into their constituent stems, affixes and clitics. In this paper, we compare two approaches for segmenting four major Arabic dialects using only several th...
1
0
0
0
0
0
Iterative bidding in electricity markets: rationality and robustness
This paper studies an electricity market consisting of an independent system operator (ISO) and a group of generators. The goal is to solve the DC optimal power flow (DC-OPF) problem: have the generators collectively meet the power demand while minimizing the aggregate generation cost and respecting line flow limits ...
1
0
1
0
0
0
Short-baseline electron antineutrino disappearance study by using neutrino sources from $^{13}$C + $^{9}$Be reaction
To investigate the existence of sterile neutrino, we propose a new neutrino production method using $^{13}$C beams and a $^{9}$Be target for short-baseline electron antineutrino (${\bar{\nu}}_{e}$) disappearance study. The production of secondary unstable isotopes which can emit neutrinos from the $^{13}$C + $^{9}$Be...
0
1
0
0
0
0
Temperature-dependent non-covalent protein-protein interactions explain normal and inverted solubility in a mutant of human gamma D-crystallin
Protein crystal production is a major bottleneck for the structural characterisation of proteins. To advance beyond large-scale screening, rational strategies for protein crystallization are crucial. Understanding how chemical anisotropy (or patchiness) of the protein surface due to the variety of amino acid side cha...
0
0
0
0
1
0
Planetary Candidates Observed by Kepler. VIII. A Fully Automated Catalog With Measured Completeness and Reliability Based on Data Release 25
We present the Kepler Object of Interest (KOI) catalog of transiting exoplanets based on searching four years of Kepler time series photometry (Data Release 25, Q1-Q17). The catalog contains 8054 KOIs of which 4034 are planet candidates with periods between 0.25 and 632 days. Of these candidates, 219 are new and incl...
0
1
0
0
0
0
Dark Photons from Captured Inelastic Dark Matter Annihilation: Charged Particle Signatures
The dark sector may contain a dark photon that kinetically mixes with the Standard Model photon, allowing dark matter to interact weakly with normal matter. In previous work we analyzed the implications of this scenario for dark matter capture by the Sun. Dark matter will gather in the core of the Sun and annihilate ...
0
1
0
0
0
0
A Polya Contagion Model for Networks
A network epidemics model based on the classical Polya urn scheme is investigated. Temporal contagion processes are generated on the network nodes using a modified Polya sampling scheme that accounts for spatial infection among neighbouring nodes. The stochastic properties and the asymptotic behaviour of the resultin...
1
1
1
0
0
0
Compressive Statistical Learning with Random Feature Moments
We describe a general framework --compressive statistical learning-- for resource-efficient large-scale learning: the training collection is compressed in one pass into a low-dimensional sketch (a vector of random empirical generalized moments) that captures the information relevant to the considered learning task. A...
1
0
1
1
0
0
Bandit Structured Prediction for Neural Sequence-to-Sequence Learning
Bandit structured prediction describes a stochastic optimization framework where learning is performed from partial feedback. This feedback is received in the form of a task loss evaluation to a predicted output structure, without having access to gold standard structures. We advance this framework by lifting linear ...
1
0
0
1
0
0
Dynamic Input Structure and Network Assembly for Few-Shot Learning
The ability to learn from a small number of examples has been a difficult problem in machine learning since its inception. While methods have succeeded with large amounts of training data, research has been underway in how to accomplish similar performance with fewer examples, known as one-shot or more generally few-...
1
0
0
1
0
0
Face R-CNN
Faster R-CNN is one of the most representative and successful methods for object detection, and has been becoming increasingly popular in various objection detection applications. In this report, we propose a robust deep face detection approach based on Faster R-CNN. In our approach, we exploit several new techniques...
1
0
0
0
0
0
Multi-Sensor Data Pattern Recognition for Multi-Target Localization: A Machine Learning Approach
Data-target pairing is an important step towards multi-target localization for the intelligent operation of unmanned systems. Target localization plays a crucial role in numerous applications, such as search, and rescue missions, traffic management and surveillance. The objective of this paper is to present an innova...
