title
stringlengths
7
239
abstract
stringlengths
7
2.76k
cs
int64
0
1
phy
int64
0
1
math
int64
0
1
stat
int64
0
1
quantitative biology
int64
0
1
quantitative finance
int64
0
1
Comment on Jackson's analysis of electric charge quantization due to interaction with Dirac's magnetic monopole
In J.D. Jackson's Classical Electrodynamics textbook, the analysis of Dirac's charge quantization condition in the presence of a magnetic monopole has a mathematical omission and an all too brief physical argument that might mislead some students. This paper presents a detailed derivation of Jackson's main result, ex...
0
1
0
0
0
0
Study of charged hadron multiplicities in charged-current neutrino-lead interactions in the OPERA detector
The OPERA experiment was designed to search for $\nu_{\mu} \rightarrow \nu_{\tau}$ oscillations in appearance mode through the direct observation of tau neutrinos in the CNGS neutrino beam. In this paper, we report a study of the multiplicity of charged particles produced in charged-current neutrino interactions in l...
0
1
0
0
0
0
On the coefficients of the Alekseev Torossian associator
This paper explains a method to calculate the coefficients of the Alekseev-Torossian associator as linear combinations of iterated integrals of Kontsevich weight forms of Lie graphs.
0
0
1
0
0
0
Exact spectral decomposition of a time-dependent one-particle reduced density matrix
We determine the exact time-dependent non-idempotent one-particle reduced density matrix and its spectral decomposition for a harmonically confined two-particle correlated one-dimensional system when the interaction terms in the Schrödinger Hamiltonian are changed abruptly. Based on this matrix in coordinate space we...
0
1
0
0
0
0
A short variational proof of equivalence between policy gradients and soft Q learning
Two main families of reinforcement learning algorithms, Q-learning and policy gradients, have recently been proven to be equivalent when using a softmax relaxation on one part, and an entropic regularization on the other. We relate this result to the well-known convex duality of Shannon entropy and the softmax functi...
1
0
0
0
0
0
Non-parametric Message Important Measure: Storage Code Design and Transmission Planning for Big Data
Storage and transmission in big data are discussed in this paper, where message importance is taken into account. Similar to Shannon Entropy and Renyi Entropy, we define non-parametric message important measure (NMIM) as a measure for the message importance in the scenario of big data, which can characterize the unce...
0
0
1
1
0
0
Graphene and its elemental analogue: A molecular dynamics view of fracture phenomenon
Graphene and some graphene like two dimensional materials; hexagonal boron nitride (hBN) and silicene have unique mechanical properties which severely limit the suitability of conventional theories used for common brittle and ductile materials to predict the fracture response of these materials. This study revealed t...
0
1
0
0
0
0
Learning Synergies between Pushing and Grasping with Self-supervised Deep Reinforcement Learning
Skilled robotic manipulation benefits from complex synergies between non-prehensile (e.g. pushing) and prehensile (e.g. grasping) actions: pushing can help rearrange cluttered objects to make space for arms and fingers; likewise, grasping can help displace objects to make pushing movements more precise and collision-...
1
0
0
1
0
0
A Versatile Approach to Evaluating and Testing Automated Vehicles based on Kernel Methods
Evaluation and validation of complicated control systems are crucial to guarantee usability and safety. Usually, failure happens in some very rarely encountered situations, but once triggered, the consequence is disastrous. Accelerated Evaluation is a methodology that efficiently tests those rarely-occurring yet crit...
1
0
0
1
0
0
Decoupled Access-Execute on ARM big.LITTLE
Energy-efficiency plays a significant role given the battery lifetime constraints in embedded systems and hand-held devices. In this work we target the ARM big.LITTLE, a heterogeneous platform that is dominant in the mobile and embedded market, which allows code to run transparently on different microarchitectures wi...
1
0
0
0
0
0
Closure structures parameterized by systems of isotone Galois connections
We study properties of classes of closure operators and closure systems parameterized by systems of isotone Galois connections. The parameterizations express stronger requirements on idempotency and monotony conditions of closure operators. The present approach extends previous approaches to fuzzy closure operators w...
1
0
0
0
0
0
High Isolation Improvement in a Compact UWB MIMO Antenna
A compact multiple-input-multiple-output (MIMO) antenna with very high isolation is proposed for ultrawide-band (UWB) applications. The antenna with a compact size of 30.1x20.5 mm^2 (0.31${\lambda}_0$ x0.21${\lambda}_0$ ) consists of two planar-monopole antenna elements. It is found that isolation of more than 25 dB ...
