id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-21 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2504.11913 | Paul Denny | Poornima Meegammana and Hussel Suriyaarachchi and Paul Denny and
Suranga Nanayakkara | Broadening Participation through Physical Computing: Replicating
Sensor-Based Programming Workshops for Rural Students in Sri Lanka | Accepted to ITiCSE 2025 | null | 10.1145/3724363.3729037 | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In today's digital world, computing education offers critical opportunities,
yet systemic inequities exclude under-represented communities, especially in
rural, under-resourced regions. Early engagement is vital for building interest
in computing careers and achieving equitable participation. Recent work has
shown that the use of sensor-enabled tools and block-based programming can
improve engagement and self-efficacy for students from under-represented
groups, but these findings lack replication in diverse, resource-constrained
settings. This study addresses this gap by implementing sensor-based
programming workshops with rural students in Sri Lanka. Replicating methods
from the literature, we conduct a between-group study (sensor vs. non-sensor)
using Scratch and real-time environmental sensors. We found that students in
both groups reported significantly higher confidence in programming in Scratch
after the workshop. In addition, average changes in both self-efficacy and
outcome expectancy were higher in the experimental (sensor) group than in the
control (non-sensor) group, mirroring trends observed in the original study
being replicated. We also found that using the sensors helped to enhance
creativity and inspired some students to express an interest in information and
communications technology (ICT) careers, supporting the value of such hands-on
activities in building programming confidence among under-represented groups.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:47:41 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Meegammana",
"Poornima",
""
],
[
"Suriyaarachchi",
"Hussel",
""
],
[
"Denny",
"Paul",
""
],
[
"Nanayakkara",
"Suranga",
""
]
] |
2504.11914 | Yuhao Chao | Yuhao Chao, Jie Liu, Jie Tang, Gangshan Wu | AnomalyR1: A GRPO-based End-to-end MLLM for Industrial Anomaly Detection | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Industrial Anomaly Detection (IAD) poses a formidable challenge due to the
scarcity of defective samples, making it imperative to deploy models capable of
robust generalization to detect unseen anomalies effectively. Traditional
approaches, often constrained by hand-crafted features or domain-specific
expert models, struggle to address this limitation, underscoring the need for a
paradigm shift. We introduce AnomalyR1, a pioneering framework that leverages
VLM-R1, a Multimodal Large Language Model (MLLM) renowned for its exceptional
generalization and interpretability, to revolutionize IAD. By integrating MLLM
with Group Relative Policy Optimization (GRPO), enhanced by our novel Reasoned
Outcome Alignment Metric (ROAM), AnomalyR1 achieves a fully end-to-end solution
that autonomously processes inputs of image and domain knowledge, reasons
through analysis, and generates precise anomaly localizations and masks. Based
on the latest multimodal IAD benchmark, our compact 3-billion-parameter model
outperforms existing methods, establishing state-of-the-art results. As MLLM
capabilities continue to advance, this study is the first to deliver an
end-to-end VLM-based IAD solution that demonstrates the transformative
potential of ROAM-enhanced GRPO, positioning our framework as a forward-looking
cornerstone for next-generation intelligent anomaly detection systems in
industrial applications with limited defective data.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:48:41 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Chao",
"Yuhao",
""
],
[
"Liu",
"Jie",
""
],
[
"Tang",
"Jie",
""
],
[
"Wu",
"Gangshan",
""
]
] |
2504.11915 | Luca Baracco | Luca Baracco, Olga Bernardi, Corentin Fierobe | Starting the study of outer length billiards | null | null | null | null | math.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We focus on the outer length billiard dynamics, acting on the exterior of a
strictly-convex planar domain. We first show that ellipses are totally
integrable. We then provide an explicit representation of first order terms for
the formal Taylor expansion of the corresponding Mather's $\beta$-function.
Finally, we provide explicit Lazutkin coordinates up to order 4.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:52:05 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Baracco",
"Luca",
""
],
[
"Bernardi",
"Olga",
""
],
[
"Fierobe",
"Corentin",
""
]
] |
2504.11916 | Xiaosheng Wu | Xinhua Qin, Xiaosheng Wu | Non-vanishing of Dirichlet $L$-functions at the Central Point | null | null | null | null | math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that for at least $\frac{7}{19}$ of the primitive Dirichlet
characters $\chi$ with large general modulus, the central value
$L(\frac12,\chi)$ is non-vanishing.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:54:28 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Qin",
"Xinhua",
""
],
[
"Wu",
"Xiaosheng",
""
]
] |
2504.11917 | Maseim Kenmoe | Maseim Bassis Kenmoe | Dirac Representation for Lattice Spin Operators: Spin-$1/2$ and Spin-$1$
cases | null | null | null | null | cond-mat.soft | http://creativecommons.org/licenses/by/4.0/ | A novel quantum representation of lattice spin operators (LSOs) is achieved
by mapping quantum spins onto their classical analogues for spin size $S=1/2$
and $S=1$. The "braket" representations of LSOs are attained thanks to a
profound inspection into the binary/ternary distribution of classical
bits/trits in non-negative integers. We claim the possility of getting the
$j$th digit of a positive integer without performing any binary/ternary
decomposition. Analytical formulas returning the $j$th bits/trits of an integer
are presented. Impacts of our achievements in Physics are highlighted by
revisiting the $1D$ spin-$1/2$ {XXZ} Heisenberg model with open boundaries in a
magnetic field in both absence (uniform magnetic field) and presence of
disorder (random magnetic field). In the absence of disorder (clean system), we
demonstrate that the corresponding eigenvalues problem can be reduced to a
tight-binding problem on a graph and solved without resorting to any spinless
transformation nor the Bethe Anzath. In the presence of disorder, a convergent
perturbation theory is elaborated. Our analytical results are compared with
data from exact diagonalization for relatively large spin systems ($K\leq 18$
spins with $K$ denoting the total number of spins) obtained by implementing
both the global $U(1)$ symmetry to block-diagonalize the Hamiltonian and the
spin-inversion symmetry for two-fold block-diagonalization in the sector with
total magnetization $\mathcal{J}^z=0$. We observe a good agreement between both
results.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:54:35 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Kenmoe",
"Maseim Bassis",
""
]
] |
2504.11918 | Belen Yu Irureta-Goyena | Bel\'en Yu Irureta-Goyena, George Helou, Jean-Paul Kneib, Frank Masci,
Thomas Prince, Kumar Venkataramani, Quanzhi Ye, Joseph Masiero, Fr\'ed\'eric
Dux, Mathieu Salzmann | Deep learning to improve the discovery of near-Earth asteroids in the
Zwicky Transient Facility | Accepted for publication in Publications of the Astronomical Society
of the Pacific (28 March 2025) | null | null | null | astro-ph.IM | http://creativecommons.org/licenses/by/4.0/ | We present a novel pipeline that uses a convolutional neural network (CNN) to
improve the detection capability of near-Earth asteroids (NEAs) in the context
of planetary defense. Our work aims to minimize the dependency on human
intervention of the current approach adopted by the Zwicky Transient Facility
(ZTF). The target NEAs have a high proper motion of up to tens of degrees per
day and thus appear as streaks of light in the images. We trained our CNNs to
detect these streaks using three datasets: a set with real asteroid streaks, a
set with synthetic (i.e., simulated) streaks and a mixed set, and tested the
resultant models on real survey images. The results achieved were almost
identical across the three models: $0.843\pm0.005$ in completeness and
$0.820\pm0.025$ in precision. The bias on streak measurements reported by the
CNNs was $1.84\pm0.03$ pixels in streak position, $0.817\pm0.026$ degrees in
streak angle and $-0.048\pm0.003$ in fractional bias in streak length (computed
as the absolute length bias over the streak length, with the negative sign
indicating an underestimation). We compared the performance of our CNN trained
with a mix of synthetic and real streaks to that of the ZTF human scanners by
analyzing a set of 317 streaks flagged as valid by the scanners. Our pipeline
detected $80~\%$ of the streaks found by the scanners and 697 additional
streaks that were subsequently verified by the scanners to be valid streaks.
These results suggest that our automated pipeline can complement the work of
the human scanners at no cost for the precision and find more objects than the
current approach. They also prove that the synthetic streaks were realistic
enough to be used for augmenting training sets when insufficient real streaks
are available or exploring the simulation of streaks with unusual
characteristics that have not yet been detected.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:55:26 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Irureta-Goyena",
"Belén Yu",
""
],
[
"Helou",
"George",
""
],
[
"Kneib",
"Jean-Paul",
""
],
[
"Masci",
"Frank",
""
],
[
"Prince",
"Thomas",
""
],
[
"Venkataramani",
"Kumar",
""
],
[
"Ye",
"Quanzhi",
""
],
[
"Masiero",
"Joseph",
""
],
[
"Dux",
"Frédéric",
""
],
[
"Salzmann",
"Mathieu",
""
]
] |
2504.11919 | Qianjin Yu | Qianjin Yu, Keyu Wu, Zihan Chen, Chushu Zhang, Manlin Mei, Lingjun
Huang, Fang Tan, Yongsheng Du, Kunlin Liu, and Yurui Zhu | Rethinking the Generation of High-Quality CoT Data from the Perspective
of LLM-Adaptive Question Difficulty Grading | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, DeepSeek-R1 (671B) (DeepSeek-AIet al., 2025) has demonstrated its
excellent reasoning ability in complex tasks and has publiclyshared its
methodology. This provides potentially high-quality chain-of-thought (CoT) data
for stimulating the reasoning abilities of small-sized large language models
(LLMs). To generate high-quality CoT data for different LLMs, we seek an
efficient method for generating high-quality CoT data with LLM-Adaptive
questiondifficulty levels. First, we grade the difficulty of the questions
according to the reasoning ability of the LLMs themselves and construct a
LLM-Adaptive question database. Second, we sample the problem database based on
a distribution of difficulty levels of the questions and then use DeepSeek-R1
(671B) (DeepSeek-AI et al., 2025) to generate the corresponding high-quality
CoT data with correct answers. Thanks to the construction of CoT data with
LLM-Adaptive difficulty levels, we have significantly reduced the cost of data
generation and enhanced the efficiency of model supervised fine-tuning (SFT).
Finally, we have validated the effectiveness and generalizability of the
proposed method in the fields of complex mathematical competitions and code
generation tasks. Notably, with only 2k high-quality mathematical CoT data, our
ZMath-32B surpasses DeepSeek-Distill-32B in math reasoning task. Similarly,
with only 2k high-quality code CoT data, our ZCode-32B surpasses
DeepSeek-Distill-32B in code reasoning tasks.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:55:34 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Yu",
"Qianjin",
""
],
[
"Wu",
"Keyu",
""
],
[
"Chen",
"Zihan",
""
],
[
"Zhang",
"Chushu",
""
],
[
"Mei",
"Manlin",
""
],
[
"Huang",
"Lingjun",
""
],
[
"Tan",
"Fang",
""
],
[
"Du",
"Yongsheng",
""
],
[
"Liu",
"Kunlin",
""
],
[
"Zhu",
"Yurui",
""
]
] |
2504.11920 | Yifei Li | Yifei Li | Lagrangian finite elements in Sobolev-like spaces of order $3/2$ | null | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a Sobolev-like space of order $3/2$, denoted as
$\widehat{H}^{3/2}$, for Lagrangian finite elements, especially for $C^0$
elements. It is motivated by the limitations of current stability analysis of
the evolving surface finite element method (ESFEM), which relies exclusively on
an energy estimate framework. To establish a PDE-based analysis framework for
ESFEM, we encounter a fundamental regularity mismatch: the ESFEM adopts the
$C^0$ elements, while the PDE regularity theory requires $H^{3/2}$ regularity
for solutions. To overcome this difficulty, we first examine the properties of
the continuous $H^{3/2}$ space, then introduce a Dirichlet lift and Scott-Zhang
type interpolation operators to bridge to the discrete $\widehat{H}^{3/2}$
space. Our new $\widehat{H}^{3/2}$ space is shown to be compatible with the
elliptic PDE regularity theory, the trace inequality, and the inverse
inequality. Notably, we extend the critical domain deformation estimate in
ESFEM to the $\widehat{H}^{3/2}$ setting. The $\widehat{H}^{3/2}$ theory
provides a foundation for establishing a PDE-based convergence analysis
framework of ESFEM.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:56:43 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Li",
"Yifei",
""
]
] |
2504.11921 | Hasmik Poghosyan Mrs | Hasmik Poghosyan and Rubik Poghossian | On 5-point conformal block with level 2 degenerate field insertion and
its AGT dual | 15 pages, 5 figures | null | null | null | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we develop and explore recursive methods to investigate the 2d
CFT 5-point conformal block with a level 2 degenerate insertion, as well as its
AGT dual, by solving the BPZ differential equation. First, we represent the
solution of the differential equation as a double series expansion. On the
2-node quiver gauge theory side, this corresponds to the instanton series. We
then demonstrate that the expansion coefficients are uniquely determined by a
recursion relation. Inspired by the approach initiated in a paper by D. Gaiotto
and J. Teschner, we partially resum this series and show that the result can be
elegantly expressed in terms of a single hypergeometric function and its
derivative. This new representation makes it straightforward to relate
different asymptotic regions. As a by-product, this provides us a simple
derivation of fusion and braiding coefficients.
