id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
sequence |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2504.16354 | Zhuang Li | Zhuang Li, Qiuping Yi, Jeff Huang | VeriFix: Verifying Your Fix Towards An Atomicity Violation | null | null | null | null | cs.SE | http://creativecommons.org/licenses/by/4.0/ | Atomicity violation is one of the most serious types of bugs in concurrent
programs. Synchronizations are commonly used to enforce atomicity. However, it
is very challenging to place synchronizations correctly and sufficiently
due to complex thread interactions and large input space. This paper presents
\textsf{VeriFix}, a new approach for verifying atomicity violation fixes. Given
a buggy trace that exposes an atomicity violation and a corresponding fix, % in
the form of locks, \textsf{VeriFix} effectively verifies if the fix introduces
sufficient synchronizations to repair the atomicity violation without
introducing new deadlocks. The key idea is that \textsf{VeriFix} transforms the
fix verification problem into a property verification problem, in which both
the observed atomicity violation and potential deadlocks are encoded as a
safety property, and both the inputs and schedules are encoded as symbolic
constraints. By reasoning the conjoined constraints with an SMT solver,
\textsf{VeriFix} systematically explores all reachable paths %from the whole
schedule and input space and verifies if there exists a concrete
\textit{schedule+input} combination to manifest the intended atomicity or any
new deadlocks. We have implemented and evaluated \verifix\ on a collection of
real-world C/C++ programs. The result shows that \textsf{VeriFix} significantly
outperforms the state-of-the-art.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:11:07 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Li",
"Zhuang",
""
],
[
"Yi",
"Qiuping",
""
],
[
"Huang",
"Jeff",
""
]
] |
2504.16355 | Hassan Jameel Asghar | Hassan Asghar, Chenhan Zhang, Dali Kaafar | Property-Preserving Hashing for $\ell_1$-Distance Predicates:
Applications to Countering Adversarial Input Attacks | null | null | null | null | cs.CR cs.IT cs.LG math.IT | http://creativecommons.org/licenses/by/4.0/ | Perceptual hashing is used to detect whether an input image is similar to a
reference image with a variety of security applications. Recently, they have
been shown to succumb to adversarial input attacks which make small
imperceptible changes to the input image yet the hashing algorithm does not
detect its similarity to the original image. Property-preserving hashing (PPH)
is a recent construct in cryptography, which preserves some property
(predicate) of its inputs in the hash domain. Researchers have so far shown
constructions of PPH for Hamming distance predicates, which, for instance,
outputs 1 if two inputs are within Hamming distance $t$. A key feature of PPH
is its strong correctness guarantee, i.e., the probability that the predicate
will not be correctly evaluated in the hash domain is negligible. Motivated by
the use case of detecting similar images under adversarial setting, we propose
the first PPH construction for an $\ell_1$-distance predicate. Roughly, this
predicate checks if the two one-sided $\ell_1$-distances between two images are
within a threshold $t$. Since many adversarial attacks use $\ell_2$-distance
(related to $\ell_1$-distance) as the objective function to perturb the input
image, by appropriately choosing the threshold $t$, we can force the attacker
to add considerable noise to evade detection, and hence significantly
deteriorate the image quality. Our proposed scheme is highly efficient, and
runs in time $O(t^2)$. For grayscale images of size $28 \times 28$, we can
evaluate the predicate in $0.0784$ seconds when pixel values are perturbed by
up to $1 \%$. For larger RGB images of size $224 \times 224$, by dividing the
image into 1,000 blocks, we achieve times of $0.0128$ seconds per block for $1
\%$ change, and up to $0.2641$ seconds per block for $14\%$ change.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:11:21 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Asghar",
"Hassan",
""
],
[
"Zhang",
"Chenhan",
""
],
[
"Kaafar",
"Dali",
""
]
] |
2504.16356 | Jiahe Lin | Jiahe Lin, Yikai Zhang, George Michailidis | Covariate-dependent Graphical Model Estimation via Neural Networks with
Statistical Guarantees | Accepted by Transactions on Machine Learning Research (TMLR) | null | null | null | stat.ML cs.LG stat.ME | http://creativecommons.org/licenses/by/4.0/ | Graphical models are widely used in diverse application domains to model the
conditional dependencies amongst a collection of random variables. In this
paper, we consider settings where the graph structure is covariate-dependent,
and investigate a deep neural network-based approach to estimate it. The method
allows for flexible functional dependency on the covariate, and fits the data
reasonably well in the absence of a Gaussianity assumption. Theoretical results
with PAC guarantees are established for the method, under assumptions commonly
used in an Empirical Risk Minimization framework. The performance of the
proposed method is evaluated on several synthetic data settings and benchmarked
against existing approaches. The method is further illustrated on real datasets
involving data from neuroscience and finance, respectively, and produces
interpretable results.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:13:36 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Lin",
"Jiahe",
""
],
[
"Zhang",
"Yikai",
""
],
[
"Michailidis",
"George",
""
]
] |
2504.16357 | Ying Chang | Ying Chang, Xiaohu Shi, Xiaohui Zhao, Zhaohuang Chen, Deyin Ma | DP2FL: Dual Prompt Personalized Federated Learning in Foundation Models | null | null | null | null | cs.DC cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Personalized federated learning (PFL) has garnered significant attention for
its ability to address heterogeneous client data distributions while preserving
data privacy. However, when local client data is limited, deep learning models
often suffer from insufficient training, leading to suboptimal performance.
Foundation models, such as CLIP (Contrastive Language-Image Pretraining),
exhibit strong feature extraction capabilities and can alleviate this issue by
fine-tuning on limited local data. Despite their potential, foundation models
are rarely utilized in federated learning scenarios, and challenges related to
integrating new clients remain largely unresolved. To address these challenges,
we propose the Dual Prompt Personalized Federated Learning (DP2FL) framework,
which introduces dual prompts and an adaptive aggregation strategy. DP2FL
combines global task awareness with local data-driven insights, enabling local
models to achieve effective generalization while remaining adaptable to
specific data distributions. Moreover, DP2FL introduces a global model that
enables prediction on new data sources and seamlessly integrates newly added
clients without requiring retraining. Experimental results in highly
heterogeneous environments validate the effectiveness of DP2FL's prompt design
and aggregation strategy, underscoring the advantages of prediction on novel
data sources and demonstrating the seamless integration of new clients into the
federated learning framework.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:13:56 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Chang",
"Ying",
""
],
[
"Shi",
"Xiaohu",
""
],
[
"Zhao",
"Xiaohui",
""
],
[
"Chen",
"Zhaohuang",
""
],
[
"Ma",
"Deyin",
""
]
] |
2504.16358 | Huiyan Ying | Tian Bai, Huiyan Ying, Kailong Suo, Junqiu Wei, Tao Fan, Yuanfeng Song | Text-to-TrajVis: Enabling Trajectory Data Visualizations from Natural
Language Questions | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces the Text-to-TrajVis task, which aims to transform
natural language questions into trajectory data visualizations, facilitating
the development of natural language interfaces for trajectory visualization
systems. As this is a novel task, there is currently no relevant dataset
available in the community. To address this gap, we first devised a new
visualization language called Trajectory Visualization Language (TVL) to
facilitate querying trajectory data and generating visualizations. Building on
this foundation, we further proposed a dataset construction method that
integrates Large Language Models (LLMs) with human efforts to create
high-quality data. Specifically, we first generate TVLs using a comprehensive
and systematic process, and then label each TVL with corresponding natural
language questions using LLMs. This process results in the creation of the
first large-scale Text-to-TrajVis dataset, named TrajVL, which contains 18,140
(question, TVL) pairs. Based on this dataset, we systematically evaluated the
performance of multiple LLMs (GPT, Qwen, Llama, etc.) on this task. The
experimental results demonstrate that this task is both feasible and highly
challenging and merits further exploration within the research community.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:15:52 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Bai",
"Tian",
""
],
[
"Ying",
"Huiyan",
""
],
[
"Suo",
"Kailong",
""
],
[
"Wei",
"Junqiu",
""
],
[
"Fan",
"Tao",
""
],
[
"Song",
"Yuanfeng",
""
]
] |
2504.16359 | Hanqian Li | Xuming Hu, Hanqian Li, Jungang Li, Aiwei Liu | VideoMark: A Distortion-Free Robust Watermarking Framework for Video
Diffusion Models | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | This work presents VideoMark, a training-free robust watermarking framework
for video diffusion models. As diffusion models advance in generating highly
realistic videos, the need for reliable content attribution mechanisms has
become critical. While watermarking techniques for image diffusion models have
made progress, directly extending these methods to videos presents unique
challenges due to variable video lengths and vulnerability to temporal attacks.
VideoMark addresses these limitations through a frame-wise watermarking
strategy using pseudorandom error correction (PRC) codes to embed watermark
information during the generation process. Our method generates an extended
watermark message sequence and randomly selects starting positions for each
video, ensuring uniform noise distribution in the latent space and maintaining
generation quality. For watermark extraction, we introduce a Temporal Matching
Module (TMM) that uses edit distance to align decoded messages with the
original watermark sequence, providing robustness against temporal attacks such
as frame deletion. Experimental results demonstrate that VideoMark achieves
higher decoding accuracy than existing methods while maintaining video quality
on par with watermark-free generation. Importantly, our watermark remains
undetectable to attackers without the secret key, ensuring strong
imperceptibility compared to other watermarking frameworks. VideoMark provides
a practical solution for content attribution in diffusion-based video
generation without requiring additional training or compromising video quality.
Our code and data are available at
\href{https://github.com/KYRIE-LI11/VideoMark}{https://github.com/KYRIE-LI11/VideoMark}.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:21:12 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Hu",
"Xuming",
""
],
[
"Li",
"Hanqian",
""
],
[
"Li",
"Jungang",
""
],
[
"Liu",
"Aiwei",
""
]
] |
2504.16360 | Tao Wu | Mao Wang, Tao Wu, Xingping Xian, Shaojie Qiao, Weina Niu, Canyixing
Cui | Disentangled Graph Representation Based on Substructure-Aware Graph
Optimal Matching Kernel Convolutional Networks | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graphs effectively characterize relational data, driving graph representation
learning methods that uncover underlying predictive information. As
state-of-the-art approaches, Graph Neural Networks (GNNs) enable end-to-end
learning for diverse tasks. Recent disentangled graph representation learning
enhances interpretability by decoupling independent factors in graph data.
However, existing methods often implicitly and coarsely characterize graph
structures, limiting structural pattern analysis within the graph. This paper
proposes the Graph Optimal Matching Kernel Convolutional Network (GOMKCN) to
address this limitation. We view graphs as node-centric subgraphs, where each
subgraph acts as a structural factor encoding position-specific information.
This transforms graph prediction into structural pattern recognition. Inspired
by CNNs, GOMKCN introduces the Graph Optimal Matching Kernel (GOMK) as a
convolutional operator, computing similarities between subgraphs and learnable
graph filters. Mathematically, GOMK maps subgraphs and filters into a Hilbert
space, representing graphs as point sets. Disentangled representations emerge
from projecting subgraphs onto task-optimized filters, which adaptively capture
relevant structural patterns via gradient descent. Crucially, GOMK incorporates
local correspondences in similarity measurement, resolving the trade-off
between differentiability and accuracy in graph kernels. Experiments validate
that GOMKCN achieves superior accuracy and interpretability in graph pattern
mining and prediction. The framework advances the theoretical foundation for
disentangled graph representation learning.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:26:33 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Wang",
"Mao",
""
],
[
"Wu",
"Tao",
""
],
[
"Xian",
"Xingping",
""
],
[
"Qiao",
"Shaojie",
""
],
[
"Niu",
"Weina",
""
],
[
"Cui",
"Canyixing",
""
]
] |
2504.16361 | Qizhao Chen | Qizhao Chen | Comparing Different Transformer Model Structures for Stock Prediction | null | null | null | null | cs.CE | http://creativecommons.org/licenses/by/4.0/ | This paper compares different Transformer model architectures for stock index
prediction. While many studies have shown that Transformers perform well in
stock price forecasting, few have explored how different structural designs
impact performance. Most existing works treat the Transformer as a black box,
overlooking how specific architectural choices may affect predictive accuracy.
However, understanding these differences is critical for developing more
effective forecasting models. This study aims to identify which Transformer
variant is most suitable for stock forecasting. This study evaluates five
Transformer structures: (1) encoder-only Transformer, (2) decoder-only
Transformer, (3) Vanilla Transformer (encoder + decoder), (4) Vanilla
Transformer without embedding layers, and (5) Vanilla Transformer with
ProbSparse attention. Results show that Transformer-based models generally
outperform traditional approaches. Transformer with decoder only structure
outperforms all other models in all scenarios. Transformer with ProbSparse
attention has the worst performance in almost all cases.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:26:42 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Chen",
"Qizhao",
""
]
] |
2504.16362 | Colton Crum | Colton R. Crum, Adam Czajka | Almost Right: Making First-layer Kernels Nearly Orthogonal Improves
Model Generalization | 8 pages, 1 figure, 3 tables | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | An ongoing research challenge within several domains in computer vision is
how to increase model generalization capabilities. Several attempts to improve
model generalization performance are heavily inspired by human perceptual
intelligence, which is remarkable in both its performance and efficiency to
generalize to unknown samples. Many of these methods attempt to force portions
of the network to be orthogonal, following some observation within neuroscience
related to early vision processes. In this paper, we propose a loss component
that regularizes the filtering kernels in the first convolutional layer of a
network to make them nearly orthogonal. Deviating from previous works, we give
the network flexibility in which pairs of kernels it makes orthogonal, allowing
the network to navigate to a better solution space, imposing harsh penalties.
Without architectural modifications, we report substantial gains in
generalization performance using the proposed loss against previous works
(including orthogonalization- and saliency-based regularization methods) across
three different architectures (ResNet-50, DenseNet-121, ViT-b-16) and two
difficult open-set recognition tasks: presentation attack detection in iris
biometrics, and anomaly detection in chest X-ray images.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:27:20 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Crum",
"Colton R.",
""
],
[
"Czajka",
"Adam",
""
]
] |
2504.16364 | Tong Zhang | Fengchun Liu, Tong Zhang, Chunying Zhang | CLPSTNet: A Progressive Multi-Scale Convolutional Steganography Model
Integrating Curriculum Learning | null | null | null | null | cs.CV cs.AI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, a large number of works have introduced Convolutional Neural
Networks (CNNs) into image steganography, which transform traditional
steganography methods such as hand-crafted features and prior knowledge design
into steganography methods that neural networks autonomically learn information
embedding. However, due to the inherent complexity of digital images, issues of
invisibility and security persist when using CNN models for information
embedding. In this paper, we propose Curriculum Learning Progressive Steganophy
Network (CLPSTNet). The network consists of multiple progressive multi-scale
convolutional modules that integrate Inception structures and dilated
convolutions. The module contains multiple branching pathways, starting from a
smaller convolutional kernel and dilatation rate, extracting the basic, local
feature information from the feature map, and gradually expanding to the
convolution with a larger convolutional kernel and dilatation rate for
perceiving the feature information of a larger receptive field, so as to
realize the multi-scale feature extraction from shallow to deep, and from fine
to coarse, allowing the shallow secret information features to be refined in
different fusion stages. The experimental results show that the proposed
CLPSTNet not only has high PSNR , SSIM metrics and decoding accuracy on three
large public datasets, ALASKA2, VOC2012 and ImageNet, but also the
steganographic images generated by CLPSTNet have low steganalysis scores.You
can find our code at
\href{https://github.com/chaos-boops/CLPSTNet}{https://github.com/chaos-boops/CLPSTNet}.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:34:25 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Liu",
"Fengchun",
""
],
[
"Zhang",
"Tong",
""
],
[
"Zhang",
"Chunying",
""
]
] |
2504.16365 | Tong Zhou | Tong Zhou | Vanishing Cycles for Zariski-Constructible Sheaves on Rigid Analytic
Varieties | 21 pages. Comments welcome | null | null | null | math.AG | http://creativecommons.org/licenses/by/4.0/ | We develop a theory of nearby and vanishing cycles in the context of
finite-coefficient Zariski-constructible sheaves over a non-archimedean field
which is non-trivially valued, complete, algebraically closed, and of mixed
characteristic or equal characteristic zero. Apart from basic properties, we
show that they preserve Zariski-constructibility, have a Milnor fibre
interpretation, satisfy Beilinson's gluing construction, are perverse t-exact,
and commute with Verdier duality.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:34:58 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zhou",
"Tong",
""
]
] |
2504.16366 | Hannah Nguyen | Noel Chacko, Hannah Vy Nguyen, Sophie Chen, Stephen MacNeil | Lightweight Social Computing Tools for Undergraduate Research Community
Building | 2 pages, 2 figures, Proceedings of the 56th ACM Technical Symposium
on Computer Science Education V. 2 (SIGCSE TS 2025) | null | 10.1145/3641555.3705214 | null | cs.SI | http://creativecommons.org/licenses/by/4.0/ | Many barriers exist when new members join a research community, including
impostor syndrome. These barriers can be especially challenging for
undergraduate students who are new to research. In our work, we explore how the
use of social computing tools in the form of spontaneous online social networks
(SOSNs) can be used in small research communities to improve sense of
belonging, peripheral awareness, and feelings of togetherness within an
existing CS research community. Inspired by SOSNs such as BeReal, we integrated
a Wizard-of-Oz photo sharing bot into a computing research lab to foster
community building among members. Through a small sample of lab members (N =
17) over the course of 2 weeks, we observed an increase in participants' sense
of togetherness based on pre- and post-study surveys. Our surveys and
semi-structured interviews revealed that this approach has the potential to
increase awareness of peers' personal lives, increase feelings of community,
and reduce feelings of disconnectedness.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:38:46 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Chacko",
"Noel",
""
],
[
"Nguyen",
"Hannah Vy",
""
],
[
"Chen",
"Sophie",
""
],
[
"MacNeil",
"Stephen",
""
]
] |
2504.16368 | Linhua Kong | Linhua Kong, Dongxia Chang, Lian Liu, Zisen Kong, Pengyuan Li and Yao
Zhao | Revisiting Radar Camera Alignment by Contrastive Learning for 3D Object
Detection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, 3D object detection algorithms based on radar and camera fusion
have shown excellent performance, setting the stage for their application in
autonomous driving perception tasks. Existing methods have focused on dealing
with feature misalignment caused by the domain gap between radar and camera.
However, existing methods either neglect inter-modal features interaction
during alignment or fail to effectively align features at the same spatial
location across modalities. To alleviate the above problems, we propose a new
alignment model called Radar Camera Alignment (RCAlign). Specifically, we
design a Dual-Route Alignment (DRA) module based on contrastive learning to
align and fuse the features between radar and camera. Moreover, considering the
sparsity of radar BEV features, a Radar Feature Enhancement (RFE) module is
proposed to improve the densification of radar BEV features with the knowledge
distillation loss. Experiments show RCAlign achieves a new state-of-the-art on
the public nuScenes benchmark in radar camera fusion for 3D Object Detection.
Furthermore, the RCAlign achieves a significant performance gain (4.3\% NDS and
8.4\% mAP) in real-time 3D detection compared to the latest state-of-the-art
method (RCBEVDet).