0
1
0
0
0
0
Identifying and Alleviating Concept Drift in Streaming Tensor Decomposition
Tensor decompositions are used in various data mining applications from social network to medical applications and are extremely useful in discovering latent structures or concepts in the data. Many real-world applications are dynamic in nature and so are their data. To deal with this dynamic nature of data, there ex...
0
0
0
1
0
0
Handling Adversarial Concept Drift in Streaming Data
Classifiers operating in a dynamic, real world environment, are vulnerable to adversarial activity, which causes the data distribution to change over time. These changes are traditionally referred to as concept drift, and several approaches have been developed in literature to deal with the problem of drift handling ...
0
0
0
1
0
0
Real intersection homology
We present a definition of intersection homology for real algebraic varieties that is analogous to Goresky and MacPherson's original definition of intersection homology for complex varieties.
0
0
1
0
0
0
High Contrast Observations of Bright Stars with a Starshade
Starshades are a leading technology to enable the direct detection and spectroscopic characterization of Earth-like exoplanets. In an effort to advance starshade technology through system level demonstrations, the McMath-Pierce Solar Telescope was adapted to enable the suppression of astronomical sources with a stars...
0
1
0
0
0
0
Unconstrained inverse quadratic programming problem
The paper covers a formulation of the inverse quadratic programming problem in terms of unconstrained optimization where it is required to find the unknown parameters (the matrix of the quadratic form and the vector of the quasi-linear part of the quadratic form) provided that approximate estimates of the optimal sol...
1
0
1
0
0
0
Families of Thue equations associated with a rank one subgroup of the unit group of a number field
Twisting a binary form $F_0(X,Y)\in{\mathbb{Z}}[X,Y]$ of degree $d\ge 3$ by powers $\upsilon^a$ ($a\in{\mathbb{Z}}$) of an algebraic unit $\upsilon$ gives rise to a binary form $F_a(X,Y)\in{\mathbb{Z}}[X,Y]$. More precisely, when $K$ is a number field of degree $d$, $\sigma_1,\sigma_2,\dots,\sigma_d$ the embeddings o...
0
0
1
0
0
0
On Defects Between Gapped Boundaries in Two-Dimensional Topological Phases of Matter
Defects between gapped boundaries provide a possible physical realization of projective non-abelian braid statistics. A notable example is the projective Majorana/parafermion braid statistics of boundary defects in fractional quantum Hall/topological insulator and superconductor heterostructures. In this paper, we de...
0
1
1
0
0
0
Arbitrary order 2D virtual elements for polygonal meshes: Part II, inelastic problem
The present paper is the second part of a twofold work, whose first part is reported in [3], concerning a newly developed Virtual Element Method (VEM) for 2D continuum problems. The first part of the work proposed a study for linear elastic problem. The aim of this part is to explore the features of the VEM formulati...
0
0
1
0
0
0
Reconstruction of Hidden Representation for Robust Feature Extraction
This paper aims to develop a new and robust approach to feature representation. Motivated by the success of Auto-Encoders, we first theoretical summarize the general properties of all algorithms that are based on traditional Auto-Encoders: 1) The reconstruction error of the input can not be lower than a lower bound, ...
1
0
0
1
0
0
HONE: Higher-Order Network Embeddings
This paper describes a general framework for learning Higher-Order Network Embeddings (HONE) from graph data based on network motifs. The HONE framework is highly expressive and flexible with many interchangeable components. The experimental results demonstrate the effectiveness of learning higher-order network repre...
1
0
0
1
0
0
Cosmological Evolution and Exact Solutions in a Fourth-order Theory of Gravity
A fourth-order theory of gravity is considered which in terms of dynamics has the same degrees of freedom and number of constraints as those of scalar-tensor theories. In addition it admits a canonical point-like Lagrangian description. We study the critical points of the theory and we show that it can describe the m...
0
1
1
0
0
0
Linear Progress with Exponential Decay in Weakly Hyperbolic Groups
A random walk $w_n$ on a separable, geodesic hyperbolic metric space $X$ converges to the boundary $\partial X$ with probability one when the step distribution supports two independent loxodromics. In particular, the random walk makes positive linear progress. Progress is known to be linear with exponential decay whe...
0
0
1
0
0
0
Talbot-enhanced, maximum-visibility imaging of condensate interference
Nearly two centuries ago Talbot first observed the fascinating effect whereby light propagating through a periodic structure generates a `carpet' of image revivals in the near field. Here we report the first observation of the spatial Talbot effect for light interacting with periodic Bose-Einstein condensate interfer...