We describe the subtle procedure of merging the degenerate field with the
outgoing state, thereby obtaining a generic 4-point block, which on the gauge
theory side corresponds to the partition function of $SU(2)$ gauge theory with
four massive hypermultiplets in the $\Omega$-background.
Finally, we performed several nontrivial checks, which confirm our results.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:56:43 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Poghosyan",
"Hasmik",
""
],
[
"Poghossian",
"Rubik",
""
]
] |
2504.11922 | Lvpan Cai | Lvpan Cai, Haowei Wang, Jiayi Ji, YanShu ZhouMen, Yiwei Ma, Xiaoshuai
Sun, Liujuan Cao, Rongrong Ji | Zooming In on Fakes: A Novel Dataset for Localized AI-Generated Image
Detection with Forgery Amplification Approach | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rise of AI-generated image editing tools has made localized forgeries
increasingly realistic, posing challenges for visual content integrity.
Although recent efforts have explored localized AIGC detection, existing
datasets predominantly focus on object-level forgeries while overlooking
broader scene edits in regions such as sky or ground. To address these
limitations, we introduce \textbf{BR-Gen}, a large-scale dataset of 150,000
locally forged images with diverse scene-aware annotations, which are based on
semantic calibration to ensure high-quality samples. BR-Gen is constructed
through a fully automated Perception-Creation-Evaluation pipeline to ensure
semantic coherence and visual realism. In addition, we further propose
\textbf{NFA-ViT}, a Noise-guided Forgery Amplification Vision Transformer that
enhances the detection of localized forgeries by amplifying forgery-related
features across the entire image. NFA-ViT mines heterogeneous regions in
images, \emph{i.e.}, potential edited areas, by noise fingerprints.
Subsequently, attention mechanism is introduced to compel the interaction
between normal and abnormal features, thereby propagating the generalization
traces throughout the entire image, allowing subtle forgeries to influence a
broader context and improving overall detection robustness. Extensive
experiments demonstrate that BR-Gen constructs entirely new scenarios that are
not covered by existing methods. Take a step further, NFA-ViT outperforms
existing methods on BR-Gen and generalizes well across current benchmarks. All
data and codes are available at https://github.com/clpbc/BR-Gen.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:57:23 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Cai",
"Lvpan",
""
],
[
"Wang",
"Haowei",
""
],
[
"Ji",
"Jiayi",
""
],
[
"ZhouMen",
"YanShu",
""
],
[
"Ma",
"Yiwei",
""
],
[
"Sun",
"Xiaoshuai",
""
],
[
"Cao",
"Liujuan",
""
],
[
"Ji",
"Rongrong",
""
]
] |
2504.11923 | Zeyu Dai | Zeyu Dai, Shengcai Liu, Rui He, Jiahao Wu, Ning Lu, Wenqi Fan, Qing
Li, Ke Tang | SemDiff: Generating Natural Unrestricted Adversarial Examples via
Semantic Attributes Optimization in Diffusion Models | null | null | null | null | cs.LG cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Unrestricted adversarial examples (UAEs), allow the attacker to create
non-constrained adversarial examples without given clean samples, posing a
severe threat to the safety of deep learning models. Recent works utilize
diffusion models to generate UAEs. However, these UAEs often lack naturalness
and imperceptibility due to simply optimizing in intermediate latent noises. In
light of this, we propose SemDiff, a novel unrestricted adversarial attack that
explores the semantic latent space of diffusion models for meaningful
attributes, and devises a multi-attributes optimization approach to ensure
attack success while maintaining the naturalness and imperceptibility of
generated UAEs. We perform extensive experiments on four tasks on three
high-resolution datasets, including CelebA-HQ, AFHQ and ImageNet. The results
demonstrate that SemDiff outperforms state-of-the-art methods in terms of
attack success rate and imperceptibility. The generated UAEs are natural and
exhibit semantically meaningful changes, in accord with the attributes'
weights. In addition, SemDiff is found capable of evading different defenses,
which further validates its effectiveness and threatening.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:58:04 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Dai",
"Zeyu",
""
],
[
"Liu",
"Shengcai",
""
],
[
"He",
"Rui",
""
],
[
"Wu",
"Jiahao",
""
],
[
"Lu",
"Ning",
""
],
[
"Fan",
"Wenqi",
""
],
[
"Li",
"Qing",
""
],
[
"Tang",
"Ke",
""
]
] |
2504.11924 | Francesco Zola | Francesco Zola, Jon Ander Medina, Andrea Venturi, Raul Orduna | Topological Analysis of Mixer Activities in the Bitcoin Network | The paper is presented at the 3rd IEEE International Workshop on
Cryptocurrency Exchanges (CryptoEx 2025) | null | null | null | cs.CR cs.CE cs.SI | http://creativecommons.org/licenses/by/4.0/ | Cryptocurrency users increasingly rely on obfuscation techniques such as
mixers, swappers, and decentralised or no-KYC exchanges to protect their
anonymity. However, at the same time, these services are exploited by criminals
to conceal and launder illicit funds. Among obfuscation services, mixers remain
one of the most challenging entities to tackle. This is because their owners
are often unwilling to cooperate with Law Enforcement Agencies, and
technically, they operate as 'black boxes'. To better understand their
functionalities, this paper proposes an approach to analyse the operations of
mixers by examining their address-transaction graphs and identifying
topological similarities to uncover common patterns that can define the mixer's
modus operandi. The approach utilises community detection algorithms to extract
dense topological structures and clustering algorithms to group similar
communities. The analysis is further enriched by incorporating data from
external sources related to known Exchanges, in order to understand their role
in mixer operations. The approach is applied to dissect the Blender.io mixer
activities within the Bitcoin blockchain, revealing: i) consistent structural
patterns across address-transaction graphs; ii) that Exchanges play a key role,
following a well-established pattern, which raises several concerns about their
AML/KYC policies. This paper represents an initial step toward dissecting and
understanding the complex nature of mixer operations in cryptocurrency networks
and extracting their modus operandi.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:58:59 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zola",
"Francesco",
""
],
[
"Medina",
"Jon Ander",
""
],
[
"Venturi",
"Andrea",
""
],
[
"Orduna",
"Raul",
""
]
] |
2504.11925 | David Steinberg | David Refaeli, Mira Marcus-Kalish and David M. Steinberg | Reducing Calls to the Simulator in Simulation Based Inference (SBI) | null | null | null | null | stat.CO | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Simulation-Based Inference (SBI) deals with statistical inference in problems
where the data are generated from a system that is described by a complex
stochastic simulator. The challenge for inference in these problems is that the
likelihood is intractable; SBI proceeds by using the simulator to sample from
the likelihood. In many real world applications, simulator calls are expensive,
limiting the associated sample size. Our goal in this work is to extend SBI to
exploit two proposals for reducing simulator calls: to draw likelihood samples
from a Neural Density Estimator (NDE) surrogate rather than from the stochastic
simulator; and use of Support Points rather than simple random sampling to
generate evaluation sites. We embed these methods in the Sequential Neural
Posterior Estimator (SNPE) algorithm. Across a suite of test cases, we find
that the NDE surrogate improves the quality of the inference; support points
worked well in some examples, but not in others.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:59:31 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Refaeli",
"David",
""
],
[
"Marcus-Kalish",
"Mira",
""
],
[
"Steinberg",
"David M.",
""
]
] |
2504.11926 | Yifei Li | Yifei Li | Convergence of finite elements for the Eyles-King-Styles model of tumour
growth | null | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a convergence analysis of evolving surface finite element
methods (ESFEM) applied to the original Eyles-King-Styles model of tumour
growth. The model consists of a Poisson equation in the bulk, a forced mean
curvature flow on the surface, and a coupled velocity law between bulk and
surface. Due to the non-trivial bulk-surface coupling, all previous analyses --
which exclusively relied on energy-estimate based approaches -- required an
additional regularization term. By adopting the $\widehat{H}^{3/2}$ theory and
the multilinear forms, we develop an essentially new theoretical framework that
enables the application of PDE regularity theory to stability analysis. Based
on this framework, we provide the first rigorous convergence proof for the
original model without regularization.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:00:02 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Li",
"Yifei",
""
]
] |
2504.11927 | Salah Abdeljabar | Salah Abdeljabar and Mohamed-Slim Alouini | Super-LoRa: Enhancing LoRa Throughput via Payload Superposition | null | null | null | null | eess.SP | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper presents Super-LoRa, a novel approach to enhancing the throughput
of LoRa networks by leveraging the inherent robustness of LoRa modulation
against interference. By superimposing multiple payload symbols, Super-LoRa
significantly increases the data rate while maintaining lower transmitter and
receiver complexity. Our solution is evaluated through both simulations and
real-world experiments, showing a potential throughput improvement of up to 5x
compared to standard LoRa. This advancement positions Super-LoRa as a viable
solution for data-intensive IoT applications such as smart cities and precision
agriculture, which demand higher data transmission rates.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:02:38 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Abdeljabar",
"Salah",
""
],
[
"Alouini",
"Mohamed-Slim",
""
]
] |
2504.11928 | Yifan Cao | Yi-Fan Cao, Reza Hadi Mogavi, Meng Xia, Leo Yu-Ho Lo, Xiao-Qing Zhang,
Mei-Jia Luo, Lennart E. Nacke, Yang Wang, Huamin Qu | The Jade Gateway to Trust: Exploring How Socio-Cultural Perspectives
Shape Trust Within Chinese NFT Communities | 39 pages, 7 tables, 4 figures, ACM CSCW | null | 10.1145/3711087 | null | cs.CY cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Today's world is witnessing an unparalleled rate of technological
transformation. The emergence of non-fungible tokens (NFTs) has transformed how
we handle digital assets and value. Despite their initial popularity, NFTs face
declining adoption influenced not only by cryptocurrency volatility but also by
trust dynamics within communities. From a social computing perspective,
understanding these trust dynamics offers valuable insights for the development
of both the NFT ecosystem and the broader digital economy. China presents a
compelling context for examining these dynamics, offering a unique intersection
of technological innovation and traditional cultural values. Through a content
analysis of eight Chinese NFT-focused WeChat groups and 21 semi-structured
interviews, we examine how socio-cultural factors influence trust formation and
development. We found that trust in Chinese NFT communities is significantly
molded by local cultural values. To be precise, Confucian virtues, such as
benevolence, propriety, and integrity, play a crucial role in shaping these
trust relationships. Our research identifies three critical trust dimensions in
China's NFT market: (1) technological, (2) institutional, and (3) social. We
examined the challenges in cultivating each dimension. Based on these insights,
we developed tailored trust-building guidelines for Chinese NFT stakeholders.
These guidelines address trust issues that factor into NFT's declining
popularity and could offer valuable strategies for CSCW researchers,
developers, and designers aiming to enhance trust in global NFT communities.