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:41:43 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Kong",
"Linhua",
""
],
[
"Chang",
"Dongxia",
""
],
[
"Liu",
"Lian",
""
],
[
"Kong",
"Zisen",
""
],
[
"Li",
"Pengyuan",
""
],
[
"Zhao",
"Yao",
""
]
] |
2504.16371 | Arghavan Zibaie | Arghavan Zibaie, Spencer Hutchinson, Ramtin Pedarsani, Mahnoosh
Alizadeh | The Safety-Privacy Tradeoff in Linear Bandits | 16 pages, 3 figures, accepted to 2025 IEEE International Symposium on
Information Theory (ISIT) | null | null | null | math.OC cs.LG | http://creativecommons.org/licenses/by/4.0/ | We consider a collection of linear stochastic bandit problems, each modeling
the random response of different agents to proposed interventions, coupled
together by a global safety constraint. We assume a central coordinator must
choose actions to play on each bandit with the objective of regret
minimization, while also ensuring that the expected response of all agents
satisfies the global safety constraints at each round, in spite of uncertainty
about the bandits' parameters. The agents consider their observed responses to
be private and in order to protect their sensitive information, the data
sharing with the central coordinator is performed under local differential
privacy (LDP). However, providing higher level of privacy to different agents
would have consequences in terms of safety and regret. We formalize these
tradeoffs by building on the notion of the sharpness of the safety set - a
measure of how the geometric properties of the safe set affects the growth of
regret - and propose a unilaterally unimprovable vector of privacy levels for
different agents given a maximum regret budget.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:48:02 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zibaie",
"Arghavan",
""
],
[
"Hutchinson",
"Spencer",
""
],
[
"Pedarsani",
"Ramtin",
""
],
[
"Alizadeh",
"Mahnoosh",
""
]
] |
2504.16373 | Yasra Chandio | Yasra Chandio, Diana Romero, Salma Elmalaki, Fatima Anwar | What Sensors See, What People Feel: Exploring Subjective Collaboration
Perception in Mixed Reality | 12 pages, 4 figures, 8 tables | null | null | null | cs.HC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Mixed Reality (MR) enables rich, embodied collaboration, yet it's uncertain
if sensor and system-logged behavioral signals capture how users experience
that collaboration. This disconnect stems from a fundamental gap: behavioral
signals are observable and continuous, while collaboration is interpreted
subjectively, shaped by internal states like presence, cognitive availability,
and social awareness. Our core insight is that sensor signals serve as
observable manifestations of subjective experiences in MR collaboration, and
they can be captured through sensor data such as shared gaze, speech, spatial
movement, and other system-logged performance metrics. We propose the
Sensor-to-Subjective (S2S) Mapping Framework, a conceptual model that links
observable interaction patterns to users' subjective perceptions of
collaboration and internal cognitive states through sensor-based indicators and
task performance metrics. To validate this model, we conducted a study with 48
participants across 12 MR groups engaged in a collaborative image-sorting task.
Our findings show a correlation between sensed behavior and perceived
collaboration, particularly through shared attention and proximity.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:50:09 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Chandio",
"Yasra",
""
],
[
"Romero",
"Diana",
""
],
[
"Elmalaki",
"Salma",
""
],
[
"Anwar",
"Fatima",
""
]
] |
2504.16374 | Weiming Qu | Weiming Qu, Jiawei Du, Shenghai Yuan, Jia Wang, Yang Sun, Shengyi Liu,
Yuanhao Zhu, Jianfeng Yu, Song Cao, Rui Xia, Xiaoyu Tang, Xihong Wu,
Dingsheng Luo | DPGP: A Hybrid 2D-3D Dual Path Potential Ghost Probe Zone Prediction
Framework for Safe Autonomous Driving | null | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern robots must coexist with humans in dense urban environments. A key
challenge is the ghost probe problem, where pedestrians or objects unexpectedly
rush into traffic paths. This issue affects both autonomous vehicles and human
drivers. Existing works propose vehicle-to-everything (V2X) strategies and
non-line-of-sight (NLOS) imaging for ghost probe zone detection. However, most
require high computational power or specialized hardware, limiting real-world
feasibility. Additionally, many methods do not explicitly address this issue.
To tackle this, we propose DPGP, a hybrid 2D-3D fusion framework for ghost
probe zone prediction using only a monocular camera during training and
inference. With unsupervised depth prediction, we observe ghost probe zones
align with depth discontinuities, but different depth representations offer
varying robustness. To exploit this, we fuse multiple feature embeddings to
improve prediction. To validate our approach, we created a 12K-image dataset
annotated with ghost probe zones, carefully sourced and cross-checked for
accuracy. Experimental results show our framework outperforms existing methods
while remaining cost-effective. To our knowledge, this is the first work
extending ghost probe zone prediction beyond vehicles, addressing diverse
non-vehicle objects. We will open-source our code and dataset for community
benefit.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:50:34 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Qu",
"Weiming",
""
],
[
"Du",
"Jiawei",
""
],
[
"Yuan",
"Shenghai",
""
],
[
"Wang",
"Jia",
""
],
[
"Sun",
"Yang",
""
],
[
"Liu",
"Shengyi",
""
],
[
"Zhu",
"Yuanhao",
""
],
[
"Yu",
"Jianfeng",
""
],
[
"Cao",
"Song",
""
],
[
"Xia",
"Rui",
""
],
[
"Tang",
"Xiaoyu",
""
],
[
"Wu",
"Xihong",
""
],
[
"Luo",
"Dingsheng",
""
]
] |
2504.16377 | Weiming Qu | Qu Weiming, Wang Jia, Du Jiawei, Zhu Yuanhao, Yu Jianfeng, Xia Rui,
Cao Song, Wu Xihong, Luo Dingsheng | SILM: A Subjective Intent Based Low-Latency Framework for Multiple
Traffic Participants Joint Trajectory Prediction | null | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Trajectory prediction is a fundamental technology for advanced autonomous
driving systems and represents one of the most challenging problems in the
field of cognitive intelligence. Accurately predicting the future trajectories
of each traffic participant is a prerequisite for building high safety and high
reliability decision-making, planning, and control capabilities in autonomous
driving. However, existing methods often focus solely on the motion of other
traffic participants without considering the underlying intent behind that
motion, which increases the uncertainty in trajectory prediction. Autonomous
vehicles operate in real-time environments, meaning that trajectory prediction
algorithms must be able to process data and generate predictions in real-time.
While many existing methods achieve high accuracy, they often struggle to
effectively handle heterogeneous traffic scenarios. In this paper, we propose a
Subjective Intent-based Low-latency framework for Multiple traffic participants
joint trajectory prediction. Our method explicitly incorporates the subjective
intent of traffic participants based on their key points, and predicts the
future trajectories jointly without map, which ensures promising performance
while significantly reducing the prediction latency. Additionally, we introduce
a novel dataset designed specifically for trajectory prediction. Related code
and dataset will be available soon.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:56:34 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Weiming",
"Qu",
""
],
[
"Jia",
"Wang",
""
],
[
"Jiawei",
"Du",
""
],
[
"Yuanhao",
"Zhu",
""
],
[
"Jianfeng",
"Yu",
""
],
[
"Rui",
"Xia",
""
],
[
"Song",
"Cao",
""
],
[
"Xihong",
"Wu",
""
],
[
"Dingsheng",
"Luo",
""
]
] |
2504.16378 | Tadashi Okoshi | Tadashi Okoshi and Zexiong Gao and Tan Yi Zhen and Takumi Karasawa and
Takeshi Miki and Wataru Sasaki and Rajesh K. Balan | Cyberoception: Finding a Painlessly-Measurable New Sense in the
Cyberworld Towards Emotion-Awareness in Computing | Accepted by ACM CHI2025 | null | 10.1145/3706598.3713638 | null | cs.HC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In Affective computing, recognizing users' emotions accurately is the basis
of affective human-computer interaction. Understanding users' interoception
contributes to a better understanding of individually different emotional
abilities, which is essential for achieving inter-individually accurate emotion
estimation. However, existing interoception measurement methods, such as the
heart rate discrimination task, have several limitations, including their
dependence on a well-controlled laboratory environment and precision apparatus,
making monitoring users' interoception challenging. This study aims to
determine other forms of data that can explain users' interoceptive or similar
states in their real-world lives and propose a novel hypothetical concept
"cyberoception," a new sense (1) which has properties similar to interoception
in terms of the correlation with other emotion-related abilities, and (2) which
can be measured only by the sensors embedded inside commodity smartphone
devices in users' daily lives. Results from a 10-day-long in-lab/in-the-wild
hybrid experiment reveal a specific cyberoception type "Turn On" (users'
subjective sensory perception about the frequency of turning-on behavior on
their smartphones), significantly related to participants' emotional valence.
We anticipate that cyberoception to serve as a fundamental building block for
developing more "emotion-aware", user-friendly applications and services.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:56:55 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Okoshi",
"Tadashi",
""
],
[
"Gao",
"Zexiong",
""
],
[
"Zhen",
"Tan Yi",
""
],
[
"Karasawa",
"Takumi",
""
],
[
"Miki",
"Takeshi",
""
],
[
"Sasaki",
"Wataru",
""
],
[
"Balan",
"Rajesh K.",
""
]
] |
2504.16379 | Yash Akhauri | Yash Akhauri, Anthony Fei, Chi-Chih Chang, Ahmed F. AbouElhamayed,
Yueying Li, and Mohamed S. Abdelfattah | SplitReason: Learning To Offload Reasoning | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Reasoning in large language models (LLMs) tends to produce substantially
longer token generation sequences than simpler language modeling tasks. This
extended generation length reflects the multi-step, compositional nature of
reasoning and is often correlated with higher solution accuracy. From an
efficiency perspective, longer token generation exacerbates the inherently
sequential and memory-bound decoding phase of LLMs. However, not all parts of
this expensive reasoning process are equally difficult to generate. We leverage
this observation by offloading only the most challenging parts of the reasoning
process to a larger, more capable model, while performing most of the
generation with a smaller, more efficient model; furthermore, we teach the
smaller model to identify these difficult segments and independently trigger
offloading when needed. To enable this behavior, we annotate difficult segments
across 18k reasoning traces from the OpenR1-Math-220k chain-of-thought (CoT)
dataset. We then apply supervised fine-tuning (SFT) and reinforcement learning
fine-tuning (RLFT) to a 1.5B-parameter reasoning model, training it to learn to
offload the most challenging parts of its own reasoning process to a larger
model. This approach improves AIME24 reasoning accuracy by 24% and 28.3% while
offloading 1.35% and 5% of the generated tokens respectively. We open-source
our SplitReason model, data, code and logs.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:00:02 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Akhauri",
"Yash",
""
],
[
"Fei",
"Anthony",
""
],
[
"Chang",
"Chi-Chih",
""
],
[
"AbouElhamayed",
"Ahmed F.",
""
],
[
"Li",
"Yueying",
""
],
[
"Abdelfattah",
"Mohamed S.",
""
]
] |
2504.16380 | Shun Watanabe | Shun Watanabe | Tight Exponential Strong Converses for Lossy Source Coding with
Side-Information and Distributed Function Computation | 19 pages, 1 figure | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by/4.0/ | The exponential strong converse for a coding problem states that, if a coding
rate is beyond the theoretical limit, the correct probability converges to zero
exponentially. For the lossy source coding with side-information, also known as
the Wyner-Ziv (WZ) problem, a lower bound on the strong converse exponent was
derived by Oohama. In this paper, we derive the tight strong converse exponent
for the WZ problem; as a special case, we also derive the tight strong converse
exponent for the distributed function computation problem. For the converse
part, we use the change-of-measure argument developed in the literature and the
soft Markov constraint introduced by Oohama; the matching achievability is
proved via the Poisson matching approach recently introduced by Li and
Anantharam. Our result is build upon the recently derived tight strong converse
exponent for the Wyner-Ahlswede-Korner (WAK) problem; however, compared to the
WAK problem, more sophisticated argument is needed. As an illustration of the
necessity of the soft Markov constraint, we present an example such that the
soft Markov constraint is strictly positive.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:00:44 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Watanabe",
"Shun",
""
]
] |
2504.16383 | Robin Chhabra | Sahand Farghdani, Omar Abdelrahman, Robin Chhabra | Fast and Modular Whole-Body Lagrangian Dynamics of Legged Robots with
Changing Morphology | null | null | null | null | cs.RO nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fast and modular modeling of multi-legged robots (MLRs) is essential for
resilient control, particularly under significant morphological changes caused
by mechanical damage. Conventional fixed-structure models, often developed with
simplifying assumptions for nominal gaits, lack the flexibility to adapt to
such scenarios. To address this, we propose a fast modular whole-body modeling
framework using Boltzmann-Hamel equations and screw theory, in which each leg's
dynamics is modeled independently and assembled based on the current robot
morphology. This singularity-free, closed-form formulation enables efficient
design of model-based controllers and damage identification algorithms. Its
modularity allows autonomous adaptation to various damage configurations
without manual re-derivation or retraining of neural networks. We validate the
proposed framework using a custom simulation engine that integrates contact
dynamics, a gait generator, and local leg control. Comparative simulations
against hardware tests on a hexapod robot with multiple leg damage confirm the
model's accuracy and adaptability. Additionally, runtime analyses reveal that
the proposed model is approximately three times faster than real-time, making
it suitable for real-time applications in damage identification and recovery.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:24:57 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Farghdani",
"Sahand",
""
],
[
"Abdelrahman",
"Omar",
""
],
[
"Chhabra",
"Robin",
""
]
] |
2504.16384 | Ashoke De | Zafar Alam, Bharat Bhatia, and Ashoke De | Study of Auto-igniting Spray Flame in Vitiated Swirling Hot Coflow using
flamelet generated model | null | Physics of Fluids, 2025 | 10.1063/5.0249355 | null | physics.flu-dyn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Swirl-stabilized auto-igniting spray flames are essential for designing
efficient and clean combustion systems. The present study performs large eddy
simulations (LES) of the dilute auto-igniting methanol flame in a vitiated, hot
coflow of varying swirl intensities. The six-dimensional Flamelet Generated
Manifold (FGM) technique is used to solve the reactive flow accurately and
economically. The swirl numbers (SN), i.e. 0.2, 0.6, 1.0, and 1.4, are used to
assess their effect on auto-ignition and flame stability. At lower to moderate
swirl numbers (SN =0.2, 0.6), the increase in swirl is found to increase the
lift-off height. Beyond the critical swirl number (SN=0.6), the lift-off height
drops. Also, the time-averaged flame structure transitions from a tubular-like
flame into a uniformly distributed combustion region at these high swirl
numbers. It also results in a more compact flame for the higher swirl numbers.
These effects on flame dynamics are analyzed in detail using the mean gas-phase
flow field distribution, particle statistics, and proper orthogonal
decomposition (POD).
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:26:37 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Alam",
"Zafar",
""
],
[
"Bhatia",
"Bharat",
""
],
[
"De",
"Ashoke",
""
]
] |
2504.16385 | Hao Chen | Evangelia Gkaravela, Hang Woon Lee, Hao Chen | Distributed Space Resource Logistics Architecture Optimization under
Economies of Scale | 27 pages, 13 figures, Journal of Spacecraft and Rockets (Accepted) | null | null | null | eess.SY cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes an optimization framework for distributed resource
logistics system design to support future multimission space exploration. The
performance and impact of distributed In-Situ Resource Utilization (ISRU)
systems in facilitating space transportation are analyzed. The proposed
framework considers technology trade studies, deployment strategy, facility
location evaluation, and resource logistics after production for distributed
ISRU systems. We develop piecewise linear sizing and cost estimation models
based on economies of scale that can be easily integrated into network-based
mission planning formulations. A case study on a multi-mission cislunar
logistics campaign is conducted to demonstrate the value of the proposed method
and evaluate key tradeoffs to compare the performance of distributed ISRU
systems with traditional concentrated ISRU. Finally, a comprehensive
sensitivity analysis is performed to assess the proposed system under varying
conditions, comparing concentrated and distributed ISRU systems.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:26:43 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Gkaravela",
"Evangelia",
""
],
[
"Lee",
"Hang Woon",
""
],
[
"Chen",
"Hao",
""
]
] |
2504.16386 | Bin Lyu | Bin Lyu, Hao Liu, Meng Hua, Wenqing Hong, Shimin Gong, Feng Tian, and
Abbas Jamalipour | Robust Transmission Design for Reconfigurable Intelligent Surface and
Movable Antenna Enabled Symbiotic Radio Communications | 13 pages, 10 figures. Submitted for possible publication | null | null | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper explores the application of movable antenna (MA), a cutting-edge
technology with the capability of altering antenna positions, in a symbiotic
radio (SR) system enabled by reconfigurable intelligent surface (RIS). The goal
is to fully exploit the capabilities of both MA and RIS, constructing a better
transmission environment for the co-existing primary and secondary transmission
systems. For both parasitic SR (PSR) and commensal SR (CSR) scenarios with the
channel uncertainties experienced by all transmission links, we design a robust
transmission scheme with the goal of maximizing the primary rate while ensuring
the secondary transmission quality. To address the maximization problem with
thorny non-convex characteristics, we propose an alternating optimization
framework that utilizes the General S-Procedure, General Sign-Definiteness
Principle, successive convex approximation (SCA), and simulated annealing (SA)
improved particle swarm optimization (SA-PSO) algorithms. Numerical results
validate that the CSR scenario significantly outperforms the PSR scenario in
terms of primary rate, and also show that compared to the fixed-position
antenna scheme, the proposed MA scheme can increase the primary rate by 1.62
bps/Hz and 2.37 bps/Hz for the PSR and CSR scenarios, respectively.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:28:50 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Lyu",
"Bin",
""
],
[
"Liu",
"Hao",
""
],
[
"Hua",
"Meng",
""
],
[
"Hong",
"Wenqing",
""
],
[
"Gong",
"Shimin",
""
],
[
"Tian",
"Feng",
""
],
[
"Jamalipour",
"Abbas",
""
]
] |
2504.16387 | Ashoke De | Abhishek Sharma, Ashoke De, S.Sunil Kumar | Impact of Fuel Injection Temperature Dynamics on the Stability of Liquid
Oxygen-Methane Supercritical Combustion | null | Physics of Fluids, 2025 | 10.1063/5.025310 | null | physics.flu-dyn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A crucial factor in the stability of high-pressure rocket-scale combustors is
the temperature at which fuel is injected. This study investigates its effect
on the stability of supercritical liquid oxygen (LOx)-methane combustion and
highlights the impact of shear layer dynamics in cases with lower injection
temperatures. The stability features of a rocket-scale combustor operating with
multiple injector elements are investigated using a high-fidelity large eddy
simulation (LES) framework. The numerical framework combines a
flamelet-generated manifold (FGM) combustion model with complex real gas
thermodynamics in a scale-resolving simulation setup. It reproduces the
non-equilibrium transcritical injection and supercritical combustion
characteristics of supercritical methane-oxygen flames. To ascertain the effect
of injection temperature on flame and combustor stability, we perform several
LES simulations at various methane injection temperatures and produce a
stability map. Our analysis shows extremely unstable flame characteristics at
lower fuel injection temperatures that are not seen under typical fuel
injection circumstances. Below a specific methane injection temperature, LES
captures a high-amplitude, self-sustaining instability. It is determined that
the combustor becomes unstable below a specific stability boundary temperature.