0
1
0
0
0
0
A numerical study of the F-model with domain-wall boundaries
We perform a numerical study of the F-model with domain-wall boundary conditions. Various exact results are known for this particular case of the six-vertex model, including closed expressions for the partition function for any system size as well as its asymptotics and leading finite-size corrections. To complement ...
0
1
0
0
0
0
Visualizing the Loss Landscape of Neural Nets
Neural network training relies on our ability to find "good" minimizers of highly non-convex loss functions. It is well-known that certain network architecture designs (e.g., skip connections) produce loss functions that train easier, and well-chosen training parameters (batch size, learning rate, optimizer) produce ...
1
0
0
1
0
0
Hydrogen bonding characterization in water and small molecules
The prototypical Hydrogen bond in water dimer and Hydrogen bonds in the protonated water dimer, in other small molecules, in water cyclic clusters, and in ice, covering a wide range of bond strengths, are theoretically investigated by first-principles calculations based on the Density Functional Theory, considering a...
0
1
0
0
0
0
A Calculus of Truly Concurrent Mobile Processes
We make a mixture of Milner's $\pi$-calculus and our previous work on truly concurrent process algebra, which is called $\pi_{tc}$. We introduce syntax and semantics of $\pi_{tc}$, its properties based on strongly truly concurrent bisimilarities. Also, we include an axiomatization of $\pi_{tc}$. $\pi_{tc}$ can be use...
1
0
0
0
0
0
Gigahertz optomechanical modulation by split-ring-resonator nanophotonic meta-atom arrays
Using polarization-resolved transient reflection spectroscopy, we investigate the ultrafast modulation of light interacting with a metasurface consisting of coherently vibrating nanophotonic meta-atoms in the form of U-shaped split-ring resonators, that exhibit co-localized optical and mechanical resonances. With a t...
0
1
0
0
0
0
Guaranteed Fault Detection and Isolation for Switched Affine Models
This paper considers the problem of fault detection and isolation (FDI) for switched affine models. We first study the model invalidation problem and its application to guaranteed fault detection. Novel and intuitive optimization-based formulations are proposed for model invalidation and T-distinguishability problems...
1
0
1
0
0
0
NOOP: A Domain-Theoretic Model of Nominally-Typed OOP
The majority of industrial-strength object-oriented (OO) software is written using nominally-typed OO programming languages. Extant domain-theoretic models of OOP developed to analyze OO type systems miss, however, a crucial feature of these mainstream OO languages: nominality. This paper presents the construction of...
1
0
0
0
0
0
Modelling wave-induced sea ice breakup in the marginal ice zone
A model of ice floe breakup under ocean wave forcing in the marginal ice zone (MIZ) is proposed to investigate how floe size distribution (FSD) evolves under repeated wave breakup events. A three-dimensional linear model of ocean wave scattering by a finite array of compliant circular ice floes is coupled to a flexur...
0
1
0
0
0
0
An Introduction to Animal Movement Modeling with Hidden Markov Models using Stan for Bayesian Inference
Hidden Markov models (HMMs) are popular time series model in many fields including ecology, economics and genetics. HMMs can be defined over discrete or continuous time, though here we only cover the former. In the field of movement ecology in particular, HMMs have become a popular tool for the analysis of movement d...
0
0
0
1
1
0
Sampling a Network to Find Nodes of Interest
The focus of the current research is to identify people of interest in social networks. We are especially interested in studying dark networks, which represent illegal or covert activity. In such networks, people are unlikely to disclose accurate information when queried. We present REDLEARN, an algorithm for samplin...
1
1
0
0
0
0
Representation Mixing for TTS Synthesis
Recent character and phoneme-based parametric TTS systems using deep learning have shown strong performance in natural speech generation. However, the choice between character or phoneme input can create serious limitations for practical deployment, as direct control of pronunciation is crucial in certain cases. We d...
1
0
0
0
0
0
Safe Open-Loop Strategies for Handling Intermittent Communications in Multi-Robot Systems
In multi-robot systems where a central decision maker is specifying the movement of each individual robot, a communication failure can severely impair the performance of the system. This paper develops a motion strategy that allows robots to safely handle critical communication failures for such multi-robot architect...
1
0
0
0
0
0
Scientific co-authorship networks
The paper addresses the stability of the co-authorship networks in time. The analysis is done on the networks of Slovenian researchers in two time periods (1991-2000 and 2001-2010). Two researchers are linked if they published at least one scientific bibliographic unit in a given time period. As proposed by Kronegger...
1
0
0
1
0
0
Projection Based Weight Normalization for Deep Neural Networks
Optimizing deep neural networks (DNNs) often suffers from the ill-conditioned problem. We observe that the scaling-based weight space symmetry property in rectified nonlinear network will cause this negative effect. Therefore, we propose to constrain the incoming weights of each neuron to be unit-norm, which is formu...