Our research urges CSCW scholars to take into account the unique socio-cultural
contexts when developing trust-enhancing strategies for digital innovations and
online interactions.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:03:30 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Cao",
"Yi-Fan",
""
],
[
"Mogavi",
"Reza Hadi",
""
],
[
"Xia",
"Meng",
""
],
[
"Lo",
"Leo Yu-Ho",
""
],
[
"Zhang",
"Xiao-Qing",
""
],
[
"Luo",
"Mei-Jia",
""
],
[
"Nacke",
"Lennart E.",
""
],
[
"Wang",
"Yang",
""
],
[
"Qu",
"Huamin",
""
]
] |
2504.11929 | Hugo Holland | Julien Grain and Hugo Holland | Separate universe in multifield inflation: a phase-space approach | 46 pages, 12 pages of appendices | null | null | null | astro-ph.CO gr-qc hep-th | http://creativecommons.org/licenses/by/4.0/ | In this article we extend a study of the validity conditions of the
separate-universe approach of cosmological perturbations to models of inflation
with multiple fields. The separate-universe approach consists in describing the
universe as a collection of homogeneous and isotropic patches, giving us an
effective description of perturbation theory at large scales through
phase-space reduction. This approximation is a necessary step in stochastic
inflation, an effective theory of coarse-grained, super-Hubble, scalar fields
fluctuations. One needs a stochastic inflation description in the context of
primordial black hole productions since it needs enhancements of the curvature
power spectrum. It easily achievable in multifield inflation models but
necessarily comes with strong diffusive effects. We study and compare
cosmological perturbation theory and the separate-universe approach in said
non-linear sigma models as a typical framework of multifield inflation and
employing the Hamiltonian formalism to keep track of the complete phase space
(or the reduced isotropic phase space in the separate-universe approach). We
find that the separate-universe approach adequately describes the cosmological
perturbation theory provided the wavelength of the modes considered is greater
that several lower bounds that depend on the cosmological horizon and the
inverse of the effective Hamiltonian masses of the fields; the latter being
fixed by the coupling potential and the field-space geometry. We also compare
gauge-invariant variables and several gauge fixing procedures in both
approaches. For instance, we showed that the uniform-expansion gauge is nicely
described by the separate-universe picture, hence qualifying its use in
stochastic inflation as commonly done.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:08:43 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Grain",
"Julien",
""
],
[
"Holland",
"Hugo",
""
]
] |
2504.11930 | Hairui Ren | Hairui Ren, Fan Tang, He Zhao, Zixuan Wang, Dandan Guo, Yi Chang | Beyond Words: Augmenting Discriminative Richness via Diffusions in
Unsupervised Prompt Learning | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Fine-tuning vision-language models (VLMs) with large amounts of unlabeled
data has recently garnered significant interest. However, a key challenge
remains the lack of high-quality pseudo-labeled data. Current pseudo-labeling
strategies often struggle with mismatches between semantic and visual
information, leading to sub-optimal performance of unsupervised prompt learning
(UPL) methods. In this paper, we introduce a simple yet effective approach
called \textbf{A}ugmenting D\textbf{i}scriminative \textbf{R}ichness via
Diffusions (AiR), toward learning a richer discriminating way to represent the
class comprehensively and thus facilitate classification. Specifically, our
approach includes a pseudo-label generation module that leverages high-fidelity
synthetic samples to create an auxiliary classifier, which captures richer
visual variation, bridging text-image-pair classification to a more robust
image-image-pair classification. Additionally, we exploit the diversity of
diffusion-based synthetic samples to enhance prompt learning, providing greater
information for semantic-visual alignment. Extensive experiments on five public
benchmarks, including RESISC45 and Flowers102, and across three learning
paradigms-UL, SSL, and TRZSL-demonstrate that AiR achieves substantial and
consistent performance improvements over state-of-the-art unsupervised prompt
learning methods.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:09:45 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ren",
"Hairui",
""
],
[
"Tang",
"Fan",
""
],
[
"Zhao",
"He",
""
],
[
"Wang",
"Zixuan",
""
],
[
"Guo",
"Dandan",
""
],
[
"Chang",
"Yi",
""
]
] |
2504.11931 | Yuming Qin | Yuming Qin and Junchen Liu | Local-in-time well-posedness for 2D compressible magneto-micropolar
boundary layer in Sobolev spaces | null | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the two-dimensional compressible magneto-micropolar
boundary layer equations on the half-plane, which are derived from 2D
compressible magneto-micropolar fluid equations with the non-slip boundary
condition on velocity, Dirichlet boundary condition on micro-rotational
velocity and perfectly conducting boundary condition on magnetic field. Based
on a nonlinear coordinate transformation proposed in \cite{LXY2019}, we first
prove the local-in-time well-posedness for the compressible magneto-micropolar
boundary layer system in Sobolev spaces, provided that initial tangential
magnetic field is non-degenerate.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:10:40 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Qin",
"Yuming",
""
],
[
"Liu",
"Junchen",
""
]
] |
2504.11932 | Rintaro Karashima | Rintaro Karashima and Hiroyasu Inoue | Technological Complexity Based on Japanese Patent Data | null | null | null | null | cs.SI | http://creativecommons.org/licenses/by/4.0/ | As international competition intensifies in technologies, nations need to
identify key technologies to foster innovation. However, the identification is
difficult because a technology is independent, therefore has complex nature.
Here, this study aims to assess patent technological fields by applying
Technological Complexity Index from a corporate perspective, addressing its
underutilization in Japan despite its potential. By utilizing carefully
processed patent data from fiscal years 1981 to 2010, we analyze the bipartite
network which consists of 1,938 corporations and 35 or 124 technological
fields. Our findings provide quantitative characteristics of ubiquity and
sophistication for patent fields, the detailed technological trends that
reflect the social context, and methodological stability for policymakers and
researchers, contributing to targeted innovation strategies in Japan.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:12:00 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Karashima",
"Rintaro",
""
],
[
"Inoue",
"Hiroyasu",
""
]
] |
2504.11933 | Markus Reiher | Marco Eckhoff and Markus Reiher | Lifelong and Universal Machine Learning Potentials for Chemical Reaction
Network Explorations | 20 pages, 9 figures, 2 tables | null | null | null | physics.chem-ph physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent developments in computational chemistry facilitate the automated
quantum chemical exploration of chemical reaction networks for the in-silico
prediction of synthesis pathways, yield, and selectivity. However, the
underlying quantum chemical energy calculations require vast computational
resources, limiting these explorations severely in practice. Machine learning
potentials (MLPs) offer a solution to increase computational efficiency, while
retaining the accuracy of reliable first-principles data used for their
training. Unfortunately, MLPs will be limited in their generalization ability
within chemical (reaction) space, if the underlying training data is not
representative for a given application. Within the framework of automated
reaction network exploration, where new reactants or reagents composed of any
elements from the periodic table can be introduced, this lack of
generalizability will be the rule rather than the exception. Here, we therefore
study the benefits and drawbacks of two MLP concepts in this context. Whereas
universal MLPs are designed to cover most of the relevant chemical space in
their training, lifelong MLPs push their adaptability by efficient continual
learning of additional data. While the accuracy of the universal MLPs turns out
to be not yet sufficient for reaction search trials without any fine-tuning,
lifelong MLPs can reach chemical accuracy. We propose an improved learning
algorithm for lifelong adaptive data selection yielding efficient integration
of new data while previous expertise is preserved.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:12:08 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Eckhoff",
"Marco",
""
],
[
"Reiher",
"Markus",
""
]
] |
2504.11934 | Andrea Piergentili | Andrea Piergentili, Beatrice Savoldi, Matteo Negri, Luisa Bentivogli | An LLM-as-a-judge Approach for Scalable Gender-Neutral Translation
Evaluation | Accepted at GITT 2025 | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Gender-neutral translation (GNT) aims to avoid expressing the gender of human
referents when the source text lacks explicit cues about the gender of those
referents. Evaluating GNT automatically is particularly challenging, with
current solutions being limited to monolingual classifiers. Such solutions are
not ideal because they do not factor in the source sentence and require
dedicated data and fine-tuning to scale to new languages. In this work, we
address such limitations by investigating the use of large language models
(LLMs) as evaluators of GNT. Specifically, we explore two prompting approaches:
one in which LLMs generate sentence-level assessments only, and another, akin
to a chain-of-thought approach, where they first produce detailed phrase-level
annotations before a sentence-level judgment. Through extensive experiments on
multiple languages with five models, both open and proprietary, we show that
LLMs can serve as evaluators of GNT. Moreover, we find that prompting for
phrase-level annotations before sentence-level assessments consistently
improves the accuracy of all models, providing a better and more scalable
alternative to current solutions.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:14:27 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Piergentili",
"Andrea",
""
],
[
"Savoldi",
"Beatrice",
""
],
[
"Negri",
"Matteo",
""
],
[
"Bentivogli",
"Luisa",
""
]
] |
2504.11935 | Armen Nersessian | Sergey Krivonos, Armen Nersessian | Note on supersymmetric mechanics with spin-orbit interaction | Contribution to the Proceedings of the Workshop "Supersymmetries and
Quantum Symmetries" (SQS'2024, July 29 - August 3, 2024, Dubna ) | null | null | null | hep-th | http://creativecommons.org/licenses/by/4.0/ | We propose a simple model of two-dimensional N=2 superconformal mechanics
with a spin-orbit interaction term and demonstrate that it inherits the
Galilean symmetry of the initial free-particle system. We then propose a
quaternionic counterpart of this system, which describes the four-dimensional
N=4 superconformal mechanics$D(1,2|\alpha). The bosonic part of the Hamiltonian
describes a free particle on the cone, while the fermionic part necessarily
includes the spin-orbit interaction term.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:15:57 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Krivonos",
"Sergey",
""
],
[
"Nersessian",
"Armen",
""
]
] |
2504.11937 | Shi-Zhong Du | Huan-Jie Chen and Shi-Zhong Du | Complete Classification of the Symmetry Groups of Monge-Amp\`{e}re
Equation and Affine Maximal type Equation | null | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The affine maximal type hypersurface has been a core topic in Affine
Geometry. When the hypersurface is presented as a regular graph of a convex
function $u$, the statement that the graph is of affine maximal type is
equivalent to the statement that $u$ satisfies the fully nonlinear partial
differential equation
$$
D_{ij}(U^{ij}w)=0, \ \ w\equiv[\det D^2u]^{-\theta}, \ \ \theta>0, \ \
\forall x\in{\mathbb{R}}^N
$$ of fourth order. This equation can be regarded as a generalization of the
$N$-dimensional Monge-Amp\`{e}re equation
$$
\det D^2u=1, \ \ \forall x\in{\mathbb{R}}^N
$$ of second order, since each solution of Monge-Amp\`{e}re Equation
satisfies affine maximal type equation automatically. In this paper, we will
determine the symmetry groups of these two important fully nonlinear equations
without asymptotic growth assumption. Our method develops the Lie's theory to
fully nonlinear PDEs.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:16:28 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Chen",
"Huan-Jie",
""
],
[
"Du",
"Shi-Zhong",
""
]
] |
2504.11938 | Stefano Giordano | Stefano Giordano, Fabrizio Cleri, Ralf Blossey | Exact noise and dissipation operators for quantum stochastic
thermodynamics | null | null | null | null | quant-ph math-ph math.MP | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The theory of open quantum systems plays a fundamental role in several
scientific and technological disciplines, from quantum computing and
information science to molecular electronics and quantum thermodynamics.