Detailed spectral and dynamic mode decomposition (DMD) analysis of the stable
and unstable cases reveals the onset of longitudinal acoustic waves in the
combustor. Our thorough investigation pinpoints the instability mechanism,
emphasizing that the leading causes of this self-sustaining instability in the
combustor are a reduced velocity ratio, fuel buildup, and fuel cut-off
occurrences.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:30:00 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Sharma",
"Abhishek",
""
],
[
"De",
"Ashoke",
""
],
[
"Kumar",
"S. Sunil",
""
]
] |
2504.16388 | Umi Enokidani | Umi Enokidani and Hideo Matsuhara and Takao Nakagawa and Shunsuke Baba
and Yasuhiro Hirahara and Ryoichi Koga and Yuan LI and Biao Zhao and Daiki
Takama and Hiroshi Sasago and Takehiko Wada | Measurement of the Temperature Dependence of the Refractive Index of
CdZnTe | null | null | null | null | astro-ph.IM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have been developing a CdZnTe immersion grating for a compact
high-dispersion mid-infrared spectrometer (wavelength range 10--18 $\mu$m,
spectral resolution $R = \lambda/\Delta \lambda > 25,000$, operating
temperature $T < 20$ K). Using an immersion grating, the spectrometer size can
be reduced to $1/n$ ($n$: refractive index) compared to conventional
diffraction gratings. CdZnTe is promising as a material for immersion gratings
for the wavelength range. However, the refractive index $n$ of CdZnTe has not
been measured at $T < 20$ K.
We have been developing a system to precisely measure $n$ at cryogenic
temperatures ($T \sim 10$ K) in the mid-infrared wavelength range. As the first
result, this paper reports the temperature dependence of $n$ of CdZnTe at the
wavelength of 10.68 $\mu$m. This system employs the minimum deviation method.
The refractive index $n$ of CdZnTe is measured at temperatures of \( T = 12.57,
22.47, 50.59, 70.57, \text{ and } 298 \, \text{K} \). We find that $n$ of
CdZnTe at $\lambda =$ 10.68 $\mu$m is $2.6371 \pm 0.0022$ at $12.57 \pm 0.14$
K, and the average temperature dependence of $n$ between 12.57 $\pm$ 0.14 K and
70.57 $\pm$ 0.23 K is $\Delta n/\Delta T = (5.8 \pm 0.3) \times 10^{-5}$
K$^{-1}$.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:30:54 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Enokidani",
"Umi",
""
],
[
"Matsuhara",
"Hideo",
""
],
[
"Nakagawa",
"Takao",
""
],
[
"Baba",
"Shunsuke",
""
],
[
"Hirahara",
"Yasuhiro",
""
],
[
"Koga",
"Ryoichi",
""
],
[
"LI",
"Yuan",
""
],
[
"Zhao",
"Biao",
""
],
[
"Takama",
"Daiki",
""
],
[
"Sasago",
"Hiroshi",
""
],
[
"Wada",
"Takehiko",
""
]
] |
2504.16389 | Yuanjian Wang | Yuanjian Wang, Yufei Deng, Rong Xiao, Jiahao Fan, Chenwei Tang, Deng
Xiong, Jiancheng Lv | SaENeRF: Suppressing Artifacts in Event-based Neural Radiance Fields | Accepted by IJCNN 2025 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Event cameras are neuromorphic vision sensors that asynchronously capture
changes in logarithmic brightness changes, offering significant advantages such
as low latency, low power consumption, low bandwidth, and high dynamic range.
While these characteristics make them ideal for high-speed scenarios,
reconstructing geometrically consistent and photometrically accurate 3D
representations from event data remains fundamentally challenging. Current
event-based Neural Radiance Fields (NeRF) methods partially address these
challenges but suffer from persistent artifacts caused by aggressive network
learning in early stages and the inherent noise of event cameras. To overcome
these limitations, we present SaENeRF, a novel self-supervised framework that
effectively suppresses artifacts and enables 3D-consistent, dense, and
photorealistic NeRF reconstruction of static scenes solely from event streams.
Our approach normalizes predicted radiance variations based on accumulated
event polarities, facilitating progressive and rapid learning for scene
representation construction. Additionally, we introduce regularization losses
specifically designed to suppress artifacts in regions where photometric
changes fall below the event threshold and simultaneously enhance the light
intensity difference of non-zero events, thereby improving the visual fidelity
of the reconstructed scene. Extensive qualitative and quantitative experiments
demonstrate that our method significantly reduces artifacts and achieves
superior reconstruction quality compared to existing methods. The code is
available at https://github.com/Mr-firework/SaENeRF.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:33:20 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Wang",
"Yuanjian",
""
],
[
"Deng",
"Yufei",
""
],
[
"Xiao",
"Rong",
""
],
[
"Fan",
"Jiahao",
""
],
[
"Tang",
"Chenwei",
""
],
[
"Xiong",
"Deng",
""
],
[
"Lv",
"Jiancheng",
""
]
] |
2504.16391 | Dipak Debnath | Dipak Debnath, Hsiang-Kuang Chang, Sujoy Kumar Nath, and Lev Titarchuk | Evolution of QPO during Rising Phase of Discovery Outburst of Swift
J1727.8-1613: Estimation of Mass from Spectro-Temporal Study | 11 Pages, 4 Figures, 1 Table (In-communication to ApJ) | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rising phase of the 2023-24 outburst of the recently discovered bright
transient black hole candidate Swift J1727.8-1613 was monitored by
\textit{Insight}-HXMT. We study the evolution of hard ($4$-$150$ keV) and soft
($2$-$4$ keV) band photon count rates, the hardness ratio (HR), and QPO
frequencies using daily observations from the HXMT/LE, ME, and HE instruments
between August 25 and October 5, 2023. The QPO frequency is found to be
strongly correlated with the soft-band X-ray count rates, and spectral photon
indices. In contrast, a strong anti-correlation is observed between HR and QPO
frequency, as well as between HR and photon index. Based on the evolution of
the QPO frequency, the rising phase of the outburst is subdivided into six
parts, with parts 1-5 fitted using the propagating oscillatory shock (POS)
solution to understand the nature of the evolution from a physical perspective.
The best-fitted POS model is obtained with a black hole mass of
$13.34\pm0.02~M_\odot$. An inward-propagating shock with weakening strength
(except in part 4) is observed during the period of our study. The POS
model-fitted mass of the source is further confirmed using the QPO frequency
($\nu$)-photon index ($\Gamma$) scaling method. From this method, the estimated
probable mass of Swift J1727.8-1613 is obtained to be $13.54\pm1.87~M_\odot$.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:37:58 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Debnath",
"Dipak",
""
],
[
"Chang",
"Hsiang-Kuang",
""
],
[
"Nath",
"Sujoy Kumar",
""
],
[
"Titarchuk",
"Lev",
""
]
] |
2504.16392 | Bin Qiu | Bin Qiu, Wenchi Cheng, Hongxiang He and Wei Zhang | Joint Topology and Power Optimization for Multi-UAV Collaborative Secure
Communication | null | null | null | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate an unmanned aerial vehicle (UAV)-enabled secure
communication scenario that a cluster of UAVs performs a virtual non-uniform
linear array (NULA) to communicate with a base station (BS) in the presence of
eavesdroppers (Eves). Our goal is to design the UAV topology, trajectory, and
precoding to maximize the system channel capacity. To this end, we convert the
original problem into equivalent two-stage problems. Specifically, we first try
to maximize the channel gain by meticulously designing the UAV topology. We
then study the joint optimization of the trajectory and precoding for total
transmit power minimization while satisfying the constraints on providing
quality of service (QoS) assurance to the BS, the leakage tolerance to Eves,
the per-UAV transmit power, the initial/final locations, and the cylindrical
no-fly zones. For the UAV topology design, we prove that the topology follows
the Fekete-point distribution. The design of trajectory and precoding is
formulated as a non-convex optimization problem which is generally intractable.
Subsequently, the non-convex constraints are converted into convex terms, and a
double-loop search algorithm is proposed to solve the transmit power
minimization problem. Introduce random rotation offsets so as to perform a
dynamic stochastic channel to enhance the security. Numerical results
demonstrate the superiority of the proposed method in promoting capacity.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:39:02 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Qiu",
"Bin",
""
],
[
"Cheng",
"Wenchi",
""
],
[
"He",
"Hongxiang",
""
],
[
"Zhang",
"Wei",
""
]
] |
2504.16393 | Shlok Mundhra | S. Mundhra (Ohio Wesleyan University) | An Explicit and Efficient $O(n^2)$-Time Algorithm for Sorting Sumsets | 24 pages; Solves an Open Problem; would love to get feedback | null | null | null | cs.DS cs.DM | http://creativecommons.org/licenses/by/4.0/ | We present the first explicit comparison-based algorithm that sorts the
sumset $X + Y = \{x_i + y_j,\ \forall 0 \le i, j < n\}$, where $X$ and $Y$ are
sorted arrays of real numbers, in optimal $O(n^2)$ time and comparisons. While
Fredman (1976) proved the theoretical existence of such an algorithm, a
concrete construction has remained open for nearly five decades. Our algorithm
exploits the structured monotonicity of the sumset matrix to perform amortized
constant-comparisons and insertions, eliminating the $\log(n)$ overhead typical
of comparison-based sorting. We prove correctness and optimality in the
standard comparison model, extend the method to $k$-fold sumsets with $O(n^k)$
performance, and outline potential support for dynamic updates. Experimental
benchmarks show significant speedups over classical algorithms such as
MergeSort and QuickSort when applied to sumsets. These results resolve a
longstanding open problem in sorting theory and contribute novel techniques for
exploiting input structure in algorithm design.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:42:17 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Mundhra",
"S.",
"",
"Ohio Wesleyan University"
]
] |
2504.16394 | Fahmida Liza Piya | Fahmida Liza Piya, Rahmatollah Beheshti | ConTextual: Improving Clinical Text Summarization in LLMs with
Context-preserving Token Filtering and Knowledge Graphs | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Unstructured clinical data can serve as a unique and rich source of
information that can meaningfully inform clinical practice. Extracting the most
pertinent context from such data is critical for exploiting its true potential
toward optimal and timely decision-making in patient care. While prior research
has explored various methods for clinical text summarization, most prior
studies either process all input tokens uniformly or rely on heuristic-based
filters, which can overlook nuanced clinical cues and fail to prioritize
information critical for decision-making. In this study, we propose Contextual,
a novel framework that integrates a Context-Preserving Token Filtering method
with a Domain-Specific Knowledge Graph (KG) for contextual augmentation. By
preserving context-specific important tokens and enriching them with structured
knowledge, ConTextual improves both linguistic coherence and clinical fidelity.
Our extensive empirical evaluations on two public benchmark datasets
demonstrate that ConTextual consistently outperforms other baselines. Our
proposed approach highlights the complementary role of token-level filtering
and structured retrieval in enhancing both linguistic and clinical integrity,
as well as offering a scalable solution for improving precision in clinical
text generation.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:42:46 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Piya",
"Fahmida Liza",
""
],
[
"Beheshti",
"Rahmatollah",
""
]
] |
2504.16395 | Weiye Gan | Weiye Gan, Tangjun Wang, Qiang Du, Zuoqiang Shi | A Nonlocal Biharmonic Model with $\Gamma$-Convergence to Local Model | null | null | null | null | math.AP | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Nonlocal models and their associated theories have been extensively
investigated in recent years. Among these, nonlocal versions of the classical
Laplace operator have attracted the most attention, while higher-order nonlocal
operators have been studied far less. In this work, we focus on the nonlocal
counterpart of the classical biharmonic operator together with clamped boundary
condition ($u$ and $\frac{\partial u}{\partial n}$ are given on boundary). We
develop the variational formulation of a nonlocal biharmonic model, establish
the existence and uniqueness of its solution, and analyze its convergence as
the nonlocal horizon approaches zero. In addition, numerical experiments are
presented to further illustrate the analytical properties of the model and its
solution.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:45:47 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Gan",
"Weiye",
""
],
[
"Wang",
"Tangjun",
""
],
[
"Du",
"Qiang",
""
],
[
"Shi",
"Zuoqiang",
""
]
] |
2504.16396 | Caroline Mallary | C. Mallary | 'Dark pressure': A metric that yields distance-independent circular
orbital speed in deep space with 'tunable' total mass | 17 pages (excluding bibliography), 3 figures | null | null | null | gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In general relativity, the tangential speed of objects in stable circular
orbits is not uniquely described by the orbital radius and the mass present
inside the orbital radius. This work presents a static, spherically symmetric
spacetime metric which produces stable circular orbits whose speed approaches a
constant value at high radii. The orbital speed is independent of the mass
contained within the orbital radius, however, there is pressure throughout the
spacetime. The stress energy tensor of this metric is evaluated numerically
using the mass of the Milky Way's central black hole, the orbital speed of its
distant satellites, and three different values of a unitless 'mass tuning'
parameter B. These B 'tune' the amount of mass present, without violating the
Weak Energy Condition (WEC) at any evaluated spacetime point. The metric can be
merged with a Friedmann-Robertson-Walker metric, in which case it achieves
isotropy and obeys the Friedmann equations at cosmological distances.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:50:23 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Mallary",
"C.",
""
]
] |
2504.16397 | Banruo Liu | Banruo Liu, Wei-Yu Lin, Minghao Fang, Yihan Jiang, Fan Lai | Circinus: Efficient Query Planner for Compound ML Serving | null | null | null | null | cs.DB cs.LG | http://creativecommons.org/licenses/by/4.0/ | The rise of compound AI serving -- integrating multiple operators in a
pipeline that may span edge and cloud tiers -- enables end-user applications
such as autonomous driving, generative AI-powered meeting companions, and
immersive gaming. Achieving high service goodput -- i.e., meeting service level
objectives (SLOs) for pipeline latency, accuracy, and costs -- requires
effective planning of operator placement, configuration, and resource
allocation across infrastructure tiers. However, the diverse SLO requirements,
varying edge capabilities, and high query volumes create an enormous planning
search space, rendering current solutions fundamentally limited for real-time
serving and cost-efficient deployments.
This paper presents Circinus, an SLO-aware query planner for large-scale
compound AI workloads. Circinus novelly decomposes multi-query planning and
multi-dimensional SLO objectives while preserving global decision quality. By
exploiting plan similarities within and across queries, it significantly
reduces search steps. It further improves per-step efficiency with a
precision-aware plan profiler that incrementally profiles and strategically
applies early stopping based on imprecise estimates of plan performance. At
scale, Circinus selects query-plan combinations to maximize global SLO goodput.
Evaluations in real-world settings show that Circinus improves service goodput
by 3.2-5.0$\times$, accelerates query planning by 4.2-5.8$\times$, achieving
query response in seconds, while reducing deployment costs by 3.2-4.0$\times$
over state of the arts even in their intended single-tier deployments.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 03:57:24 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Liu",
"Banruo",
""
],
[
"Lin",
"Wei-Yu",
""
],
[
"Fang",
"Minghao",
""
],
[
"Jiang",
"Yihan",
""
],
[
"Lai",
"Fan",
""
]
] |
2504.16398 | Dipak Debnath | Dipak Debnath and Hsiang-Kuang Chang | Accretion Flow Properties of MAXI J1834-021 During Its Double-Outbursts
In 2023 | 10 Pages, 7 Figures (In-communication to ApJ) | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Galactic transient black hole candidate MAXI J1834-021 exhibited `faint'
outbursting activity for approximately $10$ months following its discovery on
February 5, 2023. We study the evolution of both the temporal (hard and soft
band photon count rates, hardness ratios, and QPO frequencies) and spectral
properties of the source using NICER data between March 7 and October 4, 2023.
The outburst profile and the nature of QPOs suggest that the source underwent a
mini-outburst following the primary outburst. A monotonic evolution of
low-frequency QPOs from higher to lower frequencies is observed during the
primary outbursting phase. Both phenomenological (diskbb plus powerlaw) and
physical (Two Component Advective Flow) model fitted spectral studies suggest
that during the entire epoch, the source remained in harder spectral states,
with a clear dominance of nonthermal emissions from the `hot' Compton cloud.
The 2023 outbursting activity of MAXI J1834$-$021 can be classified as a
combination of double `failed' outbursts, as no softer spectral states were
observed.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:00:31 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Debnath",
"Dipak",
""
],
[
"Chang",
"Hsiang-Kuang",
""
]
] |
2504.16400 | Takahiro Murotani | Takahiro Murotani | Anabelian properties of tame fundamental groups of singular curves | 25 pages | null | null | null | math.AG math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In anabelian geometry, we consider to what extent the \'{e}tale or tame
fundamental groups of schemes reflect geometric properties of the schemes.