1
0
0
0
0
0
Mapping stable direct and retrograde orbits around the triple system of asteroids (45) Eugenia
It is well accepted that knowing the composition and the orbital evolution of asteroids may help us to understand the process of formation of the Solar System. It is also known that asteroids can represent a threat to our planet. Such important role made space missions to asteroids a very popular topic in the current...
0
1
0
0
0
0
Zinc oxide induces the stringent response and major reorientations in the central metabolism of Bacillus subtilis
Microorganisms, such as bacteria, are one of the first targets of nanoparticles in the environment. In this study, we tested the effect of two nanoparticles, ZnO and TiO2, with the salt ZnSO4 as the control, on the Gram-positive bacterium Bacillus subtilis by 2D gel electrophoresis-based proteomics. Despite a signifi...
0
0
0
0
1
0
Learning what matters - Sampling interesting patterns
In the field of exploratory data mining, local structure in data can be described by patterns and discovered by mining algorithms. Although many solutions have been proposed to address the redundancy problems in pattern mining, most of them either provide succinct pattern sets or take the interests of the user into a...
1
0
0
1
0
0
Proofs as Relational Invariants of Synthesized Execution Grammars
The automatic verification of programs that maintain unbounded low-level data structures is a critical and open problem. Analyzers and verifiers developed in previous work can synthesize invariants that only describe data structures of heavily restricted forms, or require an analyst to provide predicates over program...
1
0
0
0
0
0
Orthogonal involutions and totally singular quadratic forms in characteristic two
We associate to every central simple algebra with involution of orthogonal type in characteristic two a totally singular quadratic form which reflects certain anisotropy properties of the involution. It is shown that this quadratic form can be used to classify totally decomposable algebras with orthogonal involution....
0
0
1
0
0
0
Coastal flood implications of 1.5 °C, 2.0 °C, and 2.5 °C temperature stabilization targets in the 21st and 22nd century
Sea-level rise (SLR) is magnifying the frequency and severity of coastal flooding. The rate and amount of global mean sea-level (GMSL) rise is a function of the trajectory of global mean surface temperature (GMST). Therefore, temperature stabilization targets (e.g., 1.5 °C and 2.0 °C of warming above pre-industrial l...
0
1
0
0
0
0
Unsupervised Learning of Disentangled and Interpretable Representations from Sequential Data
We present a factorized hierarchical variational autoencoder, which learns disentangled and interpretable representations from sequential data without supervision. Specifically, we exploit the multi-scale nature of information in sequential data by formulating it explicitly within a factorized hierarchical graphical ...
1
0
0
1
0
0
De-blending Deep Herschel Surveys: A Multi-wavelength Approach
Cosmological surveys in the far infrared are known to suffer from confusion. The Bayesian de-blending tool, XID+, currently provides one of the best ways to de-confuse deep Herschel SPIRE images, using a flat flux density prior. This work is to demonstrate that existing multi-wavelength data sets can be exploited to ...
0
1
0
0
0
0
Room-Temperature Ionic Liquids Meet Bio-Membranes: the State-of-the- Art
Room-temperature ionic liquids (RTIL) are a new class of organic salts whose melting temperature falls below the conventional limit of 100C. Their low vapor pressure, moreover, has made these ionic compounds the solvents of choice of the so-called green chemistry. For these and other peculiar characteristics, they ar...
0
1
0
0
0
0
The use of Charts, Pivot Tables, and Array Formulas in two Popular Spreadsheet Corpora
The use of spreadsheets in industry is widespread. Companies base decisions on information coming from spreadsheets. Unfortunately, spreadsheets are error-prone and this increases the risk that companies base their decisions on inaccurate information, which can lead to incorrect decisions and loss of money. In genera...
1
0
0
0
0
0
Disordered statistical physics in low dimensions: extremes, glass transition, and localization
This thesis presents original results in two domains of disordered statistical physics: logarithmic correlated Random Energy Models (logREMs), and localization transitions in long-range random matrices. In the first part devoted to logREMs, we show how to characterise their common properties and model--specific data....
0
1
0
0
0
0
HyperMinHash: MinHash in LogLog space
In this extended abstract, we describe and analyze a lossy compression of MinHash from buckets of size $O(\log n)$ to buckets of size $O(\log\log n)$ by encoding using floating-point notation. This new compressed sketch, which we call HyperMinHash, as we build off a HyperLogLog scaffold, can be used as a drop-in repl...