1
0
0
1
0
0
Calipso: Physics-based Image and Video Editing through CAD Model Proxies
We present Calipso, an interactive method for editing images and videos in a physically-coherent manner. Our main idea is to realize physics-based manipulations by running a full physics simulation on proxy geometries given by non-rigidly aligned CAD models. Running these simulations allows us to apply new, unseen fo...
1
0
0
0
0
0
Maximal (120,8)-arcs in projective planes of order 16 and related designs
The resolutions and maximal sets of compatible resolutions of all 2-(120,8,1) designs arising frommaximal (120,8)-arcs in the known projective planes of order 16 are computed. It is shown that each of these designs is embeddable in a unique way in a projective plane of order 16.
0
0
1
0
0
0
First order sentences about random graphs: small number of alternations
Spectrum of a first order sentence is the set of all $\alpha$ such that $G(n, n^{-\alpha})$ does not obey zero-one law w.r.t. this sentence. We have proved that the minimal number of quantifier alternations of a first order sentence with an infinite spectrum equals 3. We have also proved that the spectrum of a first ...
0
0
1
0
0
0
New Methods for Metadata Extraction from Scientific Literature
Within the past few decades we have witnessed digital revolution, which moved scholarly communication to electronic media and also resulted in a substantial increase in its volume. Nowadays keeping track with the latest scientific achievements poses a major challenge for the researchers. Scientific information overlo...
1
0
0
0
0
0
Unexpected biases in prime factorizations and Liouville functions for arithmetic progressions
We introduce a refinement of the classical Liouville function to primes in arithmetic progressions. Using this, we discover new biases in the appearances of primes in a given arithmetic progression in the prime factorizations of integers. For example, we observe that the primes of the form $4k+1$ tend to appear an ev...
0
0
1
0
0
0
Nonconvection and uniqueness in Navier-Stokes equation
In the presence of a certain class of functions we show that there exists a smooth solution to Navier-Stokes equation. This solution entertains the property of being nonconvective. We introduce a definition for any possible solution to the problem with minimum assumptions on the existence and the regularity of such s...
0
0
1
0
0
0
An alternative approach for compatibility of two discrete conditional distributions
Conditional specification of distributions is a developing area with increasing applications. In the finite discrete case, a variety of compatible conditions can be derived. In this paper, we propose an alternative approach to study the compatibility of two conditional probability distributions under the finite discr...
0
0
1
1
0
0
System of unbiased representatives for a collection of bicolorings
Let $\mathcal{B}$ denote a set of bicolorings of $[n]$, where each bicoloring is a mapping of the points in $[n]$ to $\{-1,+1\}$. For each $B \in \mathcal{B}$, let $Y_B=(B(1),\ldots,B(n))$. For each $A \subseteq [n]$, let $X_A \in \{0,1\}^n$ denote the incidence vector of $A$. A non-empty set $A$ is said to be an `un...
1
0
0
0
0
0
Stability and instability in saddle point dynamics Part II: The subgradient method
In part I we considered the problem of convergence to a saddle point of a concave-convex function via gradient dynamics and an exact characterization was given to their asymptotic behaviour. In part II we consider a general class of subgradient dynamics that provide a restriction in an arbitrary convex domain. We sho...
1
0
1
0
0
0
Refactoring Legacy JavaScript Code to Use Classes: The Good, The Bad and The Ugly
JavaScript systems are becoming increasingly complex and large. To tackle the challenges involved in implementing these systems, the language is evolving to include several constructions for programming- in-the-large. For example, although the language is prototype-based, the latest JavaScript standard, named ECMAScr...
1
0
0
0
0
0
Parylene-C microfibrous thin films as phononic crystals
Phononic bandgaps of Parylene-C microfibrous thin films (muFTFs) were computationally determined by treating them as phononic crystals comprising identical microfibers arranged either on a square or a hexagonal lattice. The microfibers could be columnar,chevronic, or helical in shape, and the host medium could be eit...
0
1
0
0
0
0
A General Theory for Training Learning Machine
Though the deep learning is pushing the machine learning to a new stage, basic theories of machine learning are still limited. The principle of learning, the role of the a prior knowledge, the role of neuron bias, and the basis for choosing neural transfer function and cost function, etc., are still far from clear. I...