Although there are many known results (mainly for smooth curves) in this area,
general singular curves have rarely been treated. One reason is that we cannot
determine the isomorphism classes of singular curves themselves from their
\'{e}tale or tame fundamental groups in general. On the other hand, Das proved
that the structure of the tame fundamental group of a singular curve over an
algebraically closed field is determined by its normalization and an invariant
relating to its singularities. In the present paper, by using this and known
anabelian results, we determine the isomorphism classes of the normalizations
of singular curves over various fields under certain conditions.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:06:22 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Murotani",
"Takahiro",
""
]
] |
2504.16401 | Lili Wang | Shikun Cui, Lili Wang, Wendong Wang | Stability threshold of Couette flow for 3D Boussinesq system in Sobolev
spaces | null | null | null | null | math.AP | http://creativecommons.org/licenses/by/4.0/ | In this paper, we investigate the nonlinear stability and transition
threshold for the 3D Boussinesq system in Sobolev space under the high Reynolds
number and small thermal diffusion in
$\mathbb{T}\times\mathbb{R}\times\mathbb{T} $. It is proved that if the initial
velocity $v_{\rm in}$ and the initial temperature $ \theta_{\rm in} $ satisfy $
\|v_{\rm in}-(y,0,0)\|_{H^{2}}\leq \varepsilon\nu, \|\theta_{\rm
in}\|_{H^{2}}\leq \varepsilon\nu^{2} $, respectively for some $ \varepsilon>0 $
independent of the Reynolds number or thermal diffusion, then the solutions of
3D Boussinesq system are global in time.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:09:55 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Cui",
"Shikun",
""
],
[
"Wang",
"Lili",
""
],
[
"Wang",
"Wendong",
""
]
] |
2504.16402 | Dipak Debnath | Dipak Debnath, Subham Srimani, and Hsiang-Kuang Chang | Detection of X-ray Polarization in the Hard State of IGR J17091-3624:
Spectro-Polarimetric Study with IXPE and NuSTAR Data | 7 Pahes, 3 Figures, 2 Tables (In-communication to ApJ Letters) | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The class-transition Galactic X-ray binary IGR J17091--3624 was
simultaneously monitored by the IXPE and NuSTAR satellites. We present a
detailed spectro-polarimetric study of the source using data from both
satellites covering the period from March 7-10, 2025. A polarimetric analysis
in the $2$-$8$~keV band using a model-independent method reveals a significant
detection of polarization degree (PD) of $(11.3\pm2.35)\%$ at a polarization
angle (PA) of $82^\circ.7\pm5^\circ.96$ (significant at $>4\sigma$). The
model-dependent polarization analysis using the polconst and polpow models
yields consistent values of PD and PA. In both methods, an energy-dependent
increasing trend of PD is observed. In the $6$-$8$~keV band, a maximum PD of
$(29.9\pm8.46)\%$ is detected at a PA of $88^\circ.0\pm8^\circ.15$ (significant
at $>3\sigma$) . The joint spectral analysis using IXPE and NuSTAR data in the
$2$-$70$~keV band was performed with four different sets of phenomenological
and physical models. Our results indicate a strong dominance of non-thermal
photons originating from a `hot' Compton cloud, suggesting that the source was
in a hard spectral state. Spectral fitting with the physical kerrbb and TCAF
models provides an estimate of the black hole mass $M_{\rm BH} =
14.8^{+4.7}_{-3.4}~M_\odot$ and dimensionless spin parameter $a^* \sim 0.54$.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:11:16 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Debnath",
"Dipak",
""
],
[
"Srimani",
"Subham",
""
],
[
"Chang",
"Hsiang-Kuang",
""
]
] |
2504.16404 | Md Fahimuzzman Sohan | Md Fahimuzzman Sohan | Assessing the Feasibility of Internet-Sourced Video for Automatic Cattle
Lameness Detection | null | null | null | null | cs.CV cs.AI cs.LG eess.IV | http://creativecommons.org/licenses/by/4.0/ | Cattle lameness is often caused by hoof injuries or interdigital dermatitis,
leads to pain and significantly impacts essential physiological activities such
as walking, feeding, and drinking. This study presents a deep learning-based
model for detecting cattle lameness, sickness, or gait abnormalities using
publicly available video data. The dataset consists of 50 unique videos from 40
individual cattle, recorded from various angles in both indoor and outdoor
environments. Half of the dataset represents naturally walking
(normal/non-lame) cattle, while the other half consists of cattle exhibiting
gait abnormalities (lame). To enhance model robustness and generalizability,
data augmentation was applied to the training data. The pre-processed videos
were then classified using two deep learning models: ConvLSTM2D and 3D CNN. A
comparative analysis of the results demonstrates strong classification
performance. Specifically, the 3D CNN model achieved a video-level
classification accuracy of 90%, with precision, recall, and f1-score of 90.9%,
90.9%, and 90.91% respectively. The ConvLSTM2D model exhibited a slightly lower
accuracy of 85%. This study highlights the effectiveness of directly applying
classification models to learn spatiotemporal features from video data,
offering an alternative to traditional multi-stage approaches that typically
involve object detection, pose estimation, and feature extraction. Besides, the
findings demonstrate that the proposed deep learning models, particularly the
3D CNN, effectively classify and detect lameness in cattle while simplifying
the processing pipeline.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:17:41 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Sohan",
"Md Fahimuzzman",
""
]
] |
2504.16406 | Michael Milford | Michael Milford, Ian Turner, Peter Corke | Long Exposure Localization in Darkness Using Consumer Cameras | null | 2013 IEEE International Conference on Robotics and Automation | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we evaluate performance of the SeqSLAM algorithm for passive
vision-based localization in very dark environments with low-cost cameras that
result in massively blurred images. We evaluate the effect of motion blur from
exposure times up to 10,000 ms from a moving car, and the performance of
localization in day time from routes learned at night in two different
environments. Finally we perform a statistical analysis that compares the
baseline performance of matching unprocessed grayscale images to using patch
normalization and local neighborhood normalization - the two key SeqSLAM
components. Our results and analysis show for the first time why the SeqSLAM
algorithm is effective, and demonstrate the potential for cheap camera-based
localization systems that function despite extreme appearance change.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:18:57 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Milford",
"Michael",
""
],
[
"Turner",
"Ian",
""
],
[
"Corke",
"Peter",
""
]
] |
2504.16407 | Alper \c{C}akan | Alper \c{C}akan, Vipul Goyal, Omri Shmueli | Public-Key Quantum Fire and Key-Fire From Classical Oracles | null | null | null | null | quant-ph cs.CR | http://creativecommons.org/licenses/by/4.0/ | Quantum fire was recently formalized by Bostanci, Nehoran and Zhandry (STOC
25). This notion considers a distribution of quantum states that can be
efficiently cloned, but cannot be converted into a classical string.
Previously, work of Nehoran and Zhandry (ITCS 24) showed how to construct
quantum fire relative to an inefficient unitary oracle. Later, the work of
Bostanci, Nehoran, Zhandry gave a candidate construction based on group action
assumptions, and proved the correctness of their scheme; however, even in the
classical oracle model they only conjectured the security, and no security
proof was given.
In this work, we give the first construction of public-key quantum fire
relative to a classical oracle, and prove its security unconditionally. This
gives the first classical oracle seperation between the two fundamental
principles of quantum mechanics that are equivalent in the
information-theoretic setting: no-cloning and no-telegraphing.
Going further, we introduce a stronger notion called quantum key-fire where
the clonable fire states can be used to run a functionality (such as a signing
or decryption key), and prove a secure construction relative to a classical
oracle. As an application of this notion, we get the first public-key
encryption scheme whose secret key is clonable but satisfies unbounded
leakage-resilience (Cakan, Goyal, Liu-Zhang, Ribeiro [TCC 24]), relative to a
classical oracle. Unbounded leakage-resilience is closely related to, and can
be seen as a generalization of the notion of no-telegraphing.
For all of our constructions, the oracles can be made efficient (i.e.
polynomial time), assuming the existence of post-quantum one-way functions.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:19:31 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Çakan",
"Alper",
""
],
[
"Goyal",
"Vipul",
""
],
[
"Shmueli",
"Omri",
""
]
] |
2504.16408 | Jiahao Yuan | Jiahao Yuan, Xingzhe Sun, Xing Yu, Jingwen Wang, Dehui Du, Zhiqing
Cui, Zixiang Di | Less is More: Enhancing Structured Multi-Agent Reasoning via
Quality-Guided Distillation | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The XLLM@ACL2025 Shared Task-III formulates a low-resource structural
reasoning task that challenges LLMs to generate interpretable, step-by-step
rationales with minimal labeled data. We present Less is More, the third-place
winning approach in the XLLM@ACL2025 Shared Task-III, which focuses on
structured reasoning from only 24 labeled examples. Our approach leverages a
multi-agent framework with reverse-prompt induction, retrieval-augmented
reasoning synthesis via GPT-4o, and dual-stage reward-guided filtering to
distill high-quality supervision across three subtasks: question parsing, CoT
parsing, and step-level verification. All modules are fine-tuned from
Meta-Llama-3-8B-Instruct under a unified LoRA+ setup. By combining structure
validation with reward filtering across few-shot and zero-shot prompts, our
pipeline consistently improves structure reasoning quality. These results
underscore the value of controllable data distillation in enhancing structured
inference under low-resource constraints. Our code is available at
https://github.com/Jiahao-Yuan/Less-is-More.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:19:52 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Yuan",
"Jiahao",
""
],
[
"Sun",
"Xingzhe",
""
],
[
"Yu",
"Xing",
""
],
[
"Wang",
"Jingwen",
""
],
[
"Du",
"Dehui",
""
],
[
"Cui",
"Zhiqing",
""
],
[
"Di",
"Zixiang",
""
]
] |
2504.16410 | Rok Gregoric | Rok Gregoric | Even periodization of spectral stacks | null | null | null | null | math.AG math.AT math.KT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the operation of even periodization on nonconnective spectral
stacks. We show how to recover from it the even filtration of
Hahn-Raksit-Wilson, and (a Nygaard-completion of) the filtered prismatization
stack of Bhatt-Lurie and Drinfeld. We prove that the moduli stack of oriented
elliptic curves of Goerss-Hopkins-Miller and Lurie is the even periodization of
the spectrum of topological modular forms. Likewise, the chromatic moduli
stack, which we previously studied under the name of the moduli stack of
oriented formal groups, arises via even periodization from the sphere spectrum.
Over the complex bordism spectrum, we relate even periodization with the
symmetric monoidal shearing, in the sense of Devalapurkar, of free gradings.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:25:33 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Gregoric",
"Rok",
""
]
] |
2504.16411 | Kosuke Yamada | Kosuke Yamada and Peinan Zhang | Out-of-the-Box Conditional Text Embeddings from Large Language Models | work in progress | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conditional text embedding is a proposed representation that captures the
shift in perspective on texts when conditioned on a specific aspect. Previous
methods have relied on extensive training data for fine-tuning models, leading
to challenges in terms of labor and resource costs. We propose PonTE, a novel
unsupervised conditional text embedding method that leverages a causal large
language model and a conditional prompt. Through experiments on conditional
semantic text similarity and text clustering, we demonstrate that PonTE can
generate useful conditional text embeddings and achieve performance comparable
to supervised methods without fine-tuning. We also show the interpretability of
text embeddings with PonTE by analyzing word generation following prompts and
embedding visualization.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:27:15 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Yamada",
"Kosuke",
""
],
[
"Zhang",
"Peinan",
""
]
] |
2504.16412 | Yusen Xiao | Yusen Xiao, Qingchen Duan, Tao Jia, Yajing Cui, Shaohua Liu, Zhiwei
Wen, Liangwen Ji, Ruidan Zhong, Yongliang Chen, Yong Zhao | Superconductivity and Electron Correlations in Kagome Metal LuOs3B2 | null | null | null | null | cond-mat.supr-con | http://creativecommons.org/licenses/by/4.0/ | We report a comprehensive investigation of the physical properties of
LuOs3B2, characterized by an ideal Os-based kagome lattice. Resistivity and
magnetization measurements confirm the emergence of type-II bulk
superconductivity with a critical temperature Tc=4.63 K. The specific heat jump
and the calculated electron-phonon coupling parameter support a moderately
coupled superconducting state. Electron correlation effects are supported by
the enhanced Wilson ratios. First-principles calculations reveal hallmark
features of kagome band structure, including Dirac points, van Hove
singularities, and quasi-flat bands, primarily derived from the Os d orbitals.
The inclusion of spin-orbit coupling opens a gap at the Dirac points,
significantly altering the electronic properties. Furthermore, the
superconductivity and electronic properties of isomorphic compounds are
discussed. This work provides a thorough exploration of the superconducting and
normal states of LuOs3B2, deepening the understanding of kagome
superconductors.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:28:50 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Xiao",
"Yusen",
""
],
[
"Duan",
"Qingchen",
""
],
[
"Jia",
"Tao",
""
],
[
"Cui",
"Yajing",
""
],
[
"Liu",
"Shaohua",
""
],
[
"Wen",
"Zhiwei",
""
],
[
"Ji",
"Liangwen",
""
],
[
"Zhong",
"Ruidan",
""
],
[
"Chen",
"Yongliang",
""
],
[
"Zhao",
"Yong",
""
]
] |
2504.16413 | Jiayu Chen | Jiayu Chen, Takahiro Kawaguchi, Yuichiro Yano, Yuko Hanado, Takayuki
Ishizaki | Hierarchical Distributed Architecture for the Least Allan Variance
Atomic Timing | null | null | null | null | eess.SY cs.SY | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In this paper, we propose a hierarchical distributed timing architecture
based on an ensemble of miniature atomic clocks. The goal is to ensure
synchronized and accurate timing in a normal operating mode where Global
Navigation Satellite System (GNSS) signals are available, as well as in an
emergency operating mode during GNSS failures. At the lower level, the
miniature atomic clocks employ a distributed control strategy that uses only
local information to ensure synchronization in both modes. The resulting
synchronized time or generated time scale has the best frequency stability, as
measured by the Allan variance, over the short control period. In the upper
layer, a supervisor controls the long-term behavior of the generated time
scale. In the normal operating mode, the supervisor periodically anchors the
generated time scale to the standard time based on GNSS signals, while in the
emergency operating mode, it applies optimal floating control to reduce the
divergence rate of the generated time scale, which is not observable from the
measurable time difference between the miniature atomic clocks. This floating
control aims to explicitly control the generated time scale to have the least
Allan variance over the long control period. Finally, numerical examples are
provided to demonstrate the effectiveness and feasibility of the architecture
in high-precision, GNSS-resilient atomic timing.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:35:33 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Chen",
"Jiayu",
""
],
[
"Kawaguchi",
"Takahiro",
""
],
[
"Yano",
"Yuichiro",
""
],
[
"Hanado",
"Yuko",
""
],
[
"Ishizaki",
"Takayuki",
""
]
] |
2504.16414 | Ali Shiraee Kasmaee | Mohammad Khodadad, Ali Shiraee Kasmaee, Mahdi Astaraki, Nicholas
Sherck, Hamidreza Mahyar, Soheila Samiee | Evaluating Multi-Hop Reasoning in Large Language Models: A
Chemistry-Centric Case Study | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | In this study, we introduced a new benchmark consisting of a curated dataset
and a defined evaluation process to assess the compositional reasoning
capabilities of large language models within the chemistry domain. We designed
and validated a fully automated pipeline, verified by subject matter experts,
to facilitate this task. Our approach integrates OpenAI reasoning models with
named entity recognition (NER) systems to extract chemical entities from recent
literature, which are then augmented with external knowledge bases to form a
comprehensive knowledge graph. By generating multi-hop questions across these
graphs, we assess LLM performance in both context-augmented and non-context
augmented settings. Our experiments reveal that even state-of-the-art models
face significant challenges in multi-hop compositional reasoning. The results
reflect the importance of augmenting LLMs with document retrieval, which can
have a substantial impact on improving their performance. However, even perfect
retrieval accuracy with full context does not eliminate reasoning errors,
underscoring the complexity of compositional reasoning. This work not only
benchmarks and highlights the limitations of current LLMs but also presents a
novel data generation pipeline capable of producing challenging reasoning
datasets across various domains. Overall, this research advances our
understanding of reasoning in computational linguistics.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:36:19 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Khodadad",
"Mohammad",
""
],
[
"Kasmaee",
"Ali Shiraee",
""
],
[
"Astaraki",
"Mahdi",
""
],
[
"Sherck",
"Nicholas",
""
],
[
"Mahyar",
"Hamidreza",
""
],
[
"Samiee",
"Soheila",
""
]
] |
2504.16415 | Neharika Jali | Neharika Jali, Eshika Pathak, Pranay Sharma, Guannan Qu, Gauri Joshi | Natural Policy Gradient for Average Reward Non-Stationary RL | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of non-stationary reinforcement learning (RL) in the
infinite-horizon average-reward setting. We model it by a Markov Decision
Process with time-varying rewards and transition probabilities, with a
variation budget of $\Delta_T$. Existing non-stationary RL algorithms focus on
model-based and model-free value-based methods. Policy-based methods despite
their flexibility in practice are not theoretically well understood in
non-stationary RL. We propose and analyze the first model-free policy-based
algorithm, Non-Stationary Natural Actor-Critic (NS-NAC), a policy gradient
method with a restart based exploration for change and a novel interpretation
of learning rates as adapting factors. Further, we present a bandit-over-RL
based parameter-free algorithm BORL-NS-NAC that does not require prior
knowledge of the variation budget $\Delta_T$. We present a dynamic regret of
$\tilde{\mathscr O}(|S|^{1/2}|A|^{1/2}\Delta_T^{1/6}T^{5/6})$ for both
algorithms, where $T$ is the time horizon, and $|S|$, $|A|$ are the sizes of
the state and action spaces. The regret analysis leverages a novel adaptation
of the Lyapunov function analysis of NAC to dynamic environments and
characterizes the effects of simultaneous updates in policy, value function
estimate and changes in the environment.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:37:26 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Jali",
"Neharika",
""
],
[
"Pathak",
"Eshika",
""
],
[
"Sharma",
"Pranay",
""
],
[
"Qu",
"Guannan",
""
],
[
"Joshi",
"Gauri",
""
]
] |
2504.16416 | Tao Long | Tao Long, Kendra Wannamaker, Jo Vermeulen, George Fitzmaurice, Justin
Matejka | FeedQUAC: Quick Unobtrusive AI-Generated Commentary | 20 pages, 12 figures | null | null | null | cs.HC cs.AI cs.CY cs.MM | http://creativecommons.org/licenses/by/4.0/ | Design thrives on feedback. However, gathering constant feedback throughout
the design process can be labor-intensive and disruptive. We explore how AI can
bridge this gap by providing effortless, ambient feedback. We introduce
FeedQUAC, a design companion that delivers real-time AI-generated commentary
from a variety of perspectives through different personas. A design probe study
with eight participants highlights how designers can leverage quick yet ambient
AI feedback to enhance their creative workflows. Participants highlight
benefits such as convenience, playfulness, confidence boost, and inspiration
from this lightweight feedback agent, while suggesting additional features,
like chat interaction and context curation. We discuss the role of AI feedback,
its strengths and limitations, and how to integrate it into existing design
workflows while balancing user involvement. Our findings also suggest that
ambient interaction is a valuable consideration for both the design and
evaluation of future creativity support systems.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:48:00 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Long",
"Tao",
""
],
[
"Wannamaker",
"Kendra",
""
],
[
"Vermeulen",
"Jo",
""
],
[
"Fitzmaurice",
"George",
""
],
[
"Matejka",
"Justin",
""
]
] |
2504.16417 | Pol Mestres | Pol Mestres, Arnau Marzabal, Jorge Cort\'es | Anytime Safe Reinforcement Learning | null | null | null | null | eess.SY cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the problem of solving constrained
reinforcement learning problems with anytime guarantees, meaning
that the algorithmic solution returns a safe policy regardless of
when it is terminated. Drawing inspiration from anytime constrained
optimization, we introduce Reinforcement Learning-based Safe
Gradient Flow (RL-SGF), an on-policy algorithm which employs
estimates of the value functions and their respective gradients
associated with the objective and safety constraints for the current
policy, and updates the policy parameters by solving a convex
quadratically constrained quadratic program. We show that if the
estimates are computed with a sufficiently large number of episodes
(for which we provide an explicit bound), safe policies are updated
to safe policies with a probability higher than a prescribed
tolerance. We also show that iterates asymptotically converge to a
neighborhood of a KKT point, whose size can be arbitrarily reduced
by refining the estimates of the value function and their gradients.
We illustrate the performance of RL-SGF in a navigation example.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:51:31 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Mestres",
"Pol",
""
],
[
"Marzabal",
"Arnau",
""
],
[
"Cortés",
"Jorge",
""
]
] |
2504.16418 | Tina Torabi | Tina Torabi, Matthias Militzer, Michael P. Friedlander, Christoph
Ortner | Scalable Data-Driven Basis Selection for Linear Machine Learning
Interatomic Potentials | null | null | null | null | physics.comp-ph math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Machine learning interatomic potentials (MLIPs) provide an effective approach
for accurately and efficiently modeling atomic interactions, expanding the
capabilities of atomistic simulations to complex systems. However, a priori
feature selection leads to high complexity, which can be detrimental to both
computational cost and generalization, resulting in a need for hyperparameter
tuning. We demonstrate the benefits of active set algorithms for automated
data-driven feature selection. The proposed methods are implemented within the
Atomic Cluster Expansion (ACE) framework. Computational tests conducted on a
variety of benchmark datasets indicate that sparse ACE models consistently
enhance computational efficiency, generalization accuracy and interpretability
over dense ACE models. An added benefit of the proposed algorithms is that they
produce entire paths of models with varying cost/accuracy ratio.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 04:53:29 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Torabi",
"Tina",
""
],
[
"Militzer",
"Matthias",
""
],
[
"Friedlander",
"Michael P.",
""
],
[
"Ortner",
"Christoph",
""
]
] |
2504.16420 | Chengkai Huang | Chengkai Huang, Hongtao Huang, Tong Yu, Kaige Xie, Junda Wu, Shuai
Zhang, Julian Mcauley, Dietmar Jannach and Lina Yao | A Survey of Foundation Model-Powered Recommender Systems: From
Feature-Based, Generative to Agentic Paradigms | null | null | null | null | cs.IR cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Recommender systems (RS) have become essential in filtering information and
personalizing content for users. RS techniques have traditionally relied on
modeling interactions between users and items as well as the features of
content using models specific to each task. The emergence of foundation models
(FMs), large scale models trained on vast amounts of data such as GPT, LLaMA
and CLIP, is reshaping the recommendation paradigm. This survey provides a
comprehensive overview of the Foundation Models for Recommender Systems
(FM4RecSys), covering their integration in three paradigms: (1) Feature-Based
augmentation of representations, (2) Generative recommendation approaches, and
(3) Agentic interactive systems. We first review the data foundations of RS,
from traditional explicit or implicit feedback to multimodal content sources.