1
0
0
0
0
0
Asynchronous stochastic price pump
We propose a model for equity trading in a population of agents where each agent acts to achieve his or her target stock-to-bond ratio, and, as a feedback mechanism, follows a market adaptive strategy. In this model only a fraction of agents participates in buying and selling stock during a trading period, while the ...
0
0
0
0
0
1
Character Distributions of Classical Chinese Literary Texts: Zipf's Law, Genres, and Epochs
We collect 14 representative corpora for major periods in Chinese history in this study. These corpora include poetic works produced in several dynasties, novels of the Ming and Qing dynasties, and essays and news reports written in modern Chinese. The time span of these corpora ranges between 1046 BCE and 2007 CE. W...
1
0
0
0
0
0
Improving Bi-directional Generation between Different Modalities with Variational Autoencoders
We investigate deep generative models that can exchange multiple modalities bi-directionally, e.g., generating images from corresponding texts and vice versa. A major approach to achieve this objective is to train a model that integrates all the information of different modalities into a joint representation and then...
0
0
0
1
0
0
Matching neural paths: transfer from recognition to correspondence search
Many machine learning tasks require finding per-part correspondences between objects. In this work we focus on low-level correspondences - a highly ambiguous matching problem. We propose to use a hierarchical semantic representation of the objects, coming from a convolutional neural network, to solve this ambiguity. ...
1
0
0
0
0
0
On the affine random walk on the torus
Let $\mu$ be a borelian probability measure on $\mathbf{G}:=\mathrm{SL}_d(\mathbb{Z}) \ltimes \mathbb{T}^d$. Define, for $x\in \mathbb{T}^d$, a random walk starting at $x$ denoting for $n\in \mathbb{N}$, \[ \left\{\begin{array}{rcl} X_0 &=&x\\ X_{n+1} &=& a_{n+1} X_n + b_{n+1} \end{array}\right. \] where $((a_n,b_n))...
0
0
1
0
0
0
StackInsights: Cognitive Learning for Hybrid Cloud Readiness
Hybrid cloud is an integrated cloud computing environment utilizing a mix of public cloud, private cloud, and on-premise traditional IT infrastructures. Workload awareness, defined as a detailed full range understanding of each individual workload, is essential in implementing the hybrid cloud. While it is critical t...
1
0
0
0
0
0
Risk-averse model predictive control
Risk-averse model predictive control (MPC) offers a control framework that allows one to account for ambiguity in the knowledge of the underlying probability distribution and unifies stochastic and worst-case MPC. In this paper we study risk-averse MPC problems for constrained nonlinear Markovian switching systems us...
0
0
1
0
0
0
Neutral evolution and turnover over centuries of English word popularity
Here we test Neutral models against the evolution of English word frequency and vocabulary at the population scale, as recorded in annual word frequencies from three centuries of English language books. Against these data, we test both static and dynamic predictions of two neutral models, including the relation betwe...
1
1
0
0
0
0
On Statistically-Secure Quantum Homomorphic Encryption
Homomorphic encryption is an encryption scheme that allows computations to be evaluated on encrypted inputs without knowledge of their raw messages. Recently Ouyang et al. constructed a quantum homomorphic encryption (QHE) scheme for Clifford circuits with statistical security (or information-theoretic security (IT-s...
1
0
0
0
0
0
Monte Carlo Tree Search for Asymmetric Trees
We present an extension of Monte Carlo Tree Search (MCTS) that strongly increases its efficiency for trees with asymmetry and/or loops. Asymmetric termination of search trees introduces a type of uncertainty for which the standard upper confidence bound (UCB) formula does not account. Our first algorithm (MCTS-T), wh...
0
0
0
1
0
0
On the difference-to-sum power ratio of speech and wind noise based on the Corcos model
The difference-to-sum power ratio was proposed and used to suppress wind noise under specific acoustic conditions. In this contribution, a general formulation of the difference-to-sum power ratio associated with a mixture of speech and wind noise is proposed and analyzed. In particular, it is assumed that the complex...
1
0
0
0
0
0
Quantum torus algebras and B(C) type Toda systems
In this paper, we construct a new even constrained B(C) type Toda hierarchy and derive its B(C) type Block type additional symmetry. Also we generalize the B(C) type Toda hierarchy to the $N$-component B(C) type Toda hierarchy which is proved to have symmetries of a coupled $\bigotimes^NQT_+ $ algebra ( $N$-folds dir...