1
0
0
1
0
0
Semiparametric spectral modeling of the Drosophila connectome
We present semiparametric spectral modeling of the complete larval Drosophila mushroom body connectome. Motivated by a thorough exploratory data analysis of the network via Gaussian mixture modeling (GMM) in the adjacency spectral embedding (ASE) representation space, we introduce the latent structure model (LSM) for...
0
0
0
1
0
0
A Large Term Rewrite System Modelling a Pioneering Cryptographic Algorithm
We present a term rewrite system that formally models the Message Authenticator Algorithm (MAA), which was one of the first cryptographic functions for computing a Message Authentication Code and was adopted, between 1987 and 2001, in international standards (ISO 8730 and ISO 8731-2) to ensure the authenticity and in...
1
0
0
0
0
0
Malleability of complex networks
Most complex networks are not static, but evolve along time. Given a specific configuration of one such changing network, it becomes a particularly interesting issue to quantify the diversity of possible unfoldings of its topology. In this work, we suggest the concept of malleability of a network, which is defined as...
1
0
0
0
0
0
Identifying Critical Risks of Cascading Failures in Power Systems
Potential critical risks of cascading failures in power systems can be identified by exposing those critical electrical elements on which certain initial disturbances may cause maximum disruption to power transmission networks. In this work, we investigate cascading failures in power systems described by the direct c...
1
0
0
0
0
0
Radiation Hardness Test of Eljen EJ-500 Optical Cement
We present a comprehensive account of the proton radiation hardness of Eljen Technology's EJ-500 optical cement used in the construction of experiment detectors. The cement was embedded into five plastic scintillator tiles which were each exposed to one of five different levels of radiation by a 50 MeV proton beam pr...
0
1
0
0
0
0
Triviality of the ground-state metastate in long-range Ising spin glasses in one dimension
We consider the one-dimensional model of a spin glass with independent Gaussian-distributed random interactions, that have mean zero and variance $1/|i-j|^{2\sigma}$, between the spins at sites $i$ and $j$ for all $i\neq j$. It is known that, for $\sigma>1$, there is no phase transition at any non-zero temperature in...
0
1
0
0
0
0
Thermodynamics of BTZ Black Holes in Gravity's Rainbow
In this paper, we deform the thermodynamics of a BTZ black hole from rainbow functions in gravity's rainbow. The rainbow functions will be motivated from results in loop quantum gravity and Noncommutative geometry. It will be observed that the thermodynamics gets deformed due to these rainbow functions, indicating th...
0
1
0
0
0
0
Nondegeneracy and the Jacobi fields of rotationally symmetric solutions to the Cahn-Hillard equation
In this paper we study rotationally symmetric solutions of the Cahn-Hilliard equation in $\mathbb R^3$ constructed by the authors. These solutions form a one parameter family analog to the family of Delaunay surfaces and in fact the zero level sets of their blowdowns approach these surfaces. Presently we go a step fu...
0
0
1
0
0
0
Quasiflats in hierarchically hyperbolic spaces
The rank of a hierarchically hyperbolic space is the maximal number of unbounded factors of standard product regions; this coincides with the maximal dimension of a quasiflat for hierarchically hyperbolic groups. Noteworthy examples where the rank coincides with familiar quantities include: the dimension of maximal D...
0
0
1
0
0
0
Learning to Skim Text
Recurrent Neural Networks are showing much promise in many sub-areas of natural language processing, ranging from document classification to machine translation to automatic question answering. Despite their promise, many recurrent models have to read the whole text word by word, making it slow to handle long documen...
1
0
0
0
0
0
Using Deep Neural Networks to Automate Large Scale Statistical Analysis for Big Data Applications
Statistical analysis (SA) is a complex process to deduce population properties from analysis of data. It usually takes a well-trained analyst to successfully perform SA, and it becomes extremely challenging to apply SA to big data applications. We propose to use deep neural networks to automate the SA process. In par...
1
0
0
1
0
0
Duty to Delete on Non-Volatile Memory
We firstly suggest new cache policy applying the duty to delete invalid cache data on Non-volatile Memory (NVM). This cache policy includes generating random data and overwriting the random data into invalid cache data. Proposed cache policy is more economical and effective regarding perfect deletion of data. It is e...