We then introduce FMs and their capabilities for representation learning,
natural language understanding, and multi-modal reasoning in RS contexts. The
core of the survey discusses how FMs enhance RS under different paradigms.
Afterward, we examine FM applications in various recommendation tasks. Through
an analysis of recent research, we highlight key opportunities that have been
realized as well as challenges encountered. Finally, we outline open research
directions and technical challenges for next-generation FM4RecSys. This survey
not only reviews the state-of-the-art methods but also provides a critical
analysis of the trade-offs among the feature-based, the generative, and the
agentic paradigms, outlining key open issues and future research directions.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:02:51 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Huang",
"Chengkai",
""
],
[
"Huang",
"Hongtao",
""
],
[
"Yu",
"Tong",
""
],
[
"Xie",
"Kaige",
""
],
[
"Wu",
"Junda",
""
],
[
"Zhang",
"Shuai",
""
],
[
"Mcauley",
"Julian",
""
],
[
"Jannach",
"Dietmar",
""
],
[
"Yao",
"Lina",
""
]
] |
2504.16421 | Yota Hino | Y. Hino, M. Harada, N. Meguro, T. Tada, Y. Koshio, K. Sakashita, M.
Friend, T. Nakadaira, S. Nishimori and Y. Nagai | Development of the Beam Monitor Detectors for the Low-E Beamline at the
CERN SPS H2 Line | 9 pages, 7 figures, The 4th J-PARC Symposium 2024 | null | null | null | physics.ins-det hep-ex | http://creativecommons.org/licenses/by/4.0/ | A series of beam tests were conducted at the KEK AR test beamline in ordet to
investigate the performance of a prototype detector for instrumentation in the
low-E beamline at the CERN H2 line. For the silicon strip detector, the
simultaneous readout of all strips of the X-Y detector was evaluated, in
addition to the detection efficiency being assessed through coincidences with
the trigger scintillators. The results demonstrated the successful acquisition
of data with full strip readout and the reconstruction of the two-dimensional
beam profile. Furthermore, we are contemplating the incorporation of GAGG
crystals, an inorganic scintillator characterized by a high light yield
($\sim$$5 \times 10^{4}$ photons/MeV) and a brief time constant ($\sim$60 ns),
within the newly developed time-of-flight detector. We assessed the resolution
of time-of-flight based on the data, with the objective of achieving the
required performance benchmarks through future improvements to the
time-of-tlight detector.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:10:56 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Hino",
"Y.",
""
],
[
"Harada",
"M.",
""
],
[
"Meguro",
"N.",
""
],
[
"Tada",
"T.",
""
],
[
"Koshio",
"Y.",
""
],
[
"Sakashita",
"K.",
""
],
[
"Friend",
"M.",
""
],
[
"Nakadaira",
"T.",
""
],
[
"Nishimori",
"S.",
""
],
[
"Nagai",
"Y.",
""
]
] |
2504.16422 | Amideddin Mataji-Kojouri | Amideddin Mataji-Kojouri (1), Sebastian K\"uhl (2), Mohammad Seifi
Laleh (2), Stephan Pachnicke (2), Kambiz Jamshidi (1) ((1) Chair of RF and
Photonics Engineering, TU Dresden, Dresden, (2) Chair of Communications, Kiel
University, Kiel) | Cooperative-Memory Photonic Reservoir using Modulation Nonlinearity:
Circumventing the Speed Constraints of Nonlinear Silicon Microring Resonators | 18 pages, 5 figures | null | null | null | physics.optics physics.app-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complex dynamics of silicon microring resonators loaded by delayed feedback
elements enable high-speed photonic reservoir computing. Implementing feedback
is especially challenging when the required delay should match the time scales
of silicon's nonlinearities. To increase the computation speed and preclude any
need for very long delay lines, we avoid relying on silicon's nonlinearity and
merely employ either amplitude or phase modulation along with direct detection.
By supplementing its memory with that of the electronic output layer, the
proposed photonic reservoir composed of a Mach-Zehnder interferometer and a
microring resonator is predicted to perform computations one order of magnitude
faster than those based on silicon's nonlinearity with its speed only limited
by the modulation/detection bandwidth. This reservoir performs accurately in
NARMA-10, Mackey-Glass, and Santa-Fe prediction tasks, and enables signal
equalization in optical communication systems.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:13:08 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Mataji-Kojouri",
"Amideddin",
""
],
[
"Kühl",
"Sebastian",
""
],
[
"Laleh",
"Mohammad Seifi",
""
],
[
"Pachnicke",
"Stephan",
""
],
[
"Jamshidi",
"Kambiz",
""
]
] |
2504.16423 | Jiaqi Tang | Jiaqi Tang, Xinbo Xu, Yinsong Xu, Qingchao Chen | Advancing Radar Hand Gesture Recognition: A Hybrid Spectrum Synthetic
Framework Merging Simulation with Neural Networks | null | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Millimeter wave (mmWave) radar sensors play a vital role in hand gesture
recognition (HGR) by detecting subtle motions while preserving user privacy.
However, the limited scale of radar datasets hinders the performance. Existing
synthetic data generation methods fall short in two key areas. On the one hand,
modeling-based approaches fail to accurately simulate the wave propagation and
reflection at the hand-gesture level, facing unique complexities such as
diffraction and occlusion. On the other hand, generative model-based methods
are hard to converge while radar data is limited, lacking interpretability, and
sometimes fail to produce kinematically plausible results. To overcome these
limitations, we propose a novel hybrid spectrum synthetic framework leveraging
visual hand gesture data. It combines a cylinder mesh-based hand reflection
model with a small-scale neural network called RadarWeightNet, which focuses on
assigning weights to simulated signals. Our framework addresses two key
challenges: achieving accurate simulation of complex hand geometry and bridging
the simulation-to-real gap in a data-driven manner while preserving
interpretability, which balances physical accuracy with machine learning
adaptability. We tested our framework under extreme scenarios where radar data
is scarce. The results demonstrate the effectiveness of our hybrid framework,
achieving up to 63% SSIM in synthetic performance and up to 30% improvement in
classification performance in few-shot learning.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:15:43 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Tang",
"Jiaqi",
""
],
[
"Xu",
"Xinbo",
""
],
[
"Xu",
"Yinsong",
""
],
[
"Chen",
"Qingchao",
""
]
] |
2504.16425 | Ashish Pandey | Sudhir Singh, Ashish Kumar Pandey, Nitesh Sharma | Spectral stability of periodic traveling waves in
Caudrey-Dodd-Gibbon-Sawada-Kotera Equation | null | null | null | null | math.AP math-ph math.MP | http://creativecommons.org/licenses/by/4.0/ | We study the spectral stability of the one-dimensional small-amplitude
periodic traveling wave solutions of the (1+1)-dimensional
Caudrey-Dodd-Gibbon-Sawada-Kotera equation. We show that these waves are
spectrally stable with respect to co-periodic as well as square integrable
perturbations.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:23:54 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Singh",
"Sudhir",
""
],
[
"Pandey",
"Ashish Kumar",
""
],
[
"Sharma",
"Nitesh",
""
]
] |
2504.16426 | Mohd Shah Nurisya | Ahmad Hazazi Ahmad Sumadi, Nurisya Mohd Shah, Umair Abdul Halim,
Hishamuddin Zainuddin | Qubit Geometry through Holomorphic Quantization | 18 pages, 2 figures | null | null | null | quant-ph math-ph math.MP | http://creativecommons.org/licenses/by/4.0/ | We develop a wave mechanics formalism for qubit geometry using holomorphic
functions and Mobius transformations, providing a geometric perspective on
quantum computation. This framework extends the standard Hilbert space
description, offering a natural interpretation of standard quantum gates on the
Riemann sphere that is examined through their Mobius action on holomorphic
wavefunction. These wavefunctions emerge via a quantization process, with the
Riemann sphere serving as the classical phase space of qubit geometry. We
quantize this space using canonical group quantization with holomorphic
polarization, yielding holomorphic wavefunctions and spin angular momentum
operators that recover the standard $SU(2)$ algebra with interesting geometric
properties. Such properties reveal how geometric transformations induce quantum
logic gates on the Riemann sphere, providing a novel perspective in quantum
information processing. This result provides a new direction for exploring
quantum computation through Isham's canonical group quantization and its
holomorphic polarization method.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:24:43 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Sumadi",
"Ahmad Hazazi Ahmad",
""
],
[
"Shah",
"Nurisya Mohd",
""
],
[
"Halim",
"Umair Abdul",
""
],
[
"Zainuddin",
"Hishamuddin",
""
]
] |
2504.16428 | Jameel-Un Nabi | Ramoona Shehzadi, Jameel-Un Nabi, and Huma Ali | Energy Rates Due to Weak Decay Rates of Vanadium Isotopes in Stellar
Environment | 33 Pages, 13 Tables, 9 Figures | Astrophysics and Space Science, 365(1), 3 (2020) | 10.1007/s10509-019-3716-8 | null | nucl-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The neutrino cooling and gamma heating rates are considered as an important
input needed to study the final phases of the evolution of high-mass stars. The
weak-interaction mediated processes, namely the $\beta$-decay and electron
capture, significantly change the lepton to baryon ratio and accelerate the
contraction of the core. The emission of resulting neutrinos/antineutrinos
tends to cool the stellar core. On the other hand, gamma rays are produced
because of electron capture and $\beta$-decay to excited states in daughter
nuclei. These gamma rays heat the core and contribute to an increase of entropy
which may cause convection to occur.
In the present work, the weak-interaction heating and cooling rates on a
chain of twenty-two isotopes of vanadium having mass in the range $43-64$ have
been estimated using the proton-neutron quasiparticle random phase
approximation theory. The rates have been computed for the temperature ranging
from ($10^{7} - 3 \times 10^{10}$)\;K and for the density range
($10-10^{11}$)\;g/cm$^{3}$. Our calculated neutrino energy loss rates have also
been compared with the previously reported rates calculated using other
theoretical models. At high stellar temperatures, our rates are larger by 1-2
orders of magnitude as compared to previous results.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:25:42 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Shehzadi",
"Ramoona",
""
],
[
"Nabi",
"Jameel-Un",
""
],
[
"Ali",
"Huma",
""
]
] |
2504.16429 | Bo Lin | Bo Lin, Shangwen Wang, Yihao Qin, Liqian Chen and Xiaoguang Mao | Give LLMs a Security Course: Securing Retrieval-Augmented Code
Generation via Knowledge Injection | null | null | null | null | cs.CR cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Retrieval-Augmented Code Generation (RACG) leverages external knowledge to
enhance Large Language Models (LLMs) in code synthesis, improving the
functional correctness of the generated code. However, existing RACG systems
largely overlook security, leading to substantial risks. Especially, the
poisoning of malicious code into knowledge bases can mislead LLMs, resulting in
the generation of insecure outputs, which poses a critical threat in modern
software development. To address this, we propose a security-hardening
framework for RACG systems, CodeGuarder, that shifts the paradigm from
retrieving only functional code examples to incorporating both functional code
and security knowledge. Our framework constructs a security knowledge base from
real-world vulnerability databases, including secure code samples and root
cause annotations. For each code generation query, a retriever decomposes the
query into fine-grained sub-tasks and fetches relevant security knowledge. To
prioritize critical security guidance, we introduce a re-ranking and filtering
mechanism by leveraging the LLMs' susceptibility to different vulnerability
types. This filtered security knowledge is seamlessly integrated into the
generation prompt. Our evaluation shows CodeGuarder significantly improves code
security rates across various LLMs, achieving average improvements of 20.12\%
in standard RACG, and 31.53\% and 21.91\% under two distinct poisoning
scenarios without compromising functional correctness. Furthermore, CodeGuarder
demonstrates strong generalization, enhancing security even when the targeted
language's security knowledge is lacking. This work presents CodeGuarder as a
pivotal advancement towards building secure and trustworthy RACG systems.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:27:27 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Lin",
"Bo",
""
],
[
"Wang",
"Shangwen",
""
],
[
"Qin",
"Yihao",
""
],
[
"Chen",
"Liqian",
""
],
[
"Mao",
"Xiaoguang",
""
]
] |
2504.16430 | Andrew Ilyas | Andrew Ilyas, Logan Engstrom | MAGIC: Near-Optimal Data Attribution for Deep Learning | null | null | null | null | cs.LG cs.CL cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of predictive data attribution is to estimate how adding or removing
a given set of training datapoints will affect model predictions. In convex
settings, this goal is straightforward (i.e., via the infinitesimal jackknife).
In large-scale (non-convex) settings, however, existing methods are far less
successful -- current methods' estimates often only weakly correlate with
ground truth. In this work, we present a new data attribution method (MAGIC)
that combines classical methods and recent advances in metadifferentiation to
(nearly) optimally estimate the effect of adding or removing training data on
model predictions.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:32:37 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Ilyas",
"Andrew",
""
],
[
"Engstrom",
"Logan",
""
]
] |
2504.16431 | Ruixiang Zhang | Ruixiang Zhang, Shuangfei Zhai, Yizhe Zhang, James Thornton, Zijing
Ou, Joshua Susskind, Navdeep Jaitly | Target Concrete Score Matching: A Holistic Framework for Discrete
Diffusion | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Discrete diffusion is a promising framework for modeling and generating
discrete data. In this work, we present Target Concrete Score Matching (TCSM),
a novel and versatile objective for training and fine-tuning discrete diffusion
models. TCSM provides a general framework with broad applicability. It supports
pre-training discrete diffusion models directly from data samples, and many
existing discrete diffusion approaches naturally emerge as special cases of our
more general TCSM framework. Furthermore, the same TCSM objective extends to
post-training of discrete diffusion models, including fine-tuning using reward
functions or preference data, and distillation of knowledge from pre-trained
autoregressive models. These new capabilities stem from the core idea of TCSM,
estimating the concrete score of the target distribution, which resides in the
original (clean) data space. This allows seamless integration with reward
functions and pre-trained models, which inherently only operate in the clean
data space rather than the noisy intermediate spaces of diffusion processes.
Our experiments on language modeling tasks demonstrate that TCSM matches or
surpasses current methods. Additionally, TCSM is versatile, applicable to both
pre-training and post-training scenarios, offering greater flexibility and
sample efficiency.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:32:58 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zhang",
"Ruixiang",
""
],
[
"Zhai",
"Shuangfei",
""
],
[
"Zhang",
"Yizhe",
""
],
[
"Thornton",
"James",
""
],
[
"Ou",
"Zijing",
""
],
[
"Susskind",
"Joshua",
""
],
[
"Jaitly",
"Navdeep",
""
]
] |
2504.16432 | Ziran Liang | Ziran Liang, Rui An, Wenqi Fan, Yanghui Rao, Yuxuan Liang | iTFKAN: Interpretable Time Series Forecasting with Kolmogorov-Arnold
Network | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As time evolves, data within specific domains exhibit predictability that
motivates time series forecasting to predict future trends from historical
data. However, current deep forecasting methods can achieve promising
performance but generally lack interpretability, hindering trustworthiness and
practical deployment in safety-critical applications such as auto-driving and
healthcare. In this paper, we propose a novel interpretable model, iTFKAN, for
credible time series forecasting. iTFKAN enables further exploration of model
decision rationales and underlying data patterns due to its interpretability
achieved through model symbolization. Besides, iTFKAN develops two strategies,
prior knowledge injection, and time-frequency synergy learning, to effectively
guide model learning under complex intertwined time series data. Extensive
experimental results demonstrated that iTFKAN can achieve promising forecasting
performance while simultaneously possessing high interpretive capabilities.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:34:49 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Liang",
"Ziran",
""
],
[
"An",
"Rui",
""
],
[
"Fan",
"Wenqi",
""
],
[
"Rao",
"Yanghui",
""
],
[
"Liang",
"Yuxuan",
""
]
] |
2504.16433 | Hariseetharam Gunduboina | Hariseetharam Gunduboina (1), Muhammad Haris Khan (2), Biplab Banerjee
(1) ((1) Indian Institute of Technology Bombay, India, (2) Mohamed Bin Zayed
University of Artificial Intelligence, UAE) | FrogDogNet: Fourier frequency Retained visual prompt Output Guidance for
Domain Generalization of CLIP in Remote Sensing | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | In recent years, large-scale vision-language models (VLMs) like CLIP have
gained attention for their zero-shot inference using instructional text
prompts. While these models excel in general computer vision, their potential
for domain generalization in remote sensing (RS) remains underexplored.
Existing approaches enhance prompt learning by generating visual prompt tokens
but rely on full-image features, introducing noise and background artifacts
that vary within a class, causing misclassification. To address this, we
propose FrogDogNet, a novel prompt learning framework integrating Fourier
frequency filtering and self-attention to improve RS scene classification and
domain generalization. FrogDogNet selectively retains invariant low-frequency
components while eliminating noise and irrelevant backgrounds, ensuring robust
feature representation across domains. The model first extracts significant
features via projection and self-attention, then applies frequency-based
filtering to preserve essential structural information for prompt learning.