0
1
1
0
0
0
A Decidable Intuitionistic Temporal Logic
We introduce the logic $\sf ITL^e$, an intuitionistic temporal logic based on structures $(W,\preccurlyeq,S)$, where $\preccurlyeq$ is used to interpret intuitionistic implication and $S$ is a $\preccurlyeq$-monotone function used to interpret temporal modalities. Our main result is that the satisfiability and validi...
0
0
1
0
0
0
A Re-weighted Joint Spatial-Radon Domain CT Image Reconstruction Model for Metal Artifact Reduction
High density implants such as metals often lead to serious artifacts in the reconstructed CT images which hampers the accuracy of image based diagnosis and treatment planning. In this paper, we propose a novel wavelet frame based CT image reconstruction model to reduce metal artifacts. This model is built on a joint ...
0
1
1
0
0
0
A simple proof that the $(n^2-1)$-puzzle is hard
The 15 puzzle is a classic reconfiguration puzzle with fifteen uniquely labeled unit squares within a $4 \times 4$ board in which the goal is to slide the squares (without ever overlapping) into a target configuration. By generalizing the puzzle to an $n \times n$ board with $n^2-1$ squares, we can study the computat...
1
0
0
0
0
0
Is Proxima Centauri b habitable? -- A study of atmospheric loss
We address the important question of whether the newly discovered exoplanet, Proxima Centauri b (PCb), is capable of retaining an atmosphere over long periods of time. This is done by adapting a sophisticated multi-species MHD model originally developed for Venus and Mars, and computing the ion escape losses from PCb...
0
1
0
0
0
0
A Geometric Perspective on the Power of Principal Component Association Tests in Multiple Phenotype Studies
Joint analysis of multiple phenotypes can increase statistical power in genetic association studies. Principal component analysis, as a popular dimension reduction method, especially when the number of phenotypes is high-dimensional, has been proposed to analyze multiple correlated phenotypes. It has been empirically...
0
0
0
1
0
0
A Design Based on Stair-case Band Alignment of Electron Transport Layer for Improving Performance and Stability in Planar Perovskite Solar Cells
Among the n-type metal oxide materials used in the planar perovskite solar cells, zinc oxide (ZnO) is a promising candidate to replace titanium dioxide (TiO2) due to its relatively high electron mobility, high transparency, and versatile nanostructures. Here, we present the application of low temperature solution pro...
0
1
0
0
0
0
Statistics on functional data and covariance operators in linear inverse problems
We introduce a framework for the statistical analysis of functional data in a setting where these objects cannot be fully observed, but only indirect and noisy measurements are available, namely an inverse problem setting. The proposed methodology can be applied either to the analysis of indirectly observed functiona...
0
0
0
1
0
0
Development of ICA and IVA Algorithms with Application to Medical Image Analysis
Independent component analysis (ICA) is a widely used BSS method that can uniquely achieve source recovery, subject to only scaling and permutation ambiguities, through the assumption of statistical independence on the part of the latent sources. Independent vector analysis (IVA) extends the applicability of ICA by j...
0
0
0
1
0
0
Observability of characteristic binary-induced structures in circumbinary disks
Context: A substantial fraction of protoplanetary disks forms around stellar binaries. The binary system generates a time-dependent non-axisymmetric gravitational potential, inducing strong tidal forces on the circumbinary disk. This leads to a change in basic physical properties of the circumbinary disk, which shoul...
0
1
0
0
0
0
Sound Event Detection in Synthetic Audio: Analysis of the DCASE 2016 Task Results
As part of the 2016 public evaluation challenge on Detection and Classification of Acoustic Scenes and Events (DCASE 2016), the second task focused on evaluating sound event detection systems using synthetic mixtures of office sounds. This task, which follows the `Event Detection - Office Synthetic' task of DCASE 201...
1
0
0
1
0
0
Pressure-induced Superconductivity in the Three-component Fermion Topological Semimetal Molybdenum Phosphide
Topological semimetal, a novel state of quantum matter hosting exotic emergent quantum phenomena dictated by the non-trivial band topology, has emerged as a new frontier in condensed-matter physics. Very recently, a coexistence of triply degenerate points of band crossing and Weyl points near the Fermi level was theo...
0
1
0
0
0
0
Chaotic zones around rotating small bodies
Small bodies of the Solar system, like asteroids, trans-Neptunian objects, cometary nuclei, planetary satellites, with diameters smaller than one thousand kilometers usually have irregular shapes, often resembling dumb-bells, or contact binaries. The spinning of such a gravitating dumb-bell creates around it a zone o...
0
1
0
0
0
0
Collective excitations and supersolid behavior of bosonic atoms inside two crossed optical cavities
We discuss the nature of symmetry breaking and the associated collective excitations for a system of bosons coupled to the electromagnetic field of two optical cavities. For the specific configuration realized in a recent experiment at ETH, we show that, in absence of direct intercavity scattering and for parameters ...