1
0
0
0
0
0
Geometry of Log-Concave Density Estimation
Shape-constrained density estimation is an important topic in mathematical statistics. We focus on densities on $\mathbb{R}^d$ that are log-concave, and we study geometric properties of the maximum likelihood estimator (MLE) for weighted samples. Cule, Samworth, and Stewart showed that the logarithm of the optimal lo...
0
0
0
1
0
0
Antenna Arrays for Line-of-Sight Massive MIMO: Half Wavelength is not Enough
The aim of this paper is to analyze the array synthesis for 5 G massive MIMO systems in the line-of-sight working condition. The main result of the numerical investigation performed is that non-uniform arrays are the natural choice in this kind of application. In particular, by using non-equispaced arrays, we show th...
1
0
0
0
0
0
Gravitational octree code performance evaluation on Volta GPU
In this study, the gravitational octree code originally optimized for the Fermi, Kepler, and Maxwell GPU architectures is adapted to the Volta architecture. The Volta architecture introduces independent thread scheduling requiring either the insertion of the explicit synchronizations at appropriate locations or the e...
1
0
0
0
0
0
Instanton bundles on the flag variety F(0,1,2)
Instanton bundles on $\mathbb{P}^3$ have been at the core of the research in Algebraic Geometry during the last thirty years. Motivated by the recent extension of their definition to other Fano threefolds of Picard number one, we develop the theory of instanton bundles on the complete flag variety $F:=F(0,1,2)$ of po...
0
0
1
0
0
0
Non-linear motor control by local learning in spiking neural networks
Learning weights in a spiking neural network with hidden neurons, using local, stable and online rules, to control non-linear body dynamics is an open problem. Here, we employ a supervised scheme, Feedback-based Online Local Learning Of Weights (FOLLOW), to train a network of heterogeneous spiking neurons with hidden...
1
0
0
1
0
0
Training Deep Neural Networks via Optimization Over Graphs
In this work, we propose to train a deep neural network by distributed optimization over a graph. Two nonlinear functions are considered: the rectified linear unit (ReLU) and a linear unit with both lower and upper cutoffs (DCutLU). The problem reformulation over a graph is realized by explicitly representing ReLU or...
1
0
0
0
0
0
Calculation of Effective Interaction Potential During Positron Channeling in Ionic Crystals
An analytical expression is received for the effective interaction potential of a fast charged particle with the ionic crystal CsCl near the direction of <100> axis as a function of the temperature of the medium. By numerical analysis it is shown that the effective potential of axial channeling of positrons along the...
0
1
0
0
0
0
The Follower Count Fallacy: Detecting Twitter Users with Manipulated Follower Count
Online Social Networks (OSN) are increasingly being used as platform for an effective communication, to engage with other users, and to create a social worth via number of likes, followers and shares. Such metrics and crowd-sourced ratings give the OSN user a sense of social reputation which she tries to maintain and...
1
0
0
0
0
0
Bergman kernel estimates and Toeplitz operators on holomorphic line bundles
We characterize operator-theoretic properties (boundedness, compactness, and Schatten class membership) of Toeplitz operators with positive measure symbols on Bergman spaces of holomorphic hermitian line bundles over Kähler Cartan-Hadamard manifolds in terms of geometric or operator-theoretic properties of measures.
0
0
1
0
0
0
HST PanCET program: A Cloudy Atmosphere for the promising JWST target WASP-101b
We present results from the first observations of the Hubble Space Telescope (HST) Panchromatic Comparative Exoplanet Treasury (PanCET) program for WASP-101b, a highly inflated hot Jupiter and one of the community targets proposed for the James Webb Space Telescope (JWST) Early Release Science (ERS) program. From a s...
0
1
0
0
0
0
Quantum gauge symmetry of reducible gauge theory
We derive the gaugeon formalism of the Kalb-Ramond field theory, a reducible gauge theory, which discusses the quantum gauge freedom. In gaugeon formalism, theory admits quantum gauge symmetry which leaves the action form-invariant. The BRST symmetric gaugeon formalism is also studied which introduces the gaugeon gho...
0
1
0
0
0
0
The Tian Pseudo-Atom Method
In this work, the authors give a new method for phase determination, the Tian pseudo atom method (TPAM) or pseudo atom method (PAM) for short. In this new method, the figure of merit function, Rtian, replaces Rcf in the charge flipping algorithm. The key difference between Rcf and Rtian is the oberved structure facto...