Extensive experiments on four RS datasets and three domain generalization tasks
show that FrogDogNet consistently outperforms state-of-the-art prompt learning
methods, demonstrating superior adaptability across domain shifts. Our findings
highlight the effectiveness of frequency-based invariant feature retention in
generalization, paving the way for broader applications. Our code is available
at https://github.com/HariseetharamG/FrogDogNet
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:35:59 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Gunduboina",
"Hariseetharam",
""
],
[
"Khan",
"Muhammad Haris",
""
],
[
"Banerjee",
"Biplab",
""
]
] |
2504.16434 | Rashi Jain | Rashi Jain and Satyabrata Adhikari | Achieving the positivity of the secret key in a BB84 like quantum key
distribution protocol | 11 pages, 2 figures | null | null | null | quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Woodhead [Phys. Rev. A \textbf{88}, 012331 (2013)] derived the lower bound of
the secret key rate for a Bennett-Brassard (BB84) like quantum key distribution
protocol under collective attacks. However, this lower bound does not always
assure the generation of the secret key and thus the protocol may have to be
aborted sometimes. Thus, we modify the Woodhead's lower bound of the secret key
rate in such a way that the secret key is always generated in a BB84 like
quantum key distribution protocol. Exploiting the obtained modified lower bound
of the secret key rate, we analyze two state dependent quantum cloning machines
such as (i) Wootters-Zurek QCM and (ii) Modified Buzek-Hillery QCM constructed
by fixing the cloning machine parameters of Buzek Hillery quantum cloning
machine (QCM), which may be used by the eavesdropper to extract information
from the intercepted state. We, thereafter, show that it is possible for the
communicating parties to distill a secret key, even in the presence of an
eavesdropper. Moreover, we also discuss the effect of the efficiency of the QCM
on the generation of the secret key for a successful key distribution protocol.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:37:11 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Jain",
"Rashi",
""
],
[
"Adhikari",
"Satyabrata",
""
]
] |
2504.16435 | Zehang Li | Qianyu Dong, Yunhan Wu, Zehang Richard Li, Jon Wakefield | Toward a Principled Workflow for Prevalence Mapping Using Household
Survey Data | 34 pages, 14 figures | null | null | null | stat.AP | http://creativecommons.org/licenses/by/4.0/ | Understanding the prevalence of key demographic and health indicators in
small geographic areas and domains is of global interest, especially in low-
and middle-income countries (LMICs), where vital registration data is sparse
and household surveys are the primary source of information. Recent advances in
computation and the increasing availability of spatially detailed datasets have
led to much progress in sophisticated statistical modeling of prevalence. As a
result, high-resolution prevalence maps for many indicators are routinely
produced in the literature. However, statistical and practical guidance for
producing prevalence maps in LMICs has been largely lacking. In particular,
advice in choosing and evaluating models and interpreting results is needed,
especially when data is limited. Software and analysis tools are also usually
inaccessible to researchers in low-resource settings to conduct their own
analysis or reproduce findings in the literature. In this paper, we propose a
general workflow for prevalence mapping using household survey data. We
consider all stages of the analysis pipeline, with particular emphasis on model
choice and interpretation. We illustrate the proposed workflow using a case
study mapping the proportion of pregnant women who had at least four antenatal
care visits in Kenya. Reproducible code is provided in the Supplementary
Materials and can be readily extended to a broad collection of indicators.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:37:31 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Dong",
"Qianyu",
""
],
[
"Wu",
"Yunhan",
""
],
[
"Li",
"Zehang Richard",
""
],
[
"Wakefield",
"Jon",
""
]
] |
2504.16436 | Daniel Oeltz | Fabienne Schmid, Daniel Oeltz | Towards a fast and robust deep hedging approach | null | null | null | null | q-fin.CP | http://creativecommons.org/licenses/by/4.0/ | We present a robust Deep Hedging framework for the pricing and hedging of
option portfolios that significantly improves training efficiency and model
robustness. In particular, we propose a neural model for training model
embeddings which utilizes the paths of several advanced equity option models
with stochastic volatility in order to learn the relationships that exist
between hedging strategies. A key advantage of the proposed method is its
ability to rapidly and reliably adapt to new market regimes through the
recalibration of a low-dimensional embedding vector, rather than retraining the
entire network. Moreover, we examine the observed Profit and Loss distributions
on the parameter space of the models used to learn the embeddings. The results
show that the proposed framework works well with data generated by complex
models and can serve as a construction basis for an efficient and robust
simulation tool for the systematic development of an entirely model-independent
hedging strategy.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:48:52 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Schmid",
"Fabienne",
""
],
[
"Oeltz",
"Daniel",
""
]
] |
2504.16438 | Charlie Hou | Charlie Hou, Mei-Yu Wang, Yige Zhu, Daniel Lazar, Giulia Fanti | Private Federated Learning using Preference-Optimized Synthetic Data | Spotlight presentation at SynthData Workshop ICLR25 | null | null | null | cs.LG cs.AI cs.CR cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In practical settings, differentially private Federated learning (DP-FL) is
the dominant method for training models from private, on-device client data.
Recent work has suggested that DP-FL may be enhanced or outperformed by methods
that use DP synthetic data (Wu et al., 2024; Hou et al., 2024). The primary
algorithms for generating DP synthetic data for FL applications require careful
prompt engineering based on public information and/or iterative private client
feedback. Our key insight is that the private client feedback collected by
prior DP synthetic data methods (Hou et al., 2024; Xie et al., 2024) can be
viewed as a preference ranking. Our algorithm, Preference Optimization for
Private Client Data (POPri) harnesses client feedback using preference
optimization algorithms such as Direct Preference Optimization (DPO) to
fine-tune LLMs to generate high-quality DP synthetic data. To evaluate POPri,
we release LargeFedBench, a new federated text benchmark for uncontaminated LLM
evaluations on federated client data. POPri substantially improves the utility
of DP synthetic data relative to prior work on LargeFedBench datasets and an
existing benchmark from Xie et al. (2024). POPri closes the gap between
next-token prediction accuracy in the fully-private and non-private settings by
up to 68%, compared to 52% for prior synthetic data methods, and 10% for
state-of-the-art DP federated learning methods. The code and data are available
at https://github.com/meiyuw/POPri.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:57:20 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Hou",
"Charlie",
""
],
[
"Wang",
"Mei-Yu",
""
],
[
"Zhu",
"Yige",
""
],
[
"Lazar",
"Daniel",
""
],
[
"Fanti",
"Giulia",
""
]
] |
2504.16439 | Dionne Ibarra | Anthony Christiana and Dionne Ibarra and Gabriel Montoya-Vega | Chebyshev polynomials and Gram determinants from the M\"obius band | 11 pages | null | null | null | math.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article explores the connection between Chebyshev polynomials and knot
theory, specifically in relation to Gram determinants. We reveal intriguing
formulae involving the Chebyshev polynomial of the first and second kind. In
particular we show that for Mersenne numbers, $M_k=2^k-1$ where $k\geq 2$, the
$M_k$-th Chebyshev polynomial of the second kind is the product of Chebyshev
polynomials of the first kind. We then discuss the Gram determinant of type
$(Mb)_1$, restate the conjecture of its closed formula in terms of mostly
products of Chebyshev polynomials of the second kind, and prove a factor of the
determinant that supports the conjecture. We also showcase an algorithm for
calculating the Gram determinant's corresponding matrix. Furthermore, we
restate Qi Chen's conjectured closed formula for the Gram determinant of type
Mb and discuss future directions.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:58:19 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Christiana",
"Anthony",
""
],
[
"Ibarra",
"Dionne",
""
],
[
"Montoya-Vega",
"Gabriel",
""
]
] |
2504.16440 | Sharat Chandra | Aloka Ranjan Sahoo and Sharat Chandra | Spin-dependent Transport Studies of Fe/MoxCr1-xS2/Fe Magnetic Tunnel
Junction | 43 pages, 45 figures | null | null | null | cond-mat.mtrl-sci cond-mat.mes-hall | http://creativecommons.org/licenses/by/4.0/ | Using Density functional theory and non-equilibrium Green's function
formalism, spin-dependent electron transport in Fe/MoxCr1-xS2/Fe magnetic
tunnel junction is studied. Spin-transport for different thicknesses (1, 3, 5,
and 7 layers) of the spacer MoS2 and for two different surface orientations of
the Fe electrode, the Fe(001) and Fe(111) surface and the effect of
substitutional doping of magnetic impurity Cr on the spin-transport of the
junctions is investigated. The electronic structure of the heterostructure
shows presence of metal induced states in the semiconducting MoS2 at the
Fe/MoS2 interface and the effect of the interface is limited to the first two
layers of MoS2 from the interface. The I-V characteristics of the junctions for
the monolayer and three-layer MoS2 spacer show linear behaviour due to the
metallic nature of the junction. The tunneling nature of the junction is
observed for the thicker junctions with five-layer and seven-layer spacers.
With the introduction of magnetic impurity, we have shown that
spin-polarisation in the spacer is improved, thus increasing the spin-polarised
current. The Cr-defect states are observed below the conduction band and the
Cr-doped devices are stable up to a bias of 0.5V. The close packed Fe(111)
surface is better electrode material for tunneling of electrons through the
junction compared to the Fe(001) surface due to lower surface energy and
reduced transmission.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 05:59:27 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Sahoo",
"Aloka Ranjan",
""
],
[
"Chandra",
"Sharat",
""
]
] |
2504.16441 | Rongjin Li | Rongjin Li, Weibin Zhang, Dongpeng Chen, Jintao Kang, Xiaofen Xing | SoCov: Semi-Orthogonal Parametric Pooling of Covariance Matrix for
Speaker Recognition | This paper has been accepted by IEEE ICASSP2025 | null | 10.1109/ICASSP49660.2025.10888890 | null | eess.AS cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In conventional deep speaker embedding frameworks, the pooling layer
aggregates all frame-level features over time and computes their mean and
standard deviation statistics as inputs to subsequent segment-level layers.
Such statistics pooling strategy produces fixed-length representations from
variable-length speech segments. However, this method treats different
frame-level features equally and discards covariance information. In this
paper, we propose the Semi-orthogonal parameter pooling of Covariance matrix
(SoCov) method. The SoCov pooling computes the covariance matrix from the
self-attentive frame-level features and compresses it into a vector using the
semi-orthogonal parametric vectorization, which is then concatenated with the
weighted standard deviation vector to form inputs to the segment-level layers.
Deep embedding based on SoCov is called ``sc-vector''. The proposed sc-vector
is compared to several different baselines on the SRE21 development and
evaluation sets. The sc-vector system significantly outperforms the
conventional x-vector system, with a relative reduction in EER of 15.5% on
SRE21Eval. When using self-attentive deep feature, SoCov helps to reduce EER on
SRE21Eval by about 30.9% relatively to the conventional ``mean + standard
deviation'' statistics.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:01:14 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Li",
"Rongjin",
""
],
[
"Zhang",
"Weibin",
""
],
[
"Chen",
"Dongpeng",
""
],
[
"Kang",
"Jintao",
""
],
[
"Xing",
"Xiaofen",
""
]
] |
2504.16442 | Xunlong Wang | Xunlong Wang, Feng Fu, Bin Wu | Nonlinear contagion dynamics on dynamical networks: exact solutions
ranging from consensus times to evolutionary trajectories | 29 pages, 6 figures | null | null | null | physics.soc-ph nlin.AO q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding nonlinear social contagion dynamics on dynamical networks, such
as opinion formation, is crucial for gaining new insights into consensus and
polarization. Similar to threshold-dependent complex contagions, the
nonlinearity in adoption rates poses challenges for mean-field approximations.
To address this theoretical gap, we focus on nonlinear binary-opinion dynamics
on dynamical networks and analytically derive local configurations,
specifically the distribution of opinions within any given focal individual's
neighborhood. This exact local configuration of opinions, combined with network
degree distributions, allows us to obtain exact solutions for consensus times
and evolutionary trajectories. Our counterintuitive results reveal that neither
biased assimilation (i.e., nonlinear adoption rates) nor preferences in local
network rewiring -- such as in-group bias (preferring like-minded individuals)
and the Matthew effect (preferring social hubs) -- can significantly slow down
consensus. Among these three social factors, we find that biased assimilation
is the most influential in accelerating consensus. Furthermore, our analytical
method efficiently and precisely predicts the evolutionary trajectories of
adoption curves arising from nonlinear contagion dynamics. Our work paves the
way for enabling analytical predictions for general nonlinear contagion
dynamics beyond opinion formation.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:02:05 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Wang",
"Xunlong",
""
],
[
"Fu",
"Feng",
""
],
[
"Wu",
"Bin",
""
]
] |
2504.16445 | Michael Ruderman | Michael Ruderman, Denis Efimov | Power-based control of output oscillations with online estimation of
biased harmonics | 6 pages, 7 figures | null | null | null | eess.SY cs.SY | http://creativecommons.org/licenses/by/4.0/ | The recently introduced discrete power-based control (Ruderman (2024b))
reduces largely the communication efforts in the control loop when compensating
for the marginally damped or even slowly diverging output oscillations. The
control commutates twice per oscillations period (at the amplitude peaks) and
uses the measured harmonic output only. The power-based control scheme requires
the knowledge of the instantaneous frequency, amplitude, and bias parameters of
the harmonic signal. This paper extends the power-based control by the
finite-time estimation of the biased harmonics (Ahmed et al. (2022)). Also an
improved analytic calculation of the impulse weighting factor is provided. The
power-based oscillations control with online estimation of the harmonic
parameters is evaluated experimentally on the fifth-order actuator system with
a free hanging load under gravity and measurement noise.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:12:46 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Ruderman",
"Michael",
""
],
[
"Efimov",
"Denis",
""
]
] |
2504.16446 | Paul Erhart | Leonard C. Nielsen, Mads Carlsen, Sici Wang, Arthur Baroni, Torne
T\"anzer, Marianne Liebi, and Paul Erhart | Mumott -- a Python package for the analysis of multi-modal tensor
tomography data | 13 pages, 6 figures | null | null | null | cond-mat.mtrl-sci cond-mat.mes-hall cond-mat.soft | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Small and wide angle x-ray scattering tensor tomography are powerful methods
for studying anisotropic nanostructures in a volume-resolved manner, and are
becoming increasingly available to users of synchrotron facilities. The
analysis of such experiments requires, however, advanced procedures and
algorithms, which creates a barrier for the wider adoption of these techniques.
Here, in response to this challenge, we introduce the mumott package. It is
written in Python with computationally demanding tasks handled via just-in-time
compilation using both CPU and GPU resources. The package is being developed
with a focus on usability and extensibility, while achieving a high
computational efficiency. Following a short introduction to the common
workflow, we review key features, outline the underlying object-oriented
framework, and demonstrate the computational performance. By developing the
mumott package and making it generally available, we hope to lower the
threshold for the adoption of tensor tomography and to make these techniques
accessible to a larger research community.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:15:11 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Nielsen",
"Leonard C.",
""
],
[
"Carlsen",
"Mads",
""
],
[
"Wang",
"Sici",
""
],
[
"Baroni",
"Arthur",
""
],
[
"Tänzer",
"Torne",
""
],
[
"Liebi",
"Marianne",
""
],
[
"Erhart",
"Paul",
""
]
] |
2504.16447 | Jeesuk Shin | Jeesuk Shin, Cheolwoong Kim, Sunwoong Yang, Minseo Lee, Sung Joong
Kim, Joongoo Jeon | Node Assigned physics-informed neural networks for thermal-hydraulic
system simulation: CVH/FL module | 40 pages, 12 figures. Jeesuk Shin and Cheolwoong Kim contributed
equally to this work. Sung Joong Kim and Joongoo Jeon are co-corresponding
authors | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Severe accidents (SAs) in nuclear power plants have been analyzed using
thermal-hydraulic (TH) system codes such as MELCOR and MAAP. These codes
efficiently simulate the progression of SAs, while they still have inherent
limitations due to their inconsistent finite difference schemes. The use of
empirical schemes incorporating both implicit and explicit formulations
inherently induces unidirectional coupling in multi-physics analyses. The
objective of this study is to develop a novel numerical method for TH system
codes using physics-informed neural network (PINN). They have shown strength in
solving multi-physics due to the innate feature of neural networks-automatic
differentiation. We propose a node-assigned PINN (NA-PINN) that is suitable for
the control volume approach-based system codes. NA-PINN addresses the issue of
spatial governing equation variation by assigning an individual network to each
nodalization of the system code, such that spatial information is excluded from
both the input and output domains, and each subnetwork learns to approximate a
purely temporal solution. In this phase, we evaluated the accuracy of the PINN
methods for the hydrodynamic module. In the 6 water tank simulation, PINN and
NA-PINN showed maximum absolute errors of 1.678 and 0.007, respectively. It
should be noted that only NA-PINN demonstrated acceptable accuracy. To the best
of the authors' knowledge, this is the first study to successfully implement a
system code using PINN. Our future work involves extending NA-PINN to a
multi-physics solver and developing it in a surrogate manner.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:17:04 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Shin",
"Jeesuk",
""
],
[
"Kim",
"Cheolwoong",
""
],
[
"Yang",
"Sunwoong",
""
],
[
"Lee",
"Minseo",
""
],
[
"Kim",
"Sung Joong",
""
],
[
"Jeon",
"Joongoo",
""
]
] |
2504.16448 | Yanyan Wang | Shuguang Zhao, Qiangzhong Feng, Zhiyang He, Peipei Sun, Yingying Wang,
Xiaodong Tao, Xiaoliang Lu, Mei Cheng, Xinyue Wu, Yanyan Wang, Wei Liang | EMRModel: A Large Language Model for Extracting Medical Consultation
Dialogues into Structured Medical Records | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Medical consultation dialogues contain critical clinical information, yet
their unstructured nature hinders effective utilization in diagnosis and
treatment. Traditional methods, relying on rule-based or shallow machine
learning techniques, struggle to capture deep and implicit semantics. Recently,
large pre-trained language models and Low-Rank Adaptation (LoRA), a lightweight
fine-tuning method, have shown promise for structured information extraction.
We propose EMRModel, a novel approach that integrates LoRA-based fine-tuning
with code-style prompt design, aiming to efficiently convert medical
consultation dialogues into structured electronic medical records (EMRs).
Additionally, we construct a high-quality, realistically grounded dataset of
medical consultation dialogues with detailed annotations. Furthermore, we
introduce a fine-grained evaluation benchmark for medical consultation
information extraction and provide a systematic evaluation methodology,
advancing the optimization of medical natural language processing (NLP) models.
Experimental results show EMRModel achieves an F1 score of 88.1%, improving
by49.5% over standard pre-trained models. Compared to traditional LoRA
fine-tuning methods, our model shows superior performance, highlighting its
effectiveness in structured medical record extraction tasks.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:17:55 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zhao",
"Shuguang",
""
],
[
"Feng",
"Qiangzhong",
""
],
[
"He",
"Zhiyang",
""
],
[
"Sun",
"Peipei",
""
],
[
"Wang",
"Yingying",
""
],
[
"Tao",
"Xiaodong",
""
],
[
"Lu",
"Xiaoliang",
""
],
[
"Cheng",
"Mei",
""
],
[
"Wu",
"Xinyue",
""
],
[
"Wang",
"Yanyan",
""
],
[
"Liang",
"Wei",
""
]
] |
2504.16449 | Yanqiu Yu | Ye Tian, Yanqiu Yu, Jianguo Sun, Yanbin Wang | From Past to Present: A Survey of Malicious URL Detection Techniques,
Datasets and Code Repositories | null | null | null | null | cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Malicious URLs persistently threaten the cybersecurity ecosystem, by either
deceiving users into divulging private data or distributing harmful payloads to
infiltrate host systems. Gaining timely insights into the current state of this
ongoing battle holds significant importance. However, existing reviews exhibit
4 critical gaps: 1) Their reliance on algorithm-centric taxonomies obscures
understanding of how detection approaches exploit specific modal information
channels; 2) They fail to incorporate pivotal LLM/Transformer-based defenses;
3) No open-source implementations are collected to facilitate benchmarking; 4)
Insufficient dataset coverage.This paper presents a comprehensive review of
malicious URL detection technologies, systematically analyzing methods from
traditional blacklisting to advanced deep learning approaches (e.g.