Despite its widespread relevance, a rigorous formulation of quantum dissipation
in conjunction with thermal noise remains a topic of active research. In this
work, we establish a formal correspondence between classical stochastic
thermodynamics, in particular the Fokker-Planck and Klein-Kramers equations,
and the quantum master equation. Building on prior studies of multiplicative
noise in classical stochastic differential equations, we demonstrate that
thermal noise at the quantum level manifests as a multidimensional geometric
stochastic process. By applying canonical quantization, we introduce a novel
Hermitian dissipation operator that serves as a quantum analogue of classical
viscous friction. This operator not only preserves the mathematical rigor of
open quantum system dynamics but also allows for a well-defined expression of
heat exchange between a system and its environment, enabling the formulation of
an alternative quantum equipartition theorem. Our framework ensures a precise
energy balance that aligns with the first law of thermodynamics and an entropy
balance consistent with the second law. The theoretical formalism is applied to
two prototypical quantum systems, the harmonic oscillator and a particle in an
infinite potential well, for whom it provides new insights into nonequilibrium
thermodynamics at the quantum scale. Our results advance the understanding of
dissipation in quantum systems and establish a foundation for future studies on
stochastic thermodynamics in the quantum domain.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:16:33 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Giordano",
"Stefano",
""
],
[
"Cleri",
"Fabrizio",
""
],
[
"Blossey",
"Ralf",
""
]
] |
2504.11939 | Saeed Noori Gashti | Saeed Noori Gashti, Mohammad Ali S. Afshar, Mohammad Reza Alipour,
Izzet Sakall{\i}, Behnam Pourhassan, and Jafar Sadeghi | Assessing WGC Compatibility in ModMax Black Holes via Photon Spheres
Analysis and WCCC Validation | 18 pages, 10 figures | null | null | null | hep-th gr-qc | http://creativecommons.org/licenses/by/4.0/ | It seems that the regime of Hawking radiation and evaporation ultimately
drives charged black holes toward super-extremality of the charge parameter and
the dominance of extremal conditions. This progression, in turn, lays the
groundwork for satisfying the necessary conditions for the Weak Gravity
Conjecture (WGC). Preliminary studies indicate that black holes such as the
Reissner-Nordstr$\"o$m (RN) model, in their initial form, lack the capacity to
sustain super-extremality of the charge parameter. If such conditions arise,
these black holes transition into naked singularities-a scenario that is highly
undesirable due to the loss of causality and the breakdown of space-time
geometry. This raises whether the inability to sustain super-extremality is an
inherent property of the model or a consequence of the approximations and
precision limitations employed in its construction. To address this, we turned
to the ModMax model, which represents an extension of the RN model. Our
analysis revealed that the ModMax model not only accommodates super-extremality
of the charge parameter but also, under certain conditions, emerges as a
promising candidate for investigating the WGC. Furthermore, we independently
observed how the inclusion of the de Sitter radius ($\ell$) in the AdS model
and $f(R)$ gravitational corrections-both of which enhance and complicate the
model-can have a direct impact on the range of super-extremal charge tolerance
which, in turn, provides the realization of the conditions necessary for the
WGC.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:17:15 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gashti",
"Saeed Noori",
""
],
[
"Afshar",
"Mohammad Ali S.",
""
],
[
"Alipour",
"Mohammad Reza",
""
],
[
"Sakallı",
"Izzet",
""
],
[
"Pourhassan",
"Behnam",
""
],
[
"Sadeghi",
"Jafar",
""
]
] |
2504.11940 | Huihui Ye | Huihui Ye and Changjian Fu | $f$-vectors and $F$-invariant in generalized cluster algebras | 17 pages | null | null | null | math.RA | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We establish the initial and final seed mutations of the $f$-vectors in
generalized cluster algebras and prove some properties of $f$-vectors.
Furthermore, we extend $F$-invariant to generalized cluster algebras without
the positivity assumption and prove symmetry property of $f$-vectors using the
$F$-invariant.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:18:45 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ye",
"Huihui",
""
],
[
"Fu",
"Changjian",
""
]
] |
2504.11941 | Amit Roy | Trung Chau, Kanoy Kumar Das, Amit Roy, Kamalesh Saha | Admissible matchings and the Castelnuovo-Mumford regularity of
square-free powers | 33 pages, 3 figures, comments are welcome! | null | null | null | math.AC math.CO | http://creativecommons.org/licenses/by/4.0/ | Let $I$ be any square-free monomial ideal, and $\mathcal{H}_I$ denote the
hypergraph associated with $I$. Refining the concept of $k$-admissible matching
of a graph defined by Erey and Hibi, we introduce the notion of generalized
$k$-admissible matching for any hypergraph. Using this, we give a sharp lower
bound on the (Castelnuovo-Mumford) regularity of $I^{[k]}$, where $I^{[k]}$
denotes the $k^{\text{th}}$ square-free power of $I$. In the special case when
$I$ is equigenerated in degree $d$, this lower bound can be described using a
combinatorial invariant $\mathrm{aim}(\mathcal{H}_I,k)$, called the
$k$-admissible matching number of $\mathcal{H}_I$. Specifically, we prove that
$\mathrm{reg}(I^{[k]})\ge (d-1)\mathrm{aim}(\mathcal{H}_I,k)+k$, whenever
$I^{[k]}$ is non-zero. Even for the edge ideal $I(G)$ of a graph $G$, it turns
out that $\mathrm{aim}(G,k)+k$ is the first general lower bound for the
regularity of $I(G)^{[k]}$. In fact, when $G$ is a forest, $\mathrm{aim}(G,k)$
coincides with the $k$-admissible matching number introduced by Erey and Hibi.
Next, we show that if $G$ is a block graph, then $\mathrm{reg}(I(G)^{[k]})=
\mathrm{aim}(G,k)+k$, and this result can be seen as a generalization of the
corresponding regularity formula for forests. Additionally, for a
Cohen-Macaulay chordal graph $G$, we prove that $\mathrm{reg}(I(G)^{[2]})=
\mathrm{aim}(G,2)+2$. Finally, we propose a conjecture on the regularity of
square-free powers of edge ideals of chordal graphs.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:19:12 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Chau",
"Trung",
""
],
[
"Das",
"Kanoy Kumar",
""
],
[
"Roy",
"Amit",
""
],
[
"Saha",
"Kamalesh",
""
]
] |
2504.11942 | Leila Ismail Prof. | Nada Shahin and Leila Ismail | ADAT: Time-Series-Aware Adaptive Transformer Architecture for Sign
Language Translation | null | null | null | null | cs.AI cs.CL cs.CV | http://creativecommons.org/licenses/by/4.0/ | Current sign language machine translation systems rely on recognizing hand
movements, facial expressions and body postures, and natural language
processing, to convert signs into text. Recent approaches use Transformer
architectures to model long-range dependencies via positional encoding.
However, they lack accuracy in recognizing fine-grained, short-range temporal
dependencies between gestures captured at high frame rates. Moreover, their
high computational complexity leads to inefficient training. To mitigate these
issues, we propose an Adaptive Transformer (ADAT), which incorporates
components for enhanced feature extraction and adaptive feature weighting
through a gating mechanism to emphasize contextually relevant features while
reducing training overhead and maintaining translation accuracy. To evaluate
ADAT, we introduce MedASL, the first public medical American Sign Language
dataset. In sign-to-gloss-to-text experiments, ADAT outperforms the
encoder-decoder transformer, improving BLEU-4 accuracy by 0.1% while reducing
training time by 14.33% on PHOENIX14T and 3.24% on MedASL. In sign-to-text
experiments, it improves accuracy by 8.7% and reduces training time by 2.8% on
PHOENIX14T and achieves 4.7% higher accuracy and 7.17% faster training on
MedASL. Compared to encoder-only and decoder-only baselines in sign-to-text,
ADAT is at least 6.8% more accurate despite being up to 12.1% slower due to its
dual-stream structure.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:20:11 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shahin",
"Nada",
""
],
[
"Ismail",
"Leila",
""
]
] |
2504.11943 | Adrien Richard | Florian Bridoux, Christophe Crespelle, Thi Ha Duong Phan, Adrien
Richard | Dividing sums of cycles in the semiring of functional digraphs | 25 pages | null | null | null | math.CO cs.DM | http://creativecommons.org/licenses/by/4.0/ | Functional digraphs are unlabelled finite digraphs where each vertex has
exactly one out-neighbor. They are isomorphic classes of finite discrete-time
dynamical systems. Endowed with the direct sum and product, functional digraphs
form a semiring with an interesting multiplicative structure. For instance, we
do not know if the following division problem can be solved in polynomial time:
given two functional digraphs $A$ and $B$, does $A$ divide $B$? That $A$
divides $B$ means that there exists a functional digraph $X$ such that $AX$ is
isomorphic to $B$, and many such $X$ can exist. We can thus ask for the number
of solutions $X$. In this paper, we focus on the case where $B$ is a sum of
cycles (a disjoint union of cycles, corresponding to the limit behavior of
finite discrete-time dynamical systems). There is then a na\"ive
sub-exponential algorithm to compute the non-isomorphic solutions $X$, and our
main result is an improvement of this algorithm which has the property to be
polynomial when $A$ is fixed. It uses a divide-and-conquer technique that
should be useful for further developments on the division problem.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:22:56 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Bridoux",
"Florian",
""
],
[
"Crespelle",
"Christophe",
""
],
[
"Phan",
"Thi Ha Duong",
""
],
[
"Richard",
"Adrien",
""
]
] |
2504.11944 | Xuyang Chen | Xuyang Chen, Guojian Wang, Keyu Yan, Lin Zhao | VIPO: Value Function Inconsistency Penalized Offline Reinforcement
Learning | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Offline reinforcement learning (RL) learns effective policies from
pre-collected datasets, offering a practical solution for applications where
online interactions are risky or costly. Model-based approaches are
particularly advantageous for offline RL, owing to their data efficiency and
generalizability. However, due to inherent model errors, model-based methods
often artificially introduce conservatism guided by heuristic uncertainty
estimation, which can be unreliable. In this paper, we introduce VIPO, a novel
model-based offline RL algorithm that incorporates self-supervised feedback
from value estimation to enhance model training. Specifically, the model is
learned by additionally minimizing the inconsistency between the value learned
directly from the offline data and the one estimated from the model. We perform
comprehensive evaluations from multiple perspectives to show that VIPO can
learn a highly accurate model efficiently and consistently outperform existing
methods. It offers a general framework that can be readily integrated into
existing model-based offline RL algorithms to systematically enhance model
accuracy. As a result, VIPO achieves state-of-the-art performance on almost all
tasks in both D4RL and NeoRL benchmarks.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:23:44 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Chen",
"Xuyang",
""
],
[
"Wang",
"Guojian",
""
],
[
"Yan",
"Keyu",
""
],
[
"Zhao",
"Lin",
""
]
] |
2504.11945 | Wenfei Yu | Xian Zhang, Wenfei Yu, Francesco Carotenuto, Rob Fender, Sara Motta,
Arash Bahramian, James C. A. Miller-Jones, Thomas D. Russell, Stephane
Corbel, Patrick A. Woudt, Pikky Atri, Christian Knigge, Gregory R. Sivakoff,
Andrew K. Hughes, Jakob van den Eijnden, James Matthews, Maria C. Baglio, and
Payaswini Saikia | Jets from a stellar-mass black hole are as relativistic as those from
supermassive black holes | 40 pages, 16 figures, submitted version in December 2024 | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Relativistic jets from supermassive black holes in active galactic nuclei are
amongst the most powerful phenomena in the universe, acting to regulate the
growth of massive galaxies. Similar jets from stellar-mass black holes offer a
chance to study the same phenomena on accessible observation time scales.