0
1
0
0
0
0
The Phenotypes of Fluctuating Flow: Development of Distribution Networks in Biology and the Trade-off between Efficiency, Cost, and Resilience
Complex distribution networks are pervasive in biology. Examples include nutrient transport in the slime mold $Physarum$ $polycephalum$ as well as mammalian and plant venation. Adaptive rules are believed to guide development of these networks and lead to a reticulate, hierarchically nested topology that is both effi...
0
1
0
0
0
0
Recent Trends in Deep Learning Based Natural Language Processing
Deep learning methods employ multiple processing layers to learn hierarchical representations of data and have produced state-of-the-art results in many domains. Recently, a variety of model designs and methods have blossomed in the context of natural language processing (NLP). In this paper, we review significant de...
1
0
0
0
0
0
Volatile memory forensics for the Robot Operating System
The increasing impact of robotics on industry and on society will unavoidably lead to the involvement of robots in incidents and mishaps. In such cases, forensic analyses are key techniques to provide useful evidence on what happened, and try to prevent future incidents. This article discusses volatile memory forensi...
1
0
0
0
0
0
HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel)
Remote Attestation (RA) allows a trusted entity (verifier) to securely measure internal state of a remote untrusted hardware platform (prover). RA can be used to establish a static or dynamic root of trust in embedded and cyber-physical systems. It can also be used as a building block for other security services and ...
1
0
0
0
0
0
Social Robots for People with Developmental Disabilities: A User Study on Design Features of a Graphical User Interface
Social robots, also known as service or assistant robots, have been developed to improve the quality of human life in recent years. The design of socially capable and intelligent robots can vary, depending on the target user groups. In this work, we assess the effect of social robots' roles, functions, and communicat...
1
0
0
0
0
0
Inverse problem for multi-species mean field models in the low temperature phase
In this paper we solve the inverse problem for a class of mean field models (Curie-Weiss model and its multi-species version) when multiple thermodynamic states are present, as in the low temperature phase where the phase space is clustered. The inverse problem consists in reconstructing the model parameters starting...
0
1
0
0
0
0
Inertial Odometry on Handheld Smartphones
Building a complete inertial navigation system using the limited quality data provided by current smartphones has been regarded challenging, if not impossible. This paper shows that by careful crafting and accounting for the weak information in the sensor samples, smartphones are capable of pure inertial navigation. ...
1
0
0
1
0
0
Asymptotic network models of subwavelength metamaterials formed by closely packed photonic and phononic crystals
We demonstrate that photonic and phononic crystals consisting of closely spaced inclusions constitute a versatile class of subwavelength metamaterials. Intuitively, the voids and narrow gaps that characterise the crystal form an interconnected network of Helmholtz-like resonators. We use this intuition to argue that ...
0
1
0
0
0
0
The Hydrogen Epoch of Reionization Array Dish III: Measuring Chromaticity of Prototype Element with Reflectometry
The experimental efforts to detect the redshifted 21 cm signal from the Epoch of Reionization (EoR) are limited predominantly by the chromatic instrumental systematic effect. The delay spectrum methodology for 21 cm power spectrum measurements brought new attention to the critical impact of an antenna's chromaticity ...
0
1
0
0
0
0
Unifying the micro and macro properties of AGN feeding and feedback
We unify the feeding and feedback of supermassive black holes with the global properties of galaxies, groups, and clusters, by linking for the first time the physical mechanical efficiency at the horizon and Mpc scale. The macro hot halo is tightly constrained by the absence of overheating and overcooling as probed b...
0
1
0
0
0
0
Model-based Iterative Restoration for Binary Document Image Compression with Dictionary Learning
The inherent noise in the observed (e.g., scanned) binary document image degrades the image quality and harms the compression ratio through breaking the pattern repentance and adding entropy to the document images. In this paper, we design a cost function in Bayesian framework with dictionary learning. Minimizing our...
1
0
0
0
0
0
A First Look at Ad Blocking Apps on Google Play
Online advertisers and analytics services (or trackers), are constantly tracking users activities as they access web services either through browsers or a mobile apps. Numerous tools such as browser plugins and specialized mobile apps have been proposed to limit intrusive advertisements and prevent tracking on deskto...