0
1
0
0
0
0
Generalized Value Iteration Networks: Life Beyond Lattices
In this paper, we introduce a generalized value iteration network (GVIN), which is an end-to-end neural network planning module. GVIN emulates the value iteration algorithm by using a novel graph convolution operator, which enables GVIN to learn and plan on irregular spatial graphs. We propose three novel differentia...
1
0
0
0
0
0
Structure and Evolution of Internally Heated Hot Jupiters
Hot Jupiters receive strong stellar irradiation, producing equilibrium temperatures of $1000 - 2500 \ \mathrm{Kelvin}$. Incoming irradiation directly heats just their thin outer layer, down to pressures of $\sim 0.1 \ \mathrm{bars}$. In standard irradiated evolution models of hot Jupiters, predicted transit radii are...
0
1
0
0
0
0
Inference-Based Distributed Channel Allocation in Wireless Sensor Networks
Interference-aware resource allocation of time slots and frequency channels in single-antenna, halfduplex radio wireless sensor networks (WSN) is challenging. Devising distributed algorithms for such task further complicates the problem. This work studiesWSN joint time and frequency channel allocation for a given rou...
1
0
0
0
0
0
Switch Functions
We define a switch function to be a function from an interval to $\{1,-1\}$ with a finite number of sign changes. (Special cases are the Walsh functions.) By a topological argument, we prove that, given $n$ real-valued functions, $f_1, \dots, f_n$, in $L^1[0,1]$, there exists a switch function, $\sigma$, with at most...
0
0
1
0
0
0
Schrödinger operators periodic in octants
We consider Schrödinger operators with periodic potentials in the positive quadrant for dim $>1$ with Dirichlet boundary condition. We show that for any integer $N$ and any interval $I$ there exists a periodic potential such that the Schrödinger operator has $N$ eigenvalues counted with the multiplicity on this inter...
0
0
1
0
0
0
First international comparison of fountain primary frequency standards via a long distance optical fiber link
We report on the first comparison of distant caesium fountain primary frequency standards (PFSs) via an optical fiber link. The 1415 km long optical link connects two PFSs at LNE-SYRTE (Laboratoire National de métrologie et d'Essais - SYstème de Références Temps-Espace) in Paris (France) with two at PTB (Physikalisch...
0
1
0
0
0
0
Hardy inequalities, Rellich inequalities and local Dirichlet forms
First the Hardy and Rellich inequalities are defined for the submarkovian operator associated with a local Dirichlet form. Secondly, two general conditions are derived which are sufficient to deduce the Rellich inequality from the Hardy inequality. In addition the Rellich constant is calculated from the Hardy constan...
0
0
1
0
0
0
Optimized Quantification of Spin Relaxation Times in the Hybrid State
Purpose: The analysis of optimized spin ensemble trajectories for relaxometry in the hybrid state. Methods: First, we constructed visual representations to elucidate the differential equation that governs spin dynamics in hybrid state. Subsequently, numerical optimizations were performed to find spin ensemble traject...
0
1
0
0
0
0
On the generation of drift flows in wall-bounded flows transiting to turbulence
Despite recent progress, laminar-turbulent coexistence in transitional planar wall-bounded shear flows is still not well understood. Contrasting with the processes by which chaotic flow inside turbulent patches is sustained at the local (minimal flow unit) scale, the mechanisms controlling the obliqueness of laminar-...
0
1
0
0
0
0
Goldbach's Function Approximation Using Deep Learning
Goldbach conjecture is one of the most famous open mathematical problems. It states that every even number, bigger than two, can be presented as a sum of 2 prime numbers. % In this work we present a deep learning based model that predicts the number of Goldbach partitions for a given even number. Surprisingly, our mo...
0
0
0
1
0
0
Estimation of a Continuous Distribution on a Real Line by Discretization Methods -- Complete Version--
For an unknown continuous distribution on a real line, we consider the approximate estimation by the discretization. There are two methods for the discretization. First method is to divide the real line into several intervals before taking samples ("fixed interval method") . Second method is dividing the real line us...
0
0
1
1
0
0
Reviving and Improving Recurrent Back-Propagation
In this paper, we revisit the recurrent back-propagation (RBP) algorithm, discuss the conditions under which it applies as well as how to satisfy them in deep neural networks. We show that RBP can be unstable and propose two variants based on conjugate gradient on the normal equations (CG-RBP) and Neumann series (Neu...