Transformer, GNNs, and LLMs). Unlike prior surveys, we propose a novel
modality-based taxonomy that categorizes existing works according to their
primary data modalities (URL, HTML, Visual, etc.). This hierarchical
classification enables both rigorous technical analysis and clear understanding
of multimodal information utilization. Furthermore, to establish a profile of
accessible datasets and address the lack of standardized benchmarking (where
current studies often lack proper baseline comparisons), we curate and analyze:
1) publicly available datasets (2016-2024), and 2) open-source implementations
from published works(2013-2025). Then, we outline essential design principles
and architectural frameworks for product-level implementations. The review
concludes by examining emerging challenges and proposing actionable directions
for future research. We maintain a GitHub repository for ongoing curating
datasets and open-source implementations:
https://github.com/sevenolu7/Malicious-URL-Detection-Open-Source/tree/master.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:23:18 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Tian",
"Ye",
""
],
[
"Yu",
"Yanqiu",
""
],
[
"Sun",
"Jianguo",
""
],
[
"Wang",
"Yanbin",
""
]
] |
2504.16451 | Alexander Humer | Alexander Humer and Sebastian Platzer | Efficient Design of Compliant Mechanisms Using Multi-Objective
Optimization | XI ECCOMAS Thematic Conference on Smart Structures and Materials
(SMART 2025) | null | null | null | math.NA cs.NA cs.NE | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Compliant mechanisms achieve motion through elastic deformation. In this
work, we address the synthesis of a compliant cross-hinge mechanism capable of
large angular strokes while approximating the behavior of an ideal revolute
joint. To capture the competing demands of kinematic fidelity, rotational
stiffness, and resistance to parasitic motion, we formulate a multi-objective
optimization problem based on kinetostatic performance measures. A hybrid
design strategy is employed: an efficient beam-based structural model enables
extensive exploration of a high-dimensional design space using evolutionary
algorithms, followed by fine-tuning with high-fidelity three-dimensional finite
element analysis. The resulting Pareto-optimal designs reveal diverse geometric
configurations and performance trade-offs.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:29:10 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Humer",
"Alexander",
""
],
[
"Platzer",
"Sebastian",
""
]
] |
2504.16452 | Xi-Long Fan | Haorong Wu, Xilong Fan and Lixiang Chen | Photonic single-arm gravitational wave detectors based on the quantum
state transition of orbital angular momentum | 6 pages,3 fiures | null | null | null | gr-qc astro-ph.IM quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We explore the quantum state transition of photon orbital angular momentum
(OAM) in the present of gravitational waves (GWs) and demonstrate the potential
of a new photonic single-arm GW detection technique. The interaction is
calculated based on the framework of the wave propagation in linearized gravity
theory and canonical quantization of the electromagnetic field in curved
spacetime. It is demonstrated that when a photon possessing OAM of 1 interacts
with GWs, it may relinquish its OAM and produce a central signal that may be
detected. The detector provides a high and steady rate of detected photons in
the low-frequency range ($<1$ Hz), opens a potential window to identify GWs in
the mid-frequency range ($1\sim10$ Hz), which is absent in other contemporary
GW detectors, and establishes a selection rule for GW frequencies in the
high-frequency range ($>10$ Hz), allowing for the adjustment of detector
parameters to focus on specific GW frequencies. Furthermore, the detector is
insensitive to seismic noise, and the detectable photon count rate is
proportional to the square of the GW amplitude, making it more advantageous for
determining the distance of the source compared to current interferometer
detectors. This technique not only facilitates the extraction of GW information
but also creates a new approach for identifying and selecting GW signals.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:32:06 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Wu",
"Haorong",
""
],
[
"Fan",
"Xilong",
""
],
[
"Chen",
"Lixiang",
""
]
] |
2504.16453 | Yong-Geun Oh | Yong-Geun Oh | Foliation de Rham cohomology of generic Reeb foliations | 37 pages, comments welcome! | null | null | null | math.SG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we prove that there exists a residual subset of contact forms
$\lambda$ (if any) on a compact orientable manifold $M$ for which the foliation
de Rham cohomology of the associated Reeb foliation
$F_\lambda$ is trivial in that both $H^0(F_\lambda,{\mathbb R})$ and
$H^1(F_\lambda,{\mathbb R})$ are isomorphic to $\mathbb R$. For any choice of
$\lambda$ from the aforementioned residual subset, this cohomological result
can be restated as any of the following two equivalent statements: (1) The
functional equation $R_{\lambda}[f] = u$ is \emph{uniquely} solvable (modulo
the addition by constant)
for any $u$ satisfying $\int_M u\, d\mu_\lambda =0$, or (2) The Lie algebra
of the group of strict contactomorphisms is isomorphic to the span of Reeb
vector fields, and so isomorphic to the 1 dimensional abelian Lie algebra
$\mathbb R$.
This result is also a key ingredient for the proof of the generic scarcity
result of strict contactomorphisms by Savelyev and the author.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:41:47 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Oh",
"Yong-Geun",
""
]
] |
2504.16454 | Luankang Zhang | Luankang Zhang, Kenan Song, Yi Quan Lee, Wei Guo, Hao Wang, Yawen Li,
Huifeng Guo, Yong Liu, Defu Lian, Enhong Chen | Killing Two Birds with One Stone: Unifying Retrieval and Ranking with a
Single Generative Recommendation Model | This paper has been accepted at SIGIR 2025 | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recommendation systems, the traditional multi-stage paradigm, which
includes retrieval and ranking, often suffers from information loss between
stages and diminishes performance. Recent advances in generative models,
inspired by natural language processing, suggest the potential for unifying
these stages to mitigate such loss. This paper presents the Unified Generative
Recommendation Framework (UniGRF), a novel approach that integrates retrieval
and ranking into a single generative model. By treating both stages as sequence
generation tasks, UniGRF enables sufficient information sharing without
additional computational costs, while remaining model-agnostic. To enhance
inter-stage collaboration, UniGRF introduces a ranking-driven enhancer module
that leverages the precision of the ranking stage to refine retrieval
processes, creating an enhancement loop. Besides, a gradient-guided adaptive
weighter is incorporated to dynamically balance the optimization of retrieval
and ranking, ensuring synchronized performance improvements. Extensive
experiments demonstrate that UniGRF significantly outperforms existing models
on benchmark datasets, confirming its effectiveness in facilitating information
transfer. Ablation studies and further experiments reveal that UniGRF not only
promotes efficient collaboration between stages but also achieves synchronized
optimization. UniGRF provides an effective, scalable, and compatible framework
for generative recommendation systems.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:43:54 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zhang",
"Luankang",
""
],
[
"Song",
"Kenan",
""
],
[
"Lee",
"Yi Quan",
""
],
[
"Guo",
"Wei",
""
],
[
"Wang",
"Hao",
""
],
[
"Li",
"Yawen",
""
],
[
"Guo",
"Huifeng",
""
],
[
"Liu",
"Yong",
""
],
[
"Lian",
"Defu",
""
],
[
"Chen",
"Enhong",
""
]
] |
2504.16455 | Shun Zou | Shun Zou, Yi Zou, Juncheng Li, Guangwei Gao, Guojun Qi | Cross Paradigm Representation and Alignment Transformer for Image
Deraining | code: https://github.com/zs1314/CPRAformer | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transformer-based networks have achieved strong performance in low-level
vision tasks like image deraining by utilizing spatial or channel-wise
self-attention. However, irregular rain patterns and complex geometric overlaps
challenge single-paradigm architectures, necessitating a unified framework to
integrate complementary global-local and spatial-channel representations. To
address this, we propose a novel Cross Paradigm Representation and Alignment
Transformer (CPRAformer). Its core idea is the hierarchical representation and
alignment, leveraging the strengths of both paradigms (spatial-channel and
global-local) to aid image reconstruction. It bridges the gap within and
between paradigms, aligning and coordinating them to enable deep interaction
and fusion of features. Specifically, we use two types of self-attention in the
Transformer blocks: sparse prompt channel self-attention (SPC-SA) and spatial
pixel refinement self-attention (SPR-SA). SPC-SA enhances global channel
dependencies through dynamic sparsity, while SPR-SA focuses on spatial rain
distribution and fine-grained texture recovery. To address the feature
misalignment and knowledge differences between them, we introduce the Adaptive
Alignment Frequency Module (AAFM), which aligns and interacts with features in
a two-stage progressive manner, enabling adaptive guidance and complementarity.
This reduces the information gap within and between paradigms. Through this
unified cross-paradigm dynamic interaction framework, we achieve the extraction
of the most valuable interactive fusion information from the two paradigms.
Extensive experiments demonstrate that our model achieves state-of-the-art
performance on eight benchmark datasets and further validates CPRAformer's
robustness in other image restoration tasks and downstream applications.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:44:46 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zou",
"Shun",
""
],
[
"Zou",
"Yi",
""
],
[
"Li",
"Juncheng",
""
],
[
"Gao",
"Guangwei",
""
],
[
"Qi",
"Guojun",
""
]
] |
2504.16456 | Carlos Arnoldo Morales Rojas | C.A. Morales | A measure-theoretic expansion exponent | 10 pages | null | null | null | math.DS | http://creativecommons.org/licenses/by/4.0/ | The expansion exponent (or expansion constant) for maps was introduced by
Schreiber in \cite{s}. In this paper, we introduce the analogous exponent for
measures. We shall prove the following results: The expansion exponent of a
measurable maps is equal to the minimum of the expansion exponent taken over
the Borel probability measures. In particular, a map expands small distances
(in the sense of Reddy \cite{r}) if and only if every Borel probability has
positive expansion exponent. Any nonatomic invariant measure with positive
expansion exponent is positively expansive in the sense of \cite{m}. For
ergodic invariant measures, the Kolmogorov-Sinai entropy is bounded below by
the product of the expansion exponent and the measure upper capacity. As a
consequence, any ergodic invariant measure with both positive upper capacity
and positive expansion exponent must have positive entropy.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:50:53 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Morales",
"C. A.",
""
]
] |
2504.16458 | Yong-Geun Oh | Yong-Geun Oh, Yasha Savelyev | Strict contactomorphisms are scarce | 33 pages, comments welcome! | null | null | null | math.SG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The notion of non-projectible contact forms on a given compact manifold $M$
is introduced by the first-named author in [Ohb], the set of which he also
shows is a residual subset of the set of (coorientable) contact forms. In this
paper, we prove that for any non-projectible contact form $\lambda$ the set,
denoted by $\text{\rm Cont}^{\text{\rm st}}(M,\lambda)$, consisting of strict
contactomorphisms of $\lambda$ is a a countable disjoint union of real lines
$\mathbb R$, one for each connected component.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 06:54:20 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Oh",
"Yong-Geun",
""
],
[
"Savelyev",
"Yasha",
""
]
] |
2504.16459 | Naoto Nishida | Yuga Tsukuda, Naoto Nishida, Jun Lu, Yoichi Ochiai | Insect-Computer Hybrid Speaker: Speaker using Chirp of the Cicada
Controlled by Electrical Muscle Stimulation | 6 pages, 3 figures | null | null | null | cs.HC cs.AR cs.ET cs.RO cs.SD | http://creativecommons.org/licenses/by-nc-sa/4.0/ | We propose "Insect-Computer Hybrid Speaker", which enables us to make musics
made from combinations of computer and insects. Lots of studies have proposed
methods and interfaces for controlling insects and obtaining feedback. However,
there have been less research on the use of insects for interaction with third
parties. In this paper, we propose a method in which cicadas are used as
speakers triggered by using Electrical Muscle Stimulation (EMS). We explored
and investigated the suitable waveform of chirp to be controlled, the
appropriate voltage range, and the maximum pitch at which cicadas can chirp.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:04:37 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Tsukuda",
"Yuga",
""
],
[
"Nishida",
"Naoto",
""
],
[
"Lu",
"Jun",
""
],
[
"Ochiai",
"Yoichi",
""
]
] |
2504.16460 | Vignesh Ethiraj | Vignesh Ethiraj, Sidhanth Menon, Divya Vijay | T-VEC: A Telecom-Specific Vectorization Model with Enhanced Semantic
Understanding via Deep Triplet Loss Fine-Tuning | Introduces T-VEC, a telecom-specific text embedding model. Fine-tuned
gte-Qwen2-1.5B-instruct on curated telecom data points. Includes the first
open-source telecom tokenizer. Model available at
https://huggingface.co/NetoAISolutions/T-VEC | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by-sa/4.0/ | The specialized vocabulary and complex concepts of the telecommunications
industry present significant challenges for standard Natural Language
Processing models. Generic text embeddings often fail to capture
telecom-specific semantics, hindering downstream task performance. We introduce
T-VEC (Telecom Vectorization Model), a novel embedding model tailored for the
telecom domain through deep fine-tuning. Developed by NetoAI, T-VEC is created
by adapting the state-of-the-art gte-Qwen2-1.5B-instruct model using a triplet
loss objective on a meticulously curated, large-scale dataset of
telecom-specific data. Crucially, this process involved substantial
modification of weights across 338 layers of the base model, ensuring deep
integration of domain knowledge, far exceeding superficial adaptation
techniques. We quantify this deep change via weight difference analysis. A key
contribution is the development and open-sourcing (MIT License) of the first
dedicated telecom-specific tokenizer, enhancing the handling of industry
jargon. T-VEC achieves a leading average MTEB score (0.825) compared to
established models and demonstrates vastly superior performance (0.9380 vs.
less than 0.07) on our internal telecom-specific triplet evaluation benchmark,
indicating an exceptional grasp of domain-specific nuances, visually confirmed
by improved embedding separation. This work positions NetoAI at the forefront
of telecom AI innovation, providing the community with a powerful, deeply
adapted, open-source tool.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:10:37 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Ethiraj",
"Vignesh",
""
],
[
"Menon",
"Sidhanth",
""
],
[
"Vijay",
"Divya",
""
]
] |
2504.16461 | Norimasa Sasabe | Y. Yamasaki, Y. Ishii, N. Sasabe | Sum rules for x-ray circular and linear dichroism based on complete
magnetic multipole basis | null | null | null | null | cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | X-ray magnetic circular dichroism (XMCD) and X-ray magnetic linear dichroism
(XMLD) are powerful spectroscopic techniques for probing magnetic properties in
solids. In this study, we revisit the XMCD and XMLD sum rules within a complete
magnetic multipole basis that incorporates both spinless and spinful
multipoles. We demonstrate that these multipoles can be clearly distinguished
and individually detected through the sum-rule formalism. Within this
framework, the anisotropic magnetic dipole term is naturally derived in XMCD,
offering a microscopic origin for ferromagnetic-like behavior in
antiferromagnets. Furthermore, we derive the sum rules for out-of-plane and
in-plane XMLD regarding electric quadrupole contributions defined based on the
complete multipole basis. Our theoretical approach provides a unified,
symmetry-consistent framework for analyzing dichroic signals in various
magnetic materials. These findings deepen the understanding of XMCD and XMLD
and open pathways to exploring complex magnetic structures and spin-orbit
coupling effects in emergent magnetic materials.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:14:46 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Yamasaki",
"Y.",
""
],
[
"Ishii",
"Y.",
""
],
[
"Sasabe",
"N.",
""
]
] |
2504.16462 | Phan Th\`anh Nam | Bin Chen, Yujin Guo, Phan Th\`anh Nam, Dong Hao Ou Yang | Mass-Critical Neutron Stars in the Hartree-Fock and
Hartree-Fock-Bogoliubov Theories | 36 pages | null | null | null | math.AP math-ph math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the ground states of neutron stars and white dwarfs in the
Hartree-Fock (HF) and Hartree-Fock-Bogoliubov (HFB) theories. It is known that
the system is stable below a critical mass, which depends on the gravitational
constant, while it becomes unstable if the total mass exceeds the critical
mass. We prove that if the total mass is at the critical mass, then the HFB
minimizers do not exist for any gravitational constant, while the HF minimizers
exist for every gravitational constant except for a countable set, which is
fully characterized by the Gagliardo-Nirenberg inequality for orthonormal
systems. Our results complement the existence results in the sub-critical mass
case established in [E. Lenzmann and M. Lewin, Duke Math. J., 2010].
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:21:00 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Chen",
"Bin",
""
],
[
"Guo",
"Yujin",
""
],
[
"Nam",
"Phan Thành",
""
],
[
"Yang",
"Dong Hao Ou",
""
]
] |
2504.16463 | Gary Hoppenworth | Greg Bodwin, Gary Hoppenworth, Zihan Tan | Multiplicative Spanners in Minor-Free Graphs | null | null | null | null | cs.DS | http://creativecommons.org/licenses/by/4.0/ | In FOCS 2017, Borradaille, Le, and Wulff-Nilsen addressed a long-standing
open problem by proving that minor-free graphs have light spanners.
Specifically, they proved that every $K_h$-minor-free graph has a
$(1+\epsilon)$-spanner of lightness $O_{\epsilon}(h \sqrt{\log h})$, hence
constant when $h$ and $\epsilon$ are regarded as constants.
We extend this result by showing that a more expressive size/stretch tradeoff
is available. Specifically: for any positive integer $k$, every $n$-node,
$K_h$-minor-free graph has a $(2k-1)$-spanner with sparsity
\[O\left(h^{\frac{2}{k+1}} \cdot \text{polylog } h\right),\] and a
$(1+\epsilon)(2k-1)$-spanner with lightness
\[O_{\epsilon}\left(h^{\frac{2}{k+1}} \cdot \text{polylog } h \right).\] We
further prove that this exponent $\frac{2}{k+1}$ is best possible, assuming the
girth conjecture. At a technical level, our proofs leverage the recent
improvements by Postle (2020) to the remarkable density increment theorem for
minor-free graphs.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:22:24 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Bodwin",
"Greg",
""
],
[
"Hoppenworth",
"Gary",
""
],
[
"Tan",
"Zihan",
""
]
] |
2504.16464 | Ying Li | Ying Li, Xiaobao Wei, Xiaowei Chi, Yuming Li, Zhongyu Zhao, Hao Wang,
Ningning Ma, Ming Lu and Shanghang Zhang | ManipDreamer: Boosting Robotic Manipulation World Model with Action Tree
and Visual Guidance | 9 pages, 3 figures | null | null | null | cs.RO cs.AI | http://creativecommons.org/licenses/by/4.0/ | While recent advancements in robotic manipulation video synthesis have shown
promise, significant challenges persist in ensuring effective
instruction-following and achieving high visual quality. Recent methods, like
RoboDreamer, utilize linguistic decomposition to divide instructions into
separate lower-level primitives, conditioning the world model on these
primitives to achieve compositional instruction-following. However, these
separate primitives do not consider the relationships that exist between them.
Furthermore, recent methods neglect valuable visual guidance, including depth
and semantic guidance, both crucial for enhancing visual quality. This paper
introduces ManipDreamer, an advanced world model based on the action tree and
visual guidance. To better learn the relationships between instruction
primitives, we represent the instruction as the action tree and assign
embeddings to tree nodes, each instruction can acquire its embeddings by
navigating through the action tree. The instruction embeddings can be used to
guide the world model. To enhance visual quality, we combine depth and semantic
guidance by introducing a visual guidance adapter compatible with the world
model. This visual adapter enhances both the temporal and physical consistency
of video generation. Based on the action tree and visual guidance, ManipDreamer
significantly boosts the instruction-following ability and visual quality.