1
0
0
0
0
0
Nondegeneracy of the traveling lump solution to the $2+1$ Toda lattice
We consider the $2+1$ Toda system \[ \frac{1}{4}\Delta q_{n}=e^{q_{n-1}-q_{n}}-e^{q_{n}-q_{n+1}}\text{ in }\mathbb{R}^{2},\ n\in\mathbb{Z}. \] It has a traveling wave type solution $\left\{ Q_{n}\right\} $ satisfying $Q_{n+1}(x,y)=Q_{n}(x+\frac{1}{2\sqrt{2}},y)$, and is explicitly given by \[ Q_{n}\left( x,y\right) =...
0
0
1
0
0
0
One side continuity of meromorphic mappings between real analytic hypersurfaces
We prove that a meromorphic mapping, which sends a peace of a real analytic strictly pseudoconvex hypersurface in $\cc^2$ to a compact subset of $\cc^N$ which doesn't contain germs of non-constant complex curves is continuous from the concave side of the hypersurface. This implies the analytic continuability along CR...
0
0
1
0
0
0
Generic Camera Attribute Control using Bayesian Optimization
Cameras are the most widely exploited sensor in both robotics and computer vision communities. Despite their popularity, two dominant attributes (i.e., gain and exposure time) have been determined empirically and images are captured in very passive manner. In this paper, we present an active and generic camera attrib...
1
0
0
0
0
0
Far-from-equilibrium energy flow and entanglement entropy
The time evolution of the energy transport triggered in a strongly coupled system by a temperature gradient is holographically related to the evolution of an asymptotically AdS black brane. We study the far-from-equilibrium properties of such a system by using the AdS/CFT correspondence. In particular, we describe th...
0
1
0
0
0
0
Algebraic Aspects of Conditional Independence and Graphical Models
This chapter of the forthcoming Handbook of Graphical Models contains an overview of basic theorems and techniques from algebraic geometry and how they can be applied to the study of conditional independence and graphical models. It also introduces binomial ideals and some ideas from real algebraic geometry. When ran...
0
0
1
1
0
0
A Survey of Riccati Equation Results in Negative Imaginary Systems Theory and Quantum Control Theory
This paper presents a survey of some new applications of algebraic Riccati equations. In particular, the paper surveys some recent results on the use of algebraic Riccati equations in testing whether a system is negative imaginary and in synthesizing state feedback controllers which make the closed loop system negati...
1
0
1
0
0
0
The circumstellar disk HD$\,$169142: gas, dust and planets acting in concert?
HD$\,$169142 is an excellent target to investigate signs of planet-disk interaction due to the previous evidence of gap structures. We performed J-band (~1.2{\mu}m) polarized intensity imaging of HD169142 with VLT/SPHERE. We observe polarized scattered light down to 0.16" (~19 au) and find an inner gap with a signifi...
0
1
0
0
0
0
Quantitative analysis of the influence of keV He ion bombardment on exchange bias layer systems
The mechanism of ion bombardment induced magnetic patterning of exchange bias layer systems for creating engineered magnetic stray field landscapes is still unclear. We compare results from vectorial magneto-optic Kerr effect measurements to a recently proposed model with time dependent rotatable magnetic anisotropy....
0
1
0
0
0
0
Automatic classification of automorphisms of lower-dimensional Lie algebras
We implement two algorithms in MATHEMATICA for classifying automorphisms of lower-dimensional non-commutative Lie algebras. The first algorithm is a brute-force approach whereas the second is an evolutionary strategy. These algorithms are delivered as the MATHEMATICA package cwsAutoClass. In order to facilitate the a...
0
0
1
0
0
0
Information-Theoretic Understanding of Population Risk Improvement with Model Compression
We show that model compression can improve the population risk of a pre-trained model, by studying the tradeoff between the decrease in the generalization error and the increase in the empirical risk with model compression. We first prove that model compression reduces an information-theoretic bound on the generaliza...
1
0
0
1
0
0
Document Retrieval for Large Scale Content Analysis using Contextualized Dictionaries
This paper presents a procedure to retrieve subsets of relevant documents from large text collections for Content Analysis, e.g. in social sciences. Document retrieval for this purpose needs to take account of the fact that analysts often cannot describe their research objective with a small set of key terms, especia...