0
0
0
1
0
0
A family of Dirichlet-Morrey spaces
To each weighted Dirichlet space $\mathcal{D}_p$, $0<p<1$, we associate a family of Morrey-type spaces ${\mathcal{D}}_p^{\lambda}$, $0< \lambda < 1$, constructed by imposing growth conditions on the norm of hyperbolic translates of functions. We indicate some of the properties of these spaces, mention the characteriz...
0
0
1
0
0
0
Merging real and virtual worlds: An analysis of the state of the art and practical evaluation of Microsoft Hololens
Achieving a symbiotic blending between reality and virtuality is a dream that has been lying in the minds of many people for a long time. Advances in various domains constantly bring us closer to making that dream come true. Augmented reality as well as virtual reality are in fact trending terms and are expected to f...
1
0
0
0
0
0
Fast Characterization of Segmental Duplications in Genome Assemblies
Segmental duplications (SDs), or low-copy repeats (LCR), are segments of DNA greater than 1 Kbp with high sequence identity that are copied to other regions of the genome. SDs are among the most important sources of evolution, a common cause of genomic structural variation, and several are associated with diseases of...
0
0
0
0
1
0
Cross validation for locally stationary processes
We propose an adaptive bandwidth selector via cross validation for local M-estimators in locally stationary processes. We prove asymptotic optimality of the procedure under mild conditions on the underlying parameter curves. The results are applicable to a wide range of locally stationary processes such linear and no...
0
0
1
1
0
0
Weyl nodes in Andreev spectra of multiterminal Josephson junctions: Chern numbers, conductances and supercurrents
We consider mesoscopic four-terminal Josephson junctions and study emergent topological properties of the Andreev subgap bands. We use symmetry-constrained analysis for Wigner-Dyson classes of scattering matrices to derive band dispersions. When scattering matrix of the normal region connecting superconducting leads ...
0
1
0
0
0
0
Injectivity of the connecting homomorphisms
Let $A$ be the inductive limit of a sequence $$A_1\, \xrightarrow{\phi_{1,2}} \,A_2\,\xrightarrow{\phi_{2,3}} \,A_3\rightarrow\cdots$$ with $A_n=\oplus_{i=1}^{n_i}A_{[n,i]}$, where all the $A_{[n,i]}$ are Elliott-Thomsen algebras and $\phi_{n,n+1}$ are homomorphisms, in this paper, we will prove that $A$ can be writt...
0
0
1
0
0
0
Selective Inference for Change Point Detection in Multi-dimensional Sequences
We study the problem of detecting change points (CPs) that are characterized by a subset of dimensions in a multi-dimensional sequence. A method for detecting those CPs can be formulated as a two-stage method: one for selecting relevant dimensions, and another for selecting CPs. It has been difficult to properly cont...
0
0
0
1
0
0
RPC: A Large-Scale Retail Product Checkout Dataset
Over recent years, emerging interest has occurred in integrating computer vision technology into the retail industry. Automatic checkout (ACO) is one of the critical problems in this area which aims to automatically generate the shopping list from the images of the products to purchase. The main challenge of this pro...
1
0
0
0
0
0
Anyonic self-induced disorder in a stabilizer code: quasi-many body localization in a translational invariant model
We enquire into the quasi-many-body localization in topologically ordered states of matter, revolving around the case of Kitaev toric code on ladder geometry, where different types of anyonic defects carry different masses induced by environmental errors. Our study verifies that random arrangement of anyons generates...
0
1
0
0
0
0
KiDS-450: Tomographic Cross-Correlation of Galaxy Shear with {\it Planck} Lensing
We present the tomographic cross-correlation between galaxy lensing measured in the Kilo Degree Survey (KiDS-450) with overlapping lensing measurements of the cosmic microwave background (CMB), as detected by Planck 2015. We compare our joint probe measurement to the theoretical expectation for a flat $\Lambda$CDM co...
0
1
0
0
0
0
Earthquake Early Warning and Beyond: Systems Challenges in Smartphone-based Seismic Network
Earthquake Early Warning (EEW) systems can effectively reduce fatalities, injuries, and damages caused by earthquakes. Current EEW systems are mostly based on traditional seismic and geodetic networks, and exist only in a few countries due to the high cost of installing and maintaining such systems. The MyShake syste...
1
0
0
0
0
0
Gate-error analysis in simulations of quantum computers with transmon qubits
In the model of gate-based quantum computation, the qubits are controlled by a sequence of quantum gates. In superconducting qubit systems, these gates can be implemented by voltage pulses. The success of implementing a particular gate can be expressed by various metrics such as the average gate fidelity, the diamond...
0
1
0
0
0
0