However, such comparative studies across black hole masses and time scales
remain hampered by the long-standing perception that stellar-mass black hole
jets are in a less relativistic regime. We used radio interferometry
observations to monitor the Galactic black hole X-ray binary 4U 1543-47 and
discovered two distinct, relativistic ejections launched during a single
outburst. Our measurements reveal a likely Lorentz factor of $\sim$ 8 and a
minimum of 4.6 at launch with 95% confidence, demonstrating that stellar-mass
black holes in X-ray binaries can launch jets as relativistic as those seen in
active galactic nuclei.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:23:56 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zhang",
"Xian",
""
],
[
"Yu",
"Wenfei",
""
],
[
"Carotenuto",
"Francesco",
""
],
[
"Fender",
"Rob",
""
],
[
"Motta",
"Sara",
""
],
[
"Bahramian",
"Arash",
""
],
[
"Miller-Jones",
"James C. A.",
""
],
[
"Russell",
"Thomas D.",
""
],
[
"Corbel",
"Stephane",
""
],
[
"Woudt",
"Patrick A.",
""
],
[
"Atri",
"Pikky",
""
],
[
"Knigge",
"Christian",
""
],
[
"Sivakoff",
"Gregory R.",
""
],
[
"Hughes",
"Andrew K.",
""
],
[
"Eijnden",
"Jakob van den",
""
],
[
"Matthews",
"James",
""
],
[
"Baglio",
"Maria C.",
""
],
[
"Saikia",
"Payaswini",
""
]
] |
2504.11946 | Haoyang Wang | Haoyang Wang, Liming Liu, Peiheng Wang, Junlin Hao, Jiangkai Wu,
Xinggong Zhang | R-Meshfusion: Reinforcement Learning Powered Sparse-View Mesh
Reconstruction with Diffusion Priors | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mesh reconstruction from multi-view images is a fundamental problem in
computer vision, but its performance degrades significantly under sparse-view
conditions, especially in unseen regions where no ground-truth observations are
available. While recent advances in diffusion models have demonstrated strong
capabilities in synthesizing novel views from limited inputs, their outputs
often suffer from visual artifacts and lack 3D consistency, posing challenges
for reliable mesh optimization. In this paper, we propose a novel framework
that leverages diffusion models to enhance sparse-view mesh reconstruction in a
principled and reliable manner. To address the instability of diffusion
outputs, we propose a Consensus Diffusion Module that filters unreliable
generations via interquartile range (IQR) analysis and performs variance-aware
image fusion to produce robust pseudo-supervision. Building on this, we design
an online reinforcement learning strategy based on the Upper Confidence Bound
(UCB) to adaptively select the most informative viewpoints for enhancement,
guided by diffusion loss. Finally, the fused images are used to jointly
supervise a NeRF-based model alongside sparse-view ground truth, ensuring
consistency across both geometry and appearance. Extensive experiments
demonstrate that our method achieves significant improvements in both geometric
quality and rendering quality.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:23:59 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wang",
"Haoyang",
""
],
[
"Liu",
"Liming",
""
],
[
"Wang",
"Peiheng",
""
],
[
"Hao",
"Junlin",
""
],
[
"Wu",
"Jiangkai",
""
],
[
"Zhang",
"Xinggong",
""
]
] |
2504.11947 | Hao Chu | Liwen Feng, Haotian Zhang, Tim Priessnitz, Jiayuan Cao, Tarapada
Sarkar, Thales de Oliveira, Alexey N. Ponomaryov, Igor Ilyakov, Fei Yang,
Yongbo Lv, Yuheng Guo, Kilian Srowik, Steffen Danzenbacher, Moritz
Niethammer, Sergey Kovalev, Jan-Christoph Deinert, Stefan Kaiser, Richard L.
Greene, Hao Chu | Dissecting coupled orders in a terahertz-driven electron-doped cuprate | null | null | null | null | cond-mat.supr-con | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The interplay between superconductivity and charge density wave has often
been studied from an equilibrium point of view. For example, using static
tuning knobs such as doping, magnetic field and pressure, superconductivity can
be enhanced or suppressed. The resulting effect on the co-existing charge
density wave order, if any, is judged by variations in its ground state
properties such as the ordering temperature or the spatial correlation. Such an
approach can be understood as coordinated static displacements of two coupled
order parameters within a Ginzburg-Landau description, evincing their interplay
as either co-operative or competing but does not provide further microscopic
information about the interaction. In order to assess such information, we
dynamically perturb both orders from equilibrium and observe their coupling
directly in the time-domain. We show that high-field multicycle terahertz
pulses drive both the Higgs amplitude fluctuations of the superconducting order
as well as collective fluctuations of the charge order in an electron-doped
cuprate, resulting in characteristic third harmonic generation. A notable time
delay is manifested between their respective driven dynamics. We propose that
this may signify the important energy scale describing their coupling or imply
a terahertz field-depinned charge density wave that destroys macroscopic
superconductivity. Our work demonstrates a holistic approach for investigating
coupled superconducting and charge density wave orders, which may shed novel
light on their intertwined presence and widespread fluctuations in many classes
of unconventional superconductors.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:24:08 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Feng",
"Liwen",
""
],
[
"Zhang",
"Haotian",
""
],
[
"Priessnitz",
"Tim",
""
],
[
"Cao",
"Jiayuan",
""
],
[
"Sarkar",
"Tarapada",
""
],
[
"de Oliveira",
"Thales",
""
],
[
"Ponomaryov",
"Alexey N.",
""
],
[
"Ilyakov",
"Igor",
""
],
[
"Yang",
"Fei",
""
],
[
"Lv",
"Yongbo",
""
],
[
"Guo",
"Yuheng",
""
],
[
"Srowik",
"Kilian",
""
],
[
"Danzenbacher",
"Steffen",
""
],
[
"Niethammer",
"Moritz",
""
],
[
"Kovalev",
"Sergey",
""
],
[
"Deinert",
"Jan-Christoph",
""
],
[
"Kaiser",
"Stefan",
""
],
[
"Greene",
"Richard L.",
""
],
[
"Chu",
"Hao",
""
]
] |
2504.11948 | Oihana Garaialde Oca\~na | Jorge Fari\~na-Asategui, Oihana Garaialde Oca\~na, Jone Uria-Albizuri | On finitely generated Hausdorff spectra of groups acting on rooted trees | null | null | null | null | math.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We answer two longstanding questions of Klopsch (1999) and Shalev (2000) by
proving that the finitely generated Hausdorff spectrum of the closure of a
finitely generated regular branch group with respect to the level-stabilizer
filtration is the full interval [0,1]. Previous work related to the above
questions include the celebrated result of Ab\'ert and Vir\'ag on the
completeness of the finitely generated Hausdorff spectrum of the group of
$p$-adic automorphisms $W_p$. We extend their result to any level-transitive
iterated wreath product acting on a regular rooted tree, and more importantly,
provide the first explicit examples of finitely generated subgroups with
prescribed Hausdorff dimension. In fact, in $W_p$ such subgroups can be taken
to be 2-generated, giving further evidence to a conjecture of Ab\'ert and
Vir\'ag. Furthermore, we extend a well-known result of Klopsch (1999) for
branch groups to closed level-transitive groups with fully dimensional rigid
stabilizers: these have full Hausdorff spectrum with respect to the
level-stabilizer filtration. In turn, we determine, for the first time, the
Hausdorff spectum of many well-studied families of weakly branch groups. As an
additional new contribution, we define {\it nice filtrations} (which include
the level-stabilizer filtration). In fact, the first and the last result can be
proven more generally with respect to these filtrations (under possibly some
further assumptions). Finally, we also consider two standard filtrations,
namely the $2$-central lower series, and the dimension subgroup or
Jenning-Zassenhaus series in the closure of the first Grigorchuck group, and
show that its finitely generated Hausdorff spectra with respect to these
filtrations is the full interval [0,1], answering a recent question of de las
Heras and Thillaisundaram (2022). This is obtained via a reduction to
properties concerning to nice filtrations.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:24:26 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Fariña-Asategui",
"Jorge",
""
],
[
"Ocaña",
"Oihana Garaialde",
""
],
[
"Uria-Albizuri",
"Jone",
""
]
] |
2504.11949 | Jie Wang | Jie Wang, Chen Ye Gan, Caoqi Wei, Jiangtao Wen, Yuxing Han | Flow Intelligence: Robust Feature Matching via Temporal Signature
Correlation | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Feature matching across video streams remains a cornerstone challenge in
computer vision. Increasingly, robust multimodal matching has garnered interest
in robotics, surveillance, remote sensing, and medical imaging. While
traditional rely on detecting and matching spatial features, they break down
when faced with noisy, misaligned, or cross-modal data. Recent deep learning
methods have improved robustness through learned representations, but remain
constrained by their dependence on extensive training data and computational
demands. We present Flow Intelligence, a paradigm-shifting approach that moves
beyond spatial features by focusing on temporal motion patterns exclusively.
Instead of detecting traditional keypoints, our method extracts motion
signatures from pixel blocks across consecutive frames and extract temporal
motion signatures between videos. These motion-based descriptors achieve
natural invariance to translation, rotation, and scale variations while
remaining robust across different imaging modalities. This novel approach also
requires no pretraining data, eliminates the need for spatial feature
detection, enables cross-modal matching using only temporal motion, and it
outperforms existing methods in challenging scenarios where traditional
approaches fail. By leveraging motion rather than appearance, Flow Intelligence
enables robust, real-time video feature matching in diverse environments.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:25:20 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wang",
"Jie",
""
],
[
"Gan",
"Chen Ye",
""
],
[
"Wei",
"Caoqi",
""
],
[
"Wen",
"Jiangtao",
""
],
[
"Han",
"Yuxing",
""
]
] |
2504.11950 | Diana Stan | Diana Stan | Fractional powers of the backward heat operator and Carleman type
inequalities | 16 pages | null | null | null | math.AP | http://creativecommons.org/licenses/by/4.0/ | In this paper we derive the fractional power of the backward heat operator as
a high dimensional limit of the fractional Laplacian. As applications, we
derive Carleman type inequalities for fractional powers of the backward heat
operator.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:26:11 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Stan",
"Diana",
""
]
] |
2504.11951 | Nimra Muqaddass | Nimra Muqaddass, Alessandra Jannelli, and Francesco Oliveri | Pulsatile Magnetized $Cu$-$Al_{2}O_{3}$/Casson Blood Flow Through an
Elliptical Stenotic Artery for Drug Delivery Applications | 21 Pages, 15 Figures | null | null | null | physics.flu-dyn | http://creativecommons.org/licenses/by/4.0/ | Among cardiovascular diseases, atherosclerosis is a primary cause of
stenosis, involving the accumulation of plaques in the inner lining of an
artery. Inspired by drug delivery applications, the proposed study aims to
examine the numerical modeling of a two-dimensional, axisymmetric, and
time-dependent hybrid nanofluid composed of copper $(Cu)$, alumina
$(Al_{2}O_{3})$ nanoparticles, and blood as base fluid. Blood, modeled by the
non-Newtonian Casson model, flows through an elliptical stenotic artery. The
pulsatile nature of the pressure gradient and magnetic field impact with the
Hall current parameter are also taken into account in this study. A finite
difference technique, forward in time and central in space (FTCS), is deployed
to numerically discretize the transformed dimensionless model using MATLAB.
Comprehensive visualization of the effects of hemodynamic, geometric, and
nanoscale parameters on transport characteristics, and extensive graphical
results for blood flow characteristics are provided. A comparison is made among
blood, regular nanofluid, and hybrid nanofluid to analyze their properties in
relation to fluid flow and heat transfer. An augmentation in the non-Newtonian
parameter results in an amplification of velocity and in a reduction of the
temperature profile. Incorporating $Cu$ and $Al_2O_3$ nanoparticles into the
fluid results in a decrease of velocity and an increase of temperature. These
findings possess significant practical implications for applications where
efficient heat transfer is essential, such as in drug delivery systems and the
thermal management of biomedical devices. However, the observed reduction in
velocity may necessitate modifications to flow conditions to ensure optimal
operational performance in these contexts.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:28:37 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Muqaddass",
"Nimra",
""
],
[
"Jannelli",
"Alessandra",
""
],
[
"Oliveri",
"Francesco",
""
]
] |
2504.11952 | Ram Mohan Rao Kadiyala | Ram Mohan Rao Kadiyala, Siddartha Pullakhandam, Kanwal Mehreen,
Drishti Sharma, Siddhant Gupta, Jebish Purbey, Ashay Srivastava, Subhasya
TippaReddy, Arvind Reddy Bobbili, Suraj Telugara Chandrashekhar, Modabbir
Adeeb, Srinadh Vura, Hamza Farooq | Robust and Fine-Grained Detection of AI Generated Texts | ACL 2025 Feb ARR Submission | null | null | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | An ideal detection system for machine generated content is supposed to work
well on any generator as many more advanced LLMs come into existence day by
day. Existing systems often struggle with accurately identifying AI-generated
content over shorter texts. Further, not all texts might be entirely authored
by a human or LLM, hence we focused more over partial cases i.e human-LLM
co-authored texts. Our paper introduces a set of models built for the task of
token classification which are trained on an extensive collection of
human-machine co-authored texts, which performed well over texts of unseen
domains, unseen generators, texts by non-native speakers and those with
adversarial inputs. We also introduce a new dataset of over 2.4M such texts
mostly co-authored by several popular proprietary LLMs over 23 languages. We
also present findings of our models' performance over each texts of each domain
and generator. Additional findings include comparison of performance against
each adversarial method, length of input texts and characteristics of generated
texts compared to the original human authored texts.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:29:30 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Kadiyala",
"Ram Mohan Rao",
""
],
[
"Pullakhandam",
"Siddartha",
""
],
[
"Mehreen",
"Kanwal",
""
],
[
"Sharma",
"Drishti",
""
],
[
"Gupta",
"Siddhant",
""
],
[
"Purbey",
"Jebish",
""
],
[
"Srivastava",
"Ashay",
""
],
[
"TippaReddy",
"Subhasya",
""
],
[
"Bobbili",
"Arvind Reddy",
""
],
[
"Chandrashekhar",
"Suraj Telugara",
""
],
[
"Adeeb",
"Modabbir",
""
],
[
"Vura",
"Srinadh",
""
],
[
"Farooq",
"Hamza",
""
]
] |
2504.11953 | Daiqi Liu | Daiqi Liu, Fuxin Fan, Andreas Maier | Novel-view X-ray Projection Synthesis through Geometry-Integrated Deep
Learning | 6 pages, 3 figures, 1 table | null | null | null | eess.IV cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | X-ray imaging plays a crucial role in the medical field, providing essential
insights into the internal anatomy of patients for diagnostics, image-guided
procedures, and clinical decision-making. Traditional techniques often require
multiple X-ray projections from various angles to obtain a comprehensive view,
leading to increased radiation exposure and more complex clinical processes.