1
0
0
0
0
0
Cepheids with the eyes of photometric space telescopes
Space photometric missions have been steadily accumulating observations of Cepheids in recent years, leading to a flow of new discoveries. In this short review we summarize the findings provided by the early missions such as WIRE, MOST, and CoRoT, and the recent results of the Kepler and K2 missions. The surprising a...
0
1
0
0
0
0
Explicitly correlated formalism for second-order single-particle Green's function
We present an explicitly correlated formalism for the second-order single-particle Green's function method (GF2-F12) that does not assume the popular diagonal approximation, and describes the energy dependence of the explicitly correlated terms. For small and medium organic molecules the basis set errors of ionizatio...
0
1
0
0
0
0
Relative stability associated to quantised extremal Kähler metrics
We study algebro-geometric consequences of the quantised extremal Kähler metrics, introduced in the previous work of the author. We prove that the existence of quantised extremal metrics implies weak relative Chow polystability. As a consequence, we obtain asymptotic weak relative Chow polystability and $K$-semistabi...
0
0
1
0
0
0
Beyond the EULA: Improving consent for data mining
Companies and academic researchers may collect, process, and distribute large quantities of personal data without the explicit knowledge or consent of the individuals to whom the data pertains. Existing forms of consent often fail to be appropriately readable and ethical oversight of data mining may not be sufficient...
1
0
0
0
0
0
Estimating a Separably-Markov Random Field (SMuRF) from Binary Observations
A fundamental problem in neuroscience is to characterize the dynamics of spiking from the neurons in a circuit that is involved in learning about a stimulus or a contingency. A key limitation of current methods to analyze neural spiking data is the need to collapse neural activity over time or trials, which may cause...
1
0
0
1
0
0
Using Deep Reinforcement Learning for the Continuous Control of Robotic Arms
Deep reinforcement learning enables algorithms to learn complex behavior, deal with continuous action spaces and find good strategies in environments with high dimensional state spaces. With deep reinforcement learning being an active area of research and many concurrent inventions, we decided to focus on a relativel...
1
0
0
0
0
0
The First Detection of Gravitational Waves
This article deals with the first detection of gravitational waves by the advanced Laser Interferometer Gravitational Wave Observatory (LIGO) detectors on 14 September 2015, where the signal was generated by two stellar mass black holes with masses 36 $ M_{\odot}$ and 29 $ M_{\odot}$ that merged to form a 62 $ M_{\od...
0
1
0
0
0
0
Remarkably strong chemisorption of nitric oxide on insulating oxide films promoted by hybrid structure
The remarkably strong chemical adsorption behaviors of nitric oxide on magnesia (001) film deposited on metal substrate have been investigated by employing periodic density functional calculations with Van der Waals corrections. The molybdenum supported magnesia (001) show significantly enhanced adsorption properties...
0
1
0
0
0
0
Knowledge Transfer from Weakly Labeled Audio using Convolutional Neural Network for Sound Events and Scenes
In this work we propose approaches to effectively transfer knowledge from weakly labeled web audio data. We first describe a convolutional neural network (CNN) based framework for sound event detection and classification using weakly labeled audio data. Our model trains efficiently from audios of variable lengths; he...
1
0
0
0
0
0
A priori estimates for the free-boundary Euler equations with surface tension in three dimensions
We derive a priori estimates for the incompressible free-boundary Euler equations with surface tension in three spatial dimensions. Working in Lagrangian coordinates, we provide a priori estimates for the local existence when the initial velocity, which is rotational, belongs to $H^3$ and the trace of initial velocit...
0
0
1
0
0
0
Koszul duality via suspending Lefschetz fibrations
Let $M$ be a Liouville 6-manifold which is the smooth fiber of a Lefschetz fibration on $\mathbb{C}^4$ constructed by suspending a Lefschetz fibration on $\mathbb{C}^3$. We prove that for many examples including stabilizations of Milnor fibers of hypersurface cusp singularities, the compact Fukaya category $\mathcal{...
0
0
1
0
0
0
Attractor of Cantor Type with Positive Measure
We construct an iterated function system consisting of strictly increasing contractions $f,g\colon [0,1]\to [0,1]$ with $f([0,1])\cap g([0,1])=\emptyset$ and such that its attractor has positive Lebesgue measure.