Comprehensive evaluations on robotic manipulation benchmarks reveal that
ManipDreamer achieves large improvements in video quality metrics in both seen
and unseen tasks, with PSNR improved from 19.55 to 21.05, SSIM improved from
0.7474 to 0.7982 and reduced Flow Error from 3.506 to 3.201 in unseen tasks,
compared to the recent RoboDreamer model. Additionally, our method increases
the success rate of robotic manipulation tasks by 2.5% in 6 RLbench tasks on
average.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:23:41 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Li",
"Ying",
""
],
[
"Wei",
"Xiaobao",
""
],
[
"Chi",
"Xiaowei",
""
],
[
"Li",
"Yuming",
""
],
[
"Zhao",
"Zhongyu",
""
],
[
"Wang",
"Hao",
""
],
[
"Ma",
"Ningning",
""
],
[
"Lu",
"Ming",
""
],
[
"Zhang",
"Shanghang",
""
]
] |
2504.16465 | Kirill Krasnov | Kirill Krasnov | Octonions, complex structures and Standard Model fermions | 12 pages, to appear in the proceedings of the ECM2024 mini-symposium
Generalizations of Complex Analysis and Applications | null | null | null | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article is a write-up of the talk given in one of the mini-symposia of
the 2024 European Congress of Mathematicians. I will explain some basics of the
representation theory underlying Spin(10) and SU(5) Grand Unified Theories. I
will also explain the characterisation of the Standard Model gauge group G_SM
as a subgroup of Spin(10) that was developed in [1]. Thus, the symmetry
breaking required to obtain G_SM can be seen to rely on two suitably aligned
commuting complex structures on R10. The required complex structures can in
turn be encoded in a pair of pure spinors of Spin(10). The condition that the
complex structures are commuting and suitably aligned translates into the
requirement that the respective pure spinors are orthogonal and that their sum
is again a pure spinor. The most efficient description of spinors, and in
particular pure spinors of Spin(10) is via the octonionic model of the latter,
and this is how octonions enter the story.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:23:58 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Krasnov",
"Kirill",
""
]
] |
2504.16466 | Gang l\"u | Xi-Liang Yuan, Chao Wang, Zhuang-Dong Bai, Gang L\"u | The role and contribution of resonance effect for the decay process of
$\bar B^{0}_s \rightarrow \pi^{+}\pi^{-}P$ | null | null | null | null | hep-ph | http://creativecommons.org/licenses/by/4.0/ | The size of the direct CP asymmetry generated during the weak decay of
hadrons is attributed to the weak phase and some strong phases. The weak phase
comes from the CKM matrix and a strong phase may result from the resonance
effect which is produced by the mixing of vector meson
$V\left\{\rho^{0}(770),\omega(782),\phi(1020)\right\}$ to $\pi^+ \pi^-$ meson
pairs. $\rho^{0}(770)$ can decay directly into $\pi^+ \pi^-$ meson pairs, both
$\omega(782)$ and $\phi(1020)$ can also decay into $\pi^+ \pi^-$ meson pairs
with small contribution from isospin symmetry breaking. The main contribution
for the middle state vector meson $\rho^{0}(770)-\omega(782)-\phi(1020)$
interference is the mix of $\rho^{0}(770)$, $\omega(782)-\rho^{0}(770)$ and
$\phi(1020)-\rho^{0}(770)$. We calculate the CP asymmetry and decay branching
ratio for $\bar{B}^0_{s} \rightarrow \pi^+ \pi^- \pi^0 (\bar K ^{0})$ in the
framework of QCD factorization and compare them with previous work. We also add
the analysis of $\bar{B}^0_{s} \rightarrow \pi^+ \pi^- \eta(\eta^{(')})$ decay
process. The results show that the CP asymmetry of these four decay processes
are significantly enhanced especially for the $\bar{B}^0_{s} \rightarrow \pi^+
\pi^- \bar K ^{0}$ decay process and the decay branching ratio also changes
under resonance effect. These work might provide support for the experimental
analysis of the $\bar B^{0}_s$ meson.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:25:06 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Yuan",
"Xi-Liang",
""
],
[
"Wang",
"Chao",
""
],
[
"Bai",
"Zhuang-Dong",
""
],
[
"Lü",
"Gang",
""
]
] |
2504.16467 | Qishan He | Qishan He, Lingjun Zhao, Ru Luo, Siqian Zhang, Lin Lei, Kefeng Ji,
Gangyao Kuang | MTSGL: Multi-Task Structure Guided Learning for Robust and Interpretable
SAR Aircraft Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Aircraft recognition in synthetic aperture radar (SAR) imagery is a
fundamental mission in both military and civilian applications. Recently deep
learning (DL) has emerged a dominant paradigm for its explosive performance on
extracting discriminative features. However, current classification algorithms
focus primarily on learning decision hyperplane without enough comprehension on
aircraft structural knowledge. Inspired by the fined aircraft annotation
methods for optical remote sensing images (RSI), we first introduce a
structure-based SAR aircraft annotations approach to provide structural and
compositional supplement information. On this basis, we propose a multi-task
structure guided learning (MTSGL) network for robust and interpretable SAR
aircraft recognition. Besides the classification task, MTSGL includes a
structural semantic awareness (SSA) module and a structural consistency
regularization (SCR) module. The SSA is designed to capture structure semantic
information, which is conducive to gain human-like comprehension of aircraft
knowledge. The SCR helps maintain the geometric consistency between the
aircraft structure in SAR imagery and the proposed annotation. In this process,
the structural attribute can be disentangled in a geometrically meaningful
manner. In conclusion, the MTSGL is presented with the expert-level aircraft
prior knowledge and structure guided learning paradigm, aiming to comprehend
the aircraft concept in a way analogous to the human cognitive process.
Extensive experiments are conducted on a self-constructed multi-task SAR
aircraft recognition dataset (MT-SARD) and the effective results illustrate the
superiority of robustness and interpretation ability of the proposed MTSGL.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:27:08 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"He",
"Qishan",
""
],
[
"Zhao",
"Lingjun",
""
],
[
"Luo",
"Ru",
""
],
[
"Zhang",
"Siqian",
""
],
[
"Lei",
"Lin",
""
],
[
"Ji",
"Kefeng",
""
],
[
"Kuang",
"Gangyao",
""
]
] |
2504.16468 | Wenjie Sun | Wenjie Sun and Xiaoyu Li and Lianhui Yu and Zhigang Wang and Geng Chen
and Desheng Zheng and Guowu Yang | HAQA: A Hardware-Guided and Fidelity-Aware Strategy for Efficient Qubit
Mapping Optimization | 27 pages | null | null | null | quant-ph cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum algorithms rely on quantum computers for implementation, but the
physical connectivity constraints of modern quantum processors impede the
efficient realization of quantum algorithms. Qubit mapping, a critical
technology for practical quantum computing applications, directly determines
the execution efficiency and feasibility of algorithms on superconducting
quantum processors. Existing mapping methods overlook intractable quantum
hardware fidelity characteristics, reducing circuit execution quality. They
also exhibit prolonged solving times or even failure to complete when handling
large-scale quantum architectures, compromising efficiency. To address these
challenges, we propose a novel qubit mapping method HAQA. HAQA first introduces
a community-based iterative region identification strategy leveraging hardware
connection topology, achieving effective dimensionality reduction of mapping
space. This strategy avoids global search procedures, with complexity analysis
demonstrating quadratic polynomial-level acceleration. Furthermore, HAQA
implements a hardware-characteristic-based region evaluation mechanism,
enabling quantitative selection of mapping regions based on fidelity metrics.
This approach effectively integrates hardware fidelity information into the
mapping process, enabling fidelity-aware qubit allocation. Experimental results
demonstrate that HAQA significantly improves solving speed and fidelity while
ensuring solution quality. When applied to state-of-the-art quantum mapping
techniques Qsynth-v2 and TB-OLSQ2, HAQA achieves acceleration ratios of 632.76
and 286.87 respectively, while improving fidelity by up to 52.69% and 238.28%
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:27:27 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Sun",
"Wenjie",
""
],
[
"Li",
"Xiaoyu",
""
],
[
"Yu",
"Lianhui",
""
],
[
"Wang",
"Zhigang",
""
],
[
"Chen",
"Geng",
""
],
[
"Zheng",
"Desheng",
""
],
[
"Yang",
"Guowu",
""
]
] |
2504.16469 | Guodong Sun Dr. | Guodong Sun, Francois Baccelli | Closed-form analysis of Multi-RIS Reflected Signals in RIS-Aided
Networks Using Stochastic Geometry | Accepted for the SpaSWiN 2025 workshop | null | null | null | cs.PF cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reconfigurable intelligent surfaces (RISs) enhance wireless communication by
creating engineered signal reflection paths in addition to direct links. This
work presents a stochastic geometry framework using point processes (PPs) to
model multiple randomly deployed RISs conditioned on their associated base
station (BS) locations. By characterizing aggregated reflections from multiple
RISs using the Laplace transform, we analytically assess the performance impact
of RIS-reflected signals by integrating this characterization into
well-established stochastic geometry frameworks. Specifically, we derive
closed-form expressions for the Laplace transform of the reflected signal power
in several deployment scenarios. These analytical results facilitate
performance evaluation of RIS-enabled enhancements. Numerical simulations
validate that optimal RIS placement favors proximity to BSs or user equipment
(UEs), and further quantify the impact of reflected interference, various
fading assumptions, and diverse spatial deployment strategies. Importantly, our
analytical approach shows superior computational efficiency compared to Monte
Carlo simulations.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:29:32 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Sun",
"Guodong",
""
],
[
"Baccelli",
"Francois",
""
]
] |
2504.16470 | Hongyi Chen | Shiri Chechik, Hongyi Chen, Tianyi Zhang | Improved Streaming Edge Coloring | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a graph, an edge coloring assigns colors to edges so that no pairs of
adjacent edges share the same color. We are interested in edge coloring
algorithms under the W-streaming model. In this model, the algorithm does not
have enough memory to hold the entire graph, so the edges of the input graph
are read from a data stream one by one in an unknown order, and the algorithm
needs to print a valid edge coloring in an output stream. The performance of
the algorithm is measured by the amount of space and the number of different
colors it uses.
This streaming edge coloring problem has been studied by several works in
recent years. When the input graph contains $n$ vertices and has maximum vertex
degree $\Delta$, it is known that in the W-streaming model, an
$O(\Delta^2)$-edge coloring can be computed deterministically with
$\tilde{O}(n)$ space [Ansari, Saneian, and Zarrabi-Zadeh, 2022], or an
$O(\Delta^{1.5})$-edge coloring can be computed by a $\tilde{O}(n)$-space
randomized algorithm [Behnezhad, Saneian, 2024] [Chechik, Mukhtar, Zhang,
2024].
In this paper, we achieve polynomial improvement over previous results.
Specifically, we show how to improve the number of colors to
$\tilde{O}(\Delta^{4/3+\epsilon})$ using space $\tilde{O}(n)$
deterministically, for any constant $\epsilon > 0$. This is the first
deterministic result that bypasses the quadratic bound on the number of colors
while using near-linear space.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:29:57 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Chechik",
"Shiri",
""
],
[
"Chen",
"Hongyi",
""
],
[
"Zhang",
"Tianyi",
""
]
] |
2504.16471 | Boyue Xu | Boyue Xu, Ruichao Hou, Tongwei Ren, Gangshan Wu | RGB-D Video Object Segmentation via Enhanced Multi-store Feature Memory | null | null | 10.1145/3652583.3658036 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The RGB-Depth (RGB-D) Video Object Segmentation (VOS) aims to integrate the
fine-grained texture information of RGB with the spatial geometric clues of
depth modality, boosting the performance of segmentation. However,
off-the-shelf RGB-D segmentation methods fail to fully explore cross-modal
information and suffer from object drift during long-term prediction. In this
paper, we propose a novel RGB-D VOS method via multi-store feature memory for
robust segmentation. Specifically, we design the hierarchical modality
selection and fusion, which adaptively combines features from both modalities.
Additionally, we develop a segmentation refinement module that effectively
utilizes the Segmentation Anything Model (SAM) to refine the segmentation mask,
ensuring more reliable results as memory to guide subsequent segmentation
tasks. By leveraging spatio-temporal embedding and modality embedding, mixed
prompts and fused images are fed into SAM to unleash its potential in RGB-D
VOS. Experimental results show that the proposed method achieves
state-of-the-art performance on the latest RGB-D VOS benchmark.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:31:37 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Xu",
"Boyue",
""
],
[
"Hou",
"Ruichao",
""
],
[
"Ren",
"Tongwei",
""
],
[
"Wu",
"Gangshan",
""
]
] |
2504.16472 | Mark Harman | Mark Harman, Peter O'Hearn, Shubho Sengupta | Harden and Catch for Just-in-Time Assured LLM-Based Software Testing:
Open Research Challenges | To Appear as keynote paper at FSE 2025 | null | null | null | cs.SE cs.AI | http://creativecommons.org/licenses/by/4.0/ | Despite decades of research and practice in automated software testing,
several fundamental concepts remain ill-defined and under-explored, yet offer
enormous potential real-world impact. We show that these concepts raise
exciting new challenges in the context of Large Language Models for software
test generation. More specifically, we formally define and investigate the
properties of hardening and catching tests. A hardening test is one that seeks
to protect against future regressions, while a catching test is one that
catches such a regression or a fault in new functionality introduced by a code
change. Hardening tests can be generated at any time and may become catching
tests when a future regression is caught. We also define and motivate the
Catching `Just-in-Time' (JiTTest) Challenge, in which tests are generated
`just-in-time' to catch new faults before they land into production. We show
that any solution to Catching JiTTest generation can also be repurposed to
catch latent faults in legacy code. We enumerate possible outcomes for
hardening and catching tests and JiTTests, and discuss open research problems,
deployment options, and initial results from our work on automated LLM-based
hardening at Meta. This paper\footnote{Author order is alphabetical. The
corresponding author is Mark Harman.} was written to accompany the keynote by
the authors at the ACM International Conference on the Foundations of Software
Engineering (FSE) 2025.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:32:43 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Harman",
"Mark",
""
],
[
"O'Hearn",
"Peter",
""
],
[
"Sengupta",
"Shubho",
""
]
] |
2504.16473 | Jiaping Tang | Jiaping Tang, Jianan Mu, Silin Liu, Zizhen Liu, Feng Gu, Xinyu Zhang,
Leyan Wang, Shenwen Liang, Jing Ye, Huawei Li, Xiaowei Li | ERASER: Efficient RTL FAult Simulation Framework with Trimmed Execution
Redundancy | 7 pages | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As intelligent computing devices increasingly integrate into human life,
ensuring the functional safety of the corresponding electronic chips becomes
more critical. A key metric for functional safety is achieving a sufficient
fault coverage. To meet this requirement, extensive time-consuming fault
simulation of the RTL code is necessary during the chip design phase.The main
overhead in RTL fault simulation comes from simulating behavioral nodes (always
blocks). Due to the limited fault propagation capacity, fault simulation
results often match the good simulation results for many behavioral nodes. A
key strategy for accelerating RTL fault simulation is the identification and
elimination of redundant simulations. Existing methods detect redundant
executions by examining whether the fault inputs to each RTL node are
consistent with the good inputs. However, we observe that this input comparison
mechanism overlooks a significant amount of implicit redundant execution:
although the fault inputs differ from the good inputs, the node's execution
results remain unchanged. Our experiments reveal that this overlooked redundant
execution constitutes nearly half of the total execution overhead of behavioral
nodes, becoming a significant bottleneck in current RTL fault simulation. The
underlying reason for this overlooked redundancy is that, in these cases, the
true execution paths within the behavioral nodes are not affected by the
changes in input values. In this work, we propose a behavior-level redundancy
detection algorithm that focuses on the true execution paths. Building on the
elimination of redundant executions, we further developed an efficient RTL
fault simulation framework, Eraser.Experimental results show that compared to
commercial tools, under the same fault coverage, our framework achieves a 3.9
$\times$ improvement in simulation performance on average.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:33:44 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Tang",
"Jiaping",
""
],
[
"Mu",
"Jianan",
""
],
[
"Liu",
"Silin",
""
],
[
"Liu",
"Zizhen",
""
],
[
"Gu",
"Feng",
""
],
[
"Zhang",
"Xinyu",
""
],
[
"Wang",
"Leyan",
""
],
[
"Liang",
"Shenwen",
""
],
[
"Ye",
"Jing",
""
],
[
"Li",
"Huawei",
""
],
[
"Li",
"Xiaowei",
""
]
] |
2504.16474 | Meixi Zheng | Meixi Zheng, Kehan Wu, Yanbo Fan, Rui Huang, Baoyuan Wu | Seeking Flat Minima over Diverse Surrogates for Improved Adversarial
Transferability: A Theoretical Framework and Algorithmic Instantiation | 26 pages, 6 figures | null | null | null | cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The transfer-based black-box adversarial attack setting poses the challenge
of crafting an adversarial example (AE) on known surrogate models that remain
effective against unseen target models. Due to the practical importance of this
task, numerous methods have been proposed to address this challenge. However,
most previous methods are heuristically designed and intuitively justified,
lacking a theoretical foundation. To bridge this gap, we derive a novel
transferability bound that offers provable guarantees for adversarial
transferability. Our theoretical analysis has the advantages of \textit{(i)}
deepening our understanding of previous methods by building a general attack
framework and \textit{(ii)} providing guidance for designing an effective
attack algorithm. Our theoretical results demonstrate that optimizing AEs
toward flat minima over the surrogate model set, while controlling the
surrogate-target model shift measured by the adversarial model discrepancy,
yields a comprehensive guarantee for AE transferability. The results further
lead to a general transfer-based attack framework, within which we observe that
previous methods consider only partial factors contributing to the
transferability. Algorithmically, inspired by our theoretical results, we first
elaborately construct the surrogate model set in which models exhibit diverse
adversarial vulnerabilities with respect to AEs to narrow an instantiated
adversarial model discrepancy. Then, a \textit{model-Diversity-compatible
Reverse Adversarial Perturbation} (DRAP) is generated to effectively promote
the flatness of AEs over diverse surrogate models to improve transferability.
Extensive experiments on NIPS2017 and CIFAR-10 datasets against various target
models demonstrate the effectiveness of our proposed attack.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:33:45 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zheng",
"Meixi",
""
],
[
"Wu",
"Kehan",
""
],
[
"Fan",
"Yanbo",
""
],
[
"Huang",
"Rui",
""
],
[
"Wu",
"Baoyuan",
""
]
] |
2504.16475 | K\'evin Garanger | K\'evin Garanger, Thanakorn Khamvilai, Jeremy Epps, Eric Feron | The Dodecacopter: a Versatile Multirotor System of Dodecahedron-Shaped
Modules | null | null | null | null | cs.RO | http://creativecommons.org/licenses/by/4.0/ | With the promise of greater safety and adaptability, modular reconfigurable
uncrewed air vehicles have been proposed as unique, versatile platforms holding
the potential to replace multiple types of monolithic vehicles at once.
State-of-the-art rigidly assembled modular vehicles are generally
two-dimensional configurations in which the rotors are coplanar and assume the
shape of a "flight array". We introduce the Dodecacopter, a new type of modular
rotorcraft where all modules take the shape of a regular dodecahedron, allowing
the creation of richer sets of configurations beyond flight arrays. In
particular, we show how the chosen module design can be used to create
three-dimensional and fully actuated configurations. We justify the relevance
of these types of configurations in terms of their structural and actuation
properties with various performance indicators. Given the broad range of
configurations and capabilities that can be achieved with our proposed design,
we formulate tractable optimization programs to find optimal configurations
given structural and actuation constraints. Finally, a prototype of such a
vehicle is presented along with results of performed flights in multiple
configurations.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 07:38:00 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Garanger",
"Kévin",
""
],
[
"Khamvilai",
"Thanakorn",
""
],
[
"Epps",
"Jeremy",
""
],
[
"Feron",
"Eric",
""
]
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.