This paper explores an innovative approach using the DL-GIPS model, which
synthesizes X-ray projections from new viewpoints by leveraging a single
existing projection. The model strategically manipulates geometry and texture
features extracted from an initial projection to match new viewing angles. It
then synthesizes the final projection by merging these modified geometry
features with consistent texture information through an advanced image
generation process. We demonstrate the effectiveness and broad applicability of
the DL-GIPS framework through lung imaging examples, highlighting its potential
to revolutionize stereoscopic and volumetric imaging by minimizing the need for
extensive data acquisition.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:30:08 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Liu",
"Daiqi",
""
],
[
"Fan",
"Fuxin",
""
],
[
"Maier",
"Andreas",
""
]
] |
2504.11954 | Sufen Guo | Sufen Guo, Mikhail Kovalev, Jiao Li, Guoliang Lu, Shi Jia, Zhenwei Li,
Jiangdan Li, Jianping Xiong, Mingkuan Yang, Tongyu He, Xuefei Chen, and
Zhanwen Han | Orbital Parameters of 665 Double-lined Spectroscopic Binaries in the
LAMOST Medium-Resolution Survey | Accepted for publication in ApJSS, 18 pages, 13 figures | null | null | null | astro-ph.SR astro-ph.GA | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The period, mass ratio, eccentricity, and other orbital parameters are
fundamental for investigating binary star evolution. However, the number of
binaries with known orbital parameters remains limited. Utilizing the
LAMOST-MRS survey, we derived orbital solutions for 665 SB2 binaries by fitting
the radial velocities of 1119 SB2 systems with at least six observations,
employing a modified version of Thejoker optimized for SB2 binaries. To ensure
the reliability of the results, four selection criteria were applied: reduced
chi-square, normalized mean absolute error, maximum phase gap, and RV
distribution metric. After applying these criteria, 665 reliable orbits were
retained. Comparison with Kepler, TESS, and ZTF light curve data shows
excellent agreement, with discrepancies in some cases attributed to shorter
pulsation periods observed in light curves. Additionally, good consistency is
found between our periods and those of SB1 systems in Gaia data. These orbital
solutions contribute to understanding binary star evolution and the statistical
properties of binary populations.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:30:46 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Guo",
"Sufen",
""
],
[
"Kovalev",
"Mikhail",
""
],
[
"Li",
"Jiao",
""
],
[
"Lu",
"Guoliang",
""
],
[
"Jia",
"Shi",
""
],
[
"Li",
"Zhenwei",
""
],
[
"Li",
"Jiangdan",
""
],
[
"Xiong",
"Jianping",
""
],
[
"Yang",
"Mingkuan",
""
],
[
"He",
"Tongyu",
""
],
[
"Chen",
"Xuefei",
""
],
[
"Han",
"Zhanwen",
""
]
] |
2504.11955 | Julio Cesar Fabris | J\'ulio C. Fabris, Luiz Filipe Guimar\~aes, Nelson Pinto-Neto and
Mahamadou Hamani Daouda | Revisiting Unimodular Quantum Cosmology | Latex file, 14 pages | null | null | null | gr-qc hep-th | http://creativecommons.org/licenses/by/4.0/ | The quantization of unimodular gravity in minisuperspace leads to a time
evolution of states generated by the Hamiltonian, as in usual quantum
mechanics. We revisit the analysis made in Ref. \cite{unruh}, extending it to
phantom scalar fields. It is argued that only in this case a non-trivial
evolution for the scalar field can be obtained. The behavior of the scale
factor presents a bounce followed by a de Sitter expansion, reproducing the
quantum cosmological scenario in General Relativity when the source is given by
a cosmological term described by the Schutz variable. The analysis is extended
to the Brans-Dicke scalar tensor theory.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:31:35 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Fabris",
"Júlio C.",
""
],
[
"Guimarães",
"Luiz Filipe",
""
],
[
"Pinto-Neto",
"Nelson",
""
],
[
"Daouda",
"Mahamadou Hamani",
""
]
] |
2504.11956 | Yang Zhang | Yang Zhang and Xuan Ye | The Conserved Effective Stress Tensor of Gravitational Wave | 41 pages, 2 figures, submitted, | null | null | null | gr-qc | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We present a detailed study of the effective stress tensor of gravitational
wave (GW) as the source for the background Einstein equation and examine three
candidates in literature. The second order perturbed Einstein tensor
$G^{(2)}_{\mu\nu}$, up to a coefficient, proposed by Brill, Hartle, and
Isaacson, has long been known to be covariantly nonconserved with respect to
the background spacetime. We observe that $G^{(2)}_{\mu\nu}$ is not a true
tensor on the background spacetime. More importantly, we find that, by
expressing $G^{(2)}_{\mu\nu}$ in terms of the perturbed Hilbert-Einstein
actions,
the nonconserved part of $G^{(2)}_{\mu\nu}$ is actually canceled out by the
perturbed fluid stress tensors in the back-reaction equation, or is vanishing
in absence of fluid. The remaining part of $G^{(2)}_{\mu\nu}$ is just the
conserved effective stress tensor $\tau_{\mu\nu}$ proposed by Ford and Parker.
As the main result, we derive $\tau_{\mu\nu}$ for a general curved spacetime by
varying the GW action and show its conservation using the equation of GW. The
stress tensor $T_{\text{MT}}^{\mu\nu}$ proposed by MacCallum and Taub was based
on an action $J_2$. We derive $T_{\text{MT}}^{\mu\nu}$ and find that it is
nonconserved, and that $J_2$ does not give the correct GW equation in presence
of matter. The difficulty with $J_2$ is due to a background Ricci tensor term,
which should be also canceled out by the fluid term or vanishing in absence of
fluid. We also demonstrate these three candidates in a flat Robertson-Walker
spacetime. The conserved $\tau_{\mu\nu}$ has a positive energy density
spectrum, and is adequate for the back-reaction in a perturbation scheme, while
the two nonconserved stress tensors have a negative spectrum at long
wavelengths and are unphysical.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:38:43 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zhang",
"Yang",
""
],
[
"Ye",
"Xuan",
""
]
] |
2504.11957 | Huihui Qin | Hui-Hui Qin, Shao-Shuai Zhao and Shao-Ming Fei | Unconditional robustness of multipartite entanglement of superposition | null | Quantum Information Processing (2025) 24-107 | 10.1007/s-11128-025-04720-x | null | quant-ph | http://creativecommons.org/licenses/by-sa/4.0/ | We study the robustness of genuine multipartite entanglement and
inseparability of multipartite pure states under superposition with product
pure states. We introduce the concept of the maximal and the minimal Schmidt
ranks for multipartite states. From the minimal Schmidt rank of the first order
we present criterion of verifying unconditional robustness of genuine
multipartite entanglement of multipartite pure states under superposition with
product pure states. By the maximal Schmidt rank of the first order we verify
the unconditional robustness of multipartite inseparability under superposition
with product pure states. The number of product states superposed to a given
entangled state which result in a separable state is investigated in detail.
Furthermore, the minimal Schmidt ranks of the second order are also introduced
to identify the unconditional robustness of an entangled state for tripartite
inseparability.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:40:31 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Qin",
"Hui-Hui",
""
],
[
"Zhao",
"Shao-Shuai",
""
],
[
"Fei",
"Shao-Ming",
""
]
] |
2504.11958 | Christopher Townsend | Christopher Townsend and Maria M. Seron | Initial Condition Independent Stabilisability of Switched Affine Systems | 6 pages, 2 figures | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have previously demonstrated that a switched affine system is stabilisable
independently of the initial condition, i.e. there exists an asymptotically
stabilising switching function which is the same for all initial conditions, if
and only if there exists a stable convex combination of the sub-system
matrices. This result was proven by constructing a stabilising switching
function of unbounded switching frequency. The current paper proves that there
exists a switching function with bounded switching frequency which stabilises a
switched affine system independent of its initial condition.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:41:06 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Townsend",
"Christopher",
""
],
[
"Seron",
"Maria M.",
""
]
] |
2504.11959 | Joachim Deutscher | Joachim Deutscher and Tarik Enderes | A Koopman Operator Approach to Data-Driven Control of Semilinear
Parabolic Systems | 8 pages, 3 figures | null | null | null | eess.SY cs.SY | http://creativecommons.org/licenses/by/4.0/ | This paper is concerned with the data-driven stabilization of unknown
boundary controlled semilinear parabolic systems. The nonlinear dynamics of the
system are lifted using a finite number of eigenfunctionals of the Koopman
operator related to the autonomous semilinear PDE. This results in a novel
data-driven finite-dimensional model of the lifted dynamics, which is amenable
to apply design procedures for finite-dimensional systems to stabilize the
semilinear parabolic system. In order to facilitate this, a bilinearization of
the lifted dynamics is considered and feedback linearization is applied for the
data-driven stabilization of the semilinear parabolic PDE. This reveals a novel
connection between the assignment of eigenfunctionals to the closed-loop
Koopman operator and feedback linearization. By making use of a modal
representation, exponential stability of the closed-loop system in the presence
of errors resulting from the data-driven computation of eigenfunctionals and
the bilinearization is verified. The data-driven controller directly follows
from applying generalized eDMD to state data available for the semilinear
parabolic PDE. An example of an unstable semilinear reaction-diffusion system
with finite-time blow up demonstrates the novel data-driven stabilization
approach.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:41:45 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Deutscher",
"Joachim",
""
],
[
"Enderes",
"Tarik",
""
]
] |
2504.11960 | Kirill Vedenev | Kirill Vedenev | On Codes from Split Metacyclic Groups | null | null | null | null | cs.IT math.IT math.RA | http://creativecommons.org/licenses/by/4.0/ | The paper presents a comprehensive study of group codes from non-abelian
split metacyclic group algebras. We derive an explicit Wedderburn-like
decomposition of finite split metacyclic group algebras over fields with
characteristic coprime to the group order. Utilizing this decomposition, we
develop a systematic theory of metacyclic codes, providing their algebraic
description and proving that they can be viewed as generalized concatenated
codes with cyclic inner codes and skew quasi-cyclic outer codes. We establish
bounds on the minimum distance of metacyclic codes and investigate the class of
induced codes. Furthermore, we show the feasibility of constructing a partial
key-recovery attack against certain McEliece-type cryptosystems based on
metacyclic codes by exploiting their generalized concatenated structure.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:43:23 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Vedenev",
"Kirill",
""
]
] |
2504.11961 | Hideaki Takahashi | Hideaki Takahashi, Jihwan Kim, Suman Jana, Junfeng Yang | zkFuzz: Foundation and Framework for Effective Fuzzing of Zero-Knowledge
Circuits | null | null | null | null | cs.CR cs.SE | http://creativecommons.org/licenses/by/4.0/ | Zero-knowledge (ZK) circuits enable privacy-preserving computations and are
central to many cryptographic protocols. Systems like Circom simplify ZK
development by combining witness computation and circuit constraints in one
program. However, even small errors can compromise security of ZK programs
--under-constrained circuits may accept invalid witnesses, while
over-constrained ones may reject valid ones. Static analyzers are often
imprecise with high false positives, and formal tools struggle with real-world
circuit scale. Additionally, existing tools overlook several critical
behaviors, such as intermediate computations and program aborts, and thus miss
many vulnerabilities.
Our theoretical contribution is the Trace-Constraint Consistency Test (TCCT),
a foundational language-independent formulation of ZK circuit bugs that defines
bugs as discrepancies between the execution traces of the computation and the
circuit constraints. TCCT captures both intermediate computations and program
aborts, detecting bugs that elude prior tools.
Our systems contribution is zkFuzz, a novel program mutation-based fuzzing
framework for detecting TCCT violations. zkFuzz systematically mutates the
computational logic of Zk programs guided by a novel fitness function, and
injects carefully crafted inputs using tailored heuristics to expose bugs. We
evaluated zkFuzz on 354 real-world ZK circuits written in Circom, a leading
programming system for ZK development. zkFuzz successfully identified 66 bugs,
including 38 zero-days --18 of which were confirmed by developers and 6 fixed,
earning bug bounties.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:43:48 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Takahashi",
"Hideaki",
""
],
[
"Kim",
"Jihwan",
""
],
[
"Jana",
"Suman",
""
],
[
"Yang",
"Junfeng",
""
]
] |
2504.11962 | Xiaoru Yi | Xiaoru Yi and Junqing Chen | Curvilinear Mask Optimization for Inverse Lithography Based on B-splines
and Delaunay Triangulation | null | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a novel gradient-based method to optimize
curvilinear masks in optical lithography. The mask pattern is represented by
periodic B-spline curves. We apply Delaunay triangulation to discretize the
domains circled by the spline curves. Subsequently, we establish an explicit
relationship between the integral points and the control points of the boundary
spline curve. Based on the relationship, we derive explicit formulas of the
gradient of the optimization objective function with respect to the coordinates
of the control points. Then we propose an inverse lithography algorithm to
optimize the curvilinear mask pattern. Finally, the results of the numerical
experiments demonstrate the feasibility and extensive adaptability of our
method.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:44:02 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Yi",
"Xiaoru",
""
],
[
"Chen",
"Junqing",
""
]
] |
2504.11963 | Lukasz Swiderski | Lukasz Adamowski, Martyna Grodzicka-Kobylka, Tomasz Szczesniak,
Agnieszka Syntfeld-Ka\.zuch, Lukasz Swiderski, Adam Kisiel | Advantages of off-line analysis of digitally recorded pulses in case of
neutron-gamma discrimination in scintillators | null | null | null | null | physics.ins-det | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Many modern digital analyzers offer the ability to record raw pulses from
ionizing radiation detectors. We use this opportunity to investigate the
effectiveness of Charge Comparison Method in Pulse Shape Discrimination of
neutron and gamma radiation measured with organic glass scintillator and
trans-stilbene. The idea of software for automated off-line analysis of
digitally recorded data is briefly described. We discuss the difference between
Leading Edge and Constant Fraction Discrimination triggering methods and we
propose triggering on pulse maximum as an alternative. We observe that the
starting point of charge integration gates has major impact on Figure of Merit
values, therefore it is important to choose it carefully and report it with
other Charge Comparison Method parameters to keep comparison between
scintillators reliable. Figure of Merit has a limited usage, so Relative Height
of Minimum is proposed as an additional indicator of neutron-gamma
discrimination effectiveness in practical applications.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:53:42 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Adamowski",
"Lukasz",
""
],
[
"Grodzicka-Kobylka",
"Martyna",
""
],
[
"Szczesniak",
"Tomasz",
""
],
[
"Syntfeld-Każuch",
"Agnieszka",
""
],
[
"Swiderski",
"Lukasz",
""
],
[
"Kisiel",
"Adam",
""
]
] |
2504.11964 | Rujiang Li | Rujiang Li, Wencai Wang, Xiangyu Kong, Ce Shang, Yongtao Jia, Gui-Geng
Liu, Ying Liu, and Baile Zhang | Self-induced topological edge states in a lattice with onsite
nonlinearity | null | null | null | null | physics.optics nlin.PS | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Topological edge states typically arise at the boundaries of topologically
nontrivial structures or at interfaces between regions with differing
topological invariants. When topological systems are extended into the
nonlinear regime, linear topological edge states bifurcate into nonlinear
counterparts, and topological gap solitons emerge in the bulk of the
structures. Despite extensive studies of these two types of nonlinear states,
self-induced topological edge states localized at the physical boundaries of
originally nontopological structures remain underexplored. Unlike the
previously reported self-induced topological transitions driven by nonlinear
couplings, which are conceptually straightforward but less common in realistic
interacting systems, here we experimentally realize self-induced topological
edge states in a lattice with onsite nonlinearity. Leveraging the strong and
tunable nonlinearity of electrical circuits, we systematically investigate the
localized states in a nonlinear Su-Schrieffer-Heeger model. Besides revisiting
the nonlinear topological edge states and topological gap solitons, we uncover
a novel type of self-induced topological edge states which exhibit the hallmark
features of linear topological edge states, including sublattice polarization,
phase jumps, and decaying tails that approach zero. A distinctive feature of
these states is the boundary-induced power threshold for existence. Our results
are broadly applicable and can be readily extended to photonic and cold atomic
systems, where onsite nonlinearities naturally arise from interparticle
interactions. Our work unveils new opportunities for exploring novel correlated
topological states of light and matter, and paves the way for the development
of robust photonic devices and topological quantum computation.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:54:56 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Li",
"Rujiang",
""
],
[
"Wang",
"Wencai",
""
],
[
"Kong",
"Xiangyu",
""
],
[
"Shang",
"Ce",
""
],
[
"Jia",
"Yongtao",
""
],
[
"Liu",
"Gui-Geng",
""
],
[
"Liu",
"Ying",
""
],
[
"Zhang",
"Baile",
""
]
] |
2504.11965 | Tao Wang | T. Wang, Y. Ma, Z. Li, Y. Li, Z. Tu, Y. Zhang, G. Xu, S. Baland, S.
Xiang, Y. Hao | Mode locking via delayed orthogonal-polarization reinjection in
semiconductor lasers | null | null | null | null | physics.optics | http://creativecommons.org/licenses/by/4.0/ | We demonstrate harmonic mode-locking in a semiconductor laser using
orthogonal-polarization reinjection via an external ring cavity integrated with
a rotatable $\lambda$/2-plate. By tuning the plate angle $\theta$, we achieve
precise control over pulse multiplicity and repetition rates in orthogonal
TE/TM modes. For the TE mode, increasing $\theta$ transitions the system from
low amplitude and disordered quasi-periodic states to fundamental
(single-pulse) mode locking and harmonic dual-pulse regimes. Polarization
resolved measurements and cross-correlation analyses reveal
polarization-mediated dynamics, achieving coherent pulse alignment at half the
cavity roundtrip time. This work establishes orthogonal polarization feedback
as a compact, versatile mechanism for tailoring ultrafast pulse trains,
enabling applications in polarization-multiplexed communications, dual-comb
spectroscopy, and high-repetition-rate photonic systems.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:55:08 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wang",
"T.",
""
],
[
"Ma",
"Y.",
""
],
[
"Li",
"Z.",
""
],
[
"Li",
"Y.",
""
],
[
"Tu",
"Z.",
""
],
[
"Zhang",
"Y.",
""
],
[
"Xu",
"G.",
""
],
[
"Baland",
"S.",
""
],
[
"Xiang",
"S.",
""
],
[
"Hao",
"Y.",
""
]
] |
2504.11966 | Kailun Yang | Linjuan Fan, Di Wen, Kunyu Peng, Kailun Yang, Jiaming Zhang, Ruiping
Liu, Yufan Chen, Junwei Zheng, Jiamin Wu, Xudong Han, Rainer Stiefelhagen | Exploring Video-Based Driver Activity Recognition under Noisy Labels | The source code is available at
https://github.com/ilonafan/DAR-noisy-labels | null | null | null | cs.CV cs.LG cs.RO eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As an open research topic in the field of deep learning, learning with noisy
labels has attracted much attention and grown rapidly over the past ten years.
Learning with label noise is crucial for driver distraction behavior
recognition, as real-world video data often contains mislabeled samples,
impacting model reliability and performance. However, label noise learning is
barely explored in the driver activity recognition field. In this paper, we
propose the first label noise learning approach for the driver activity
recognition task. Based on the cluster assumption, we initially enable the
model to learn clustering-friendly low-dimensional representations from given
videos and assign the resultant embeddings into clusters. We subsequently
perform co-refinement within each cluster to smooth the classifier outputs.
Furthermore, we propose a flexible sample selection strategy that combines two
selection criteria without relying on any hyperparameters to filter clean
samples from the training dataset. We also incorporate a self-adaptive
parameter into the sample selection process to enforce balancing across
classes. A comprehensive variety of experiments on the public Drive&Act dataset
for all granularity levels demonstrates the superior performance of our method
in comparison with other label-denoising methods derived from the image
classification field. The source code is available at
https://github.com/ilonafan/DAR-noisy-labels.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:55:13 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Fan",
"Linjuan",
""
],
[
"Wen",
"Di",
""
],
[
"Peng",
"Kunyu",
""
],
[
"Yang",
"Kailun",
""
],
[
"Zhang",
"Jiaming",
""
],
[
"Liu",
"Ruiping",
""
],
[
"Chen",
"Yufan",
""
],
[
"Zheng",
"Junwei",
""
],
[
"Wu",
"Jiamin",
""
],
[
"Han",
"Xudong",
""
],
[
"Stiefelhagen",
"Rainer",
""
]
] |
2504.11969 | Tania Robens | Tania Robens | Extended scalar sectors from all angles -- Mostly at lepton colliders | 11 pages, 7 figures, contribution to Proceedings of the Corfu Summer
Institute 2024 "School and Workshops on Elementary Particle Physics and
Gravity" (CORFU2024) 12 - 26 May, and 25 August - 27 September, 2024, Corfu,
Greece | null | null | RBI-ThPhys-2025-20, CERN-TH-2025-028 | hep-ph | http://creativecommons.org/licenses/by/4.0/ | I briefly discuss the current state of the art for models with extended
scalar sectors and give examples for corresponding investigations, with a focus
on processes at lepton colliders.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:02:32 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Robens",
"Tania",
""
]
] |
2504.11970 | Sosei Ikeda | Sosei Ikeda, Hiromitsu Awano, and Takashi Sato | Online Training and Inference System on Edge FPGA Using Delayed Feedback
Reservoir | null | null | 10.1109/TCAD.2025.3541565 | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A delayed feedback reservoir (DFR) is a hardwarefriendly reservoir computing
system. Implementing DFRs in embedded hardware requires efficient online
training. However, two main challenges prevent this: hyperparameter selection,
which is typically done by offline grid search, and training of the output
linear layer, which is memory-intensive. This paper introduces a fast and
accurate parameter optimization method for the reservoir layer utilizing
backpropagation and gradient descent by adopting a modular DFR model. A
truncated backpropagation strategy is proposed to reduce memory consumption
associated with the expansion of the recursive structure while maintaining
accuracy. The computation time is significantly reduced compared to grid
search. Additionally, an in-place Ridge regression for the output layer via 1-D
Cholesky decomposition is presented, reducing memory usage to be 1/4. These
methods enable the realization of an online edge training and inference system
of DFR on an FPGA, reducing computation time by about 1/13 and power
consumption by about 1/27 compared to software implementation on the same
board.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:03:56 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ikeda",
"Sosei",
""
],
[
"Awano",
"Hiromitsu",
""
],
[
"Sato",
"Takashi",
""
]
] |
2504.11971 | Virinchi Rallabhandi | Virinchi Rallabhandi | Spinorial quasilocal mass for spacetimes with negative cosmological
constant | 35 pages, 1 figure | null | null | null | gr-qc hep-th math.DG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new notion of quasilocal mass is defined for generic, compact, two
dimensional, spacelike surfaces in four dimensional spacetimes with negative
cosmological constant. The definition is spinorial and based on work for
vanishing cosmological constant by Penrose and Dougan & Mason. Furthermore,
this mass is non-negative, equal to the Misner-Sharp mass in spherical
symmetry, equal to zero for every generic surface in AdS, has an appropriate
form for gravity linearised about AdS and has an appropriate limit for large
spheres in asymptotically AdS spacetimes.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:07:23 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Rallabhandi",
"Virinchi",
""
]
] |
2504.11972 | Xanh Ho Thi | Xanh Ho, Jiahao Huang, Florian Boudin, and Akiko Aizawa | LLM-as-a-Judge: Reassessing the Performance of LLMs in Extractive QA | 17 pages; code and data are available at
https://github.com/Alab-NII/llm-judge-extract-qa | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Extractive reading comprehension question answering (QA) datasets are
typically evaluated using Exact Match (EM) and F1-score, but these metrics
often fail to fully capture model performance. With the success of large
language models (LLMs), they have been employed in various tasks, including
serving as judges (LLM-as-a-judge). In this paper, we reassess the performance
of QA models using LLM-as-a-judge across four reading comprehension QA
datasets. We examine different families of LLMs and various answer types to
evaluate the effectiveness of LLM-as-a-judge in these tasks. Our results show
that LLM-as-a-judge is highly correlated with human judgments and can replace
traditional EM/F1 metrics. By using LLM-as-a-judge, the correlation with human
judgments improves significantly, from 0.17 (EM) and 0.36 (F1-score) to 0.85.
These findings confirm that EM and F1 metrics underestimate the true
performance of the QA models. While LLM-as-a-judge is not perfect for more
difficult answer types (e.g., job), it still outperforms EM/F1, and we observe
no bias issues, such as self-preference, when the same model is used for both
the QA and judgment tasks.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:08:46 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ho",
"Xanh",
""
],
[
"Huang",
"Jiahao",
""
],
[
"Boudin",
"Florian",
""
],
[
"Aizawa",
"Akiko",
""
]
] |
2504.11973 | Supriya Pan | Weiqiang Yang, Supriya Pan, Eleonora Di Valentino, Olga Mena, David F.
Mota, Subenoy Chakraborty | Probing the cold nature of dark matter | 16 pages including references, 4 figures and 5 tables; accepted by
Phys. Rev. D | null | null | null | astro-ph.CO gr-qc | http://creativecommons.org/licenses/by/4.0/ | A pressureless dark matter component fits well with several cosmological
observations. However, there are indications that cold dark matter may
encounter challenges in explaining observations at small scales, particularly
at galactic scales. Observational data suggest that dark matter models
incorporating a pressure component could provide solutions to these small-scale
problems. In this work, we investigate the possibility that present-day dark
matter may result from a decaying non-cold dark matter sector transitioning
into the dark energy sector. As the sensitivity of astronomical surveys rapidly
increases, we explore an interacting scenario between dark energy and non-cold
dark matter, where dark energy has a constant equation of state ($w_{\rm de}$),
and dark matter, being non-cold, also has a constant (non-zero) equation of
state ($w_{\rm dm}$). Considering the phantom and quintessence nature of dark
energy, characterized by its equation of state, we separately analyze
interacting phantom and interacting quintessence scenarios. We constrain these
scenarios using Cosmic Microwave Background (CMB) measurements and their
combination with external probes, such as DESI-BAO and PantheonPlus. From our
analyses, we find that a very mild preference for non-cold dark matter cannot
be excluded based on the employed datasets. Additionally, for some datasets,
there is a pronounced preference for the presence of an interaction at more
than 95\% confidence level (CL). Moreover, when the dark energy equation of
state lies in the phantom regime, the $S_8$ tension can be alleviated. This
study suggests that cosmological models incorporating a non-cold dark matter
component should be considered as viable scenarios with novel phenomenological
implications, as reflected in the present work.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:10:56 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Yang",
"Weiqiang",
""
],
[
"Pan",
"Supriya",
""
],
[
"Di Valentino",
"Eleonora",
""
],
[
"Mena",
"Olga",
""
],
[
"Mota",
"David F.",
""
],
[
"Chakraborty",
"Subenoy",
""
]
] |
2504.11974 | Juliane Jarke | Felicitas Macgilchrist and Juliane Jarke | Who Said Only Military Officers Can Deal with Uncertainty? On the
Importance of Uncertainty in EdTech Data Visualisations | 20 pages, 12 figures | Discourse: Studies in the Cultural Politics of Education, 1-20
(2025) | 10.1080/01596306.2025.2467365 | null | cs.HC cs.CY | http://creativecommons.org/licenses/by-nc-sa/4.0/ | AI-powered predictive systems have high margins of error. However, data
visualisations of algorithmic systems in education and other social fields tend
to visualise certainty, thus invisibilising the underlying approximations and
uncertainties of the algorithmic systems and the social settings in which these
systems operate. This paper draws on a critical speculative approach to first
analyse data visualisations from predictive analytics platforms for education.
It demonstrates that visualisations of uncertainty in education are rare.
Second, the paper explores uncertainty visualisations in other fields (defence,
climate change and healthcare). The paper concludes by reflecting on the role
of data visualisations and un/certainty in shaping educational futures. It also
identifies practical implications for the design of data visualisations in
education.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:11:33 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Macgilchrist",
"Felicitas",
""
],
[
"Jarke",
"Juliane",
""
]
] |
2504.11975 | Ra\'ul V\'azquez | Ra\'ul V\'azquez and Timothee Mickus and Elaine Zosa and Teemu Vahtola
and J\"org Tiedemann and Aman Sinha and Vincent Segonne and Fernando
S\'anchez-Vega and Alessandro Raganato and Jind\v{r}ich Libovick\'y and Jussi
Karlgren and Shaoxiong Ji and Jind\v{r}ich Helcl and Liane Guillou and Ona de
Gibert and Jaione Bengoetxea and Joseph Attieh and Marianna Apidianaki | SemEval-2025 Task 3: Mu-SHROOM, the Multilingual Shared Task on
Hallucinations and Related Observable Overgeneration Mistakes | Mu-SHROOM is part of SemEval-2025 (Task 3). TBP: Proceedings of the
19th International Workshop on Semantic Evaluation (SemEval-2025) | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-sa/4.0/ | We present the Mu-SHROOM shared task which is focused on detecting
hallucinations and other overgeneration mistakes in the output of
instruction-tuned large language models (LLMs). Mu-SHROOM addresses
general-purpose LLMs in 14 languages, and frames the hallucination detection
problem as a span-labeling task. We received 2,618 submissions from 43
participating teams employing diverse methodologies. The large number of
submissions underscores the interest of the community in hallucination
detection. We present the results of the participating systems and conduct an
empirical analysis to identify key factors contributing to strong performance
in this task. We also emphasize relevant current challenges, notably the
varying degree of hallucinations across languages and the high annotator
disagreement when labeling hallucination spans.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:15:26 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Vázquez",
"Raúl",
""
],
[
"Mickus",
"Timothee",
""
],
[
"Zosa",
"Elaine",
""
],
[
"Vahtola",
"Teemu",
""
],
[
"Tiedemann",
"Jörg",
""
],
[
"Sinha",
"Aman",
""
],
[
"Segonne",
"Vincent",
""
],
[
"Sánchez-Vega",
"Fernando",
""
],
[
"Raganato",
"Alessandro",
""
],
[
"Libovický",
"Jindřich",
""
],
[
"Karlgren",
"Jussi",
""
],
[
"Ji",
"Shaoxiong",
""
],
[
"Helcl",
"Jindřich",
""
],
[
"Guillou",
"Liane",
""
],
[
"de Gibert",
"Ona",
""
],
[
"Bengoetxea",
"Jaione",
""
],
[
"Attieh",
"Joseph",
""
],
[
"Apidianaki",
"Marianna",
""
]
] |
2504.11976 | Jamie M. Taylor | Jamie M. Taylor, David Pardo | Stochastic Quadrature Rules for Solving PDEs using Neural Networks | null | null | null | null | math.NA cs.NA | http://creativecommons.org/licenses/by/4.0/ | In this article, we consider issues surrounding integration when using Neural
Networks to solve Partial Differential Equations. We focus on the Deep Ritz
Method as it is of practical interest and sensitive to integration errors. We
show how both deterministic integration rules as well as biased, stochastic
quadrature can lead to erroneous results, whilst high order, unbiased
stochastic quadrature rules on integration meshes can significantly improve
convergence at an equivalent computational cost. Furthermore, we propose novel
stochastic quadrature rules for triangular and tetrahedral elements, offering
greater flexibility when designing integration meshes in more complex
geometries. We highlight how the variance in the stochastic gradient limits
convergence, whilst quadrature rules designed to give similar errors when
integrating the loss function may lead to disparate results when employed in a
gradient-based optimiser.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:15:38 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Taylor",
"Jamie M.",
""
],
[
"Pardo",
"David",
""
]
] |
2504.11977 | Fabian Schmidt | Sofia Krylova, Fabian Schmidt, Vladimir Vlassov | Leveraging Machine Learning Models to Predict the Outcome of Digital
Medical Triage Interviews | 8 pages, 4 figures, 8 tables | null | 10.1109/ICMLA61862.2024.00028 | null | cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Many existing digital triage systems are questionnaire-based, guiding
patients to appropriate care levels based on information (e.g., symptoms,
medical history, and urgency) provided by the patients answering
questionnaires. Such a system often uses a deterministic model with predefined
rules to determine care levels. It faces challenges with incomplete triage
interviews since it can only assist patients who finish the process. In this
study, we explore the use of machine learning (ML) to predict outcomes of
unfinished interviews, aiming to enhance patient care and service quality.
Predicting triage outcomes from incomplete data is crucial for patient safety
and healthcare efficiency. Our findings show that decision-tree models,
particularly LGBMClassifier and CatBoostClassifier, achieve over 80\% accuracy
in predicting outcomes from complete interviews while having a linear
correlation between the prediction accuracy and interview completeness degree.
For example, LGBMClassifier achieves 88,2\% prediction accuracy for interviews
with 100\% completeness, 79,6\% accuracy for interviews with 80\% completeness,
58,9\% accuracy for 60\% completeness, and 45,7\% accuracy for 40\%
completeness. The TabTransformer model demonstrated exceptional accuracy of
over 80\% for all degrees of completeness but required extensive training time,
indicating a need for more powerful computational resources. The study
highlights the linear correlation between interview completeness and predictive
power of the decision-tree models.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:17:23 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Krylova",
"Sofia",
""
],
[
"Schmidt",
"Fabian",
""
],
[
"Vlassov",
"Vladimir",
""
]
] |
2504.11978 | Tobias Boege | Tobias Boege | On the Intersection and Composition properties of conditional
independence | 12 pages; submitted to WUPES '25 | null | null | null | cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compositional graphoids are fundamental discrete structures which appear in
probabilistic reasoning, particularly in the area of graphical models. They are
semigraphoids which satisfy the Intersection and Composition properties. These
important properties, however, are not enjoyed by general probability
distributions. We survey what is known in terms of sufficient conditions for
Intersection and Composition and derive a set of new sufficient conditions in
the context of discrete random variables based on conditional information
inequalities for Shannon entropies.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:17:41 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Boege",
"Tobias",
""
]
] |
2504.11979 | Tobias Lindhardt Overgaard | Andreas Basse-O'Connor and Tobias Lindhardt Overgaard and Mette
Skj{\o}tt | On the Regularity of Random 2-SAT and 3-SAT | null | null | null | null | math.PR cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the random $k$-SAT problem with $n$ variables, $m=m(n)$ clauses,
and clause density $\alpha=\lim_{n\to\infty}m/n$ for $k=2,3$. It is known that
if $\alpha$ is small enough, then the random $k$-SAT problem admits a solution
with high probability, which we interpret as the problem being
under-constrained. In this paper, we quantify exactly how under-constrained the
random $k$-SAT problems are by determining their degrees of freedom, which we
define as the threshold for the number of variables we can fix to an arbitrary
value before the problem no longer is solvable with high probability. We show
that the random $2$-SAT and $3$-SAT problems have $n/m^{1/2}$ and $n/m^{1/3}$
degrees of freedom, respectively. Our main result is an explicit computation of
the corresponding threshold functions. Our result shows that the threshold
function for the random $2$-SAT problem is regular, while it is non-regular for
the random $3$-SAT problem. By regular, we mean continuous and analytic on the
interior of its support. This result shows that the random $3$-SAT problem is
more sensitive to small changes in the clause density $\alpha$