0
0
1
0
0
0
Generating online social networks based on socio-demographic attributes
Recent years have seen tremendous growth of many online social networks such as Facebook, LinkedIn and MySpace. People connect to each other through these networks forming large social communities providing researchers rich datasets to understand, model and predict social interactions and behaviors. New contacts in t...
1
1
0
0
0
0
Optimal control of diffuser shapes for confined turbulent shear flows
A model for the development of turbulent shear flows, created by non-uniform parallel flows in a confining channel, is used to identify the diffuser shape that maximises pressure recovery when the inflow is non-uniform. Wide diffuser angles tend to accentuate the non- uniform flow, causing poor pressure recovery. On ...
0
1
0
0
0
0
Criteria for Solar Car Optimized Route Estimation
This paper gives a thorough overview of Solar Car Optimized Route Estimation (SCORE), novel route optimization scheme for solar vehicles based on solar irradiance and target distance. In order to conduct the optimization, both data collection and the optimization algorithm itself have to be performed using appropriat...
1
0
1
0
0
0
Dykes for filtering ocean waves using c-shaped vertical cylinders
The present study investigates a way to design dykes which can filter the wavelengths of ocean surface waves. This offers the possibility to achieve a structure that can attenuate waves associated with storm swell, without affecting coastline in other conditions. Our approach is based on low frequency resonances in m...
0
1
0
0
0
0
Origin of Non-axisymmetric Features of Virgo Cluster Early-type Dwarf Galaxies. I. Bar Formation and Recurrent Buckling
A fraction of early-type dwarf galaxies in the Virgo cluster have a disk component and even possess disk features such as bar, lens, and spiral arms. In this study, we construct 15 galaxy models that resemble VCC856, considered to be an infalling progenitor of disk dwarf galaxies, within observational error ranges, a...
0
1
0
0
0
0
First results from the DEAP-3600 dark matter search with argon at SNOLAB
This paper reports the first results of a direct dark matter search with the DEAP-3600 single-phase liquid argon (LAr) detector. The experiment was performed 2 km underground at SNOLAB (Sudbury, Canada) utilizing a large target mass, with the LAr target contained in a spherical acrylic vessel of 3600 kg capacity. The...
0
1
0
0
0
0
Camera Calibration by Global Constraints on the Motion of Silhouettes
We address the problem of epipolar geometry using the motion of silhouettes. Such methods match epipolar lines or frontier points across views, which are then used as the set of putative correspondences. We introduce an approach that improves by two orders of magnitude the performance over state-of-the-art methods, b...
1
0
0
0
0
0
Ann: A domain-specific language for the effective design and validation of Java annotations
This paper describes a new modelling language for the effective design and validation of Java annotations. Since their inclusion in the 5th edition of Java, annotations have grown from a useful tool for the addition of meta-data to play a central role in many popular software projects. Usually they are not conceived ...
1
0
0
0
0
0
Fréchet ChemNet Distance: A metric for generative models for molecules in drug discovery
The new wave of successful generative models in machine learning has increased the interest in deep learning driven de novo drug design. However, assessing the performance of such generative models is notoriously difficult. Metrics that are typically used to assess the performance of such generative models are the pe...
0
0
0
1
1
0
RANSAC Algorithms for Subspace Recovery and Subspace Clustering
We consider the RANSAC algorithm in the context of subspace recovery and subspace clustering. We derive some theory and perform some numerical experiments. We also draw some correspondences with the methods of Hardt and Moitra (2013) and Chen and Lerman (2009b).
0
0
1
1
0
0
Convex Formulations for Fair Principal Component Analysis
Though there is a growing body of literature on fairness for supervised learning, the problem of incorporating fairness into unsupervised learning has been less well-studied. This paper studies fairness in the context of principal component analysis (PCA). We first present a definition of fairness for dimensionality ...
0
0
0
1
0
0
Report: Dynamic Eye Movement Matching and Visualization Tool in Neuro Gesture
In the research of the impact of gestures using by a lecturer, one challenging task is to infer the attention of a group of audiences. Two important measurements that can help infer the level of attention are eye movement data and Electroencephalography (EEG) data. Under the fundamental assumption that a group of peo...
1
0
0
0
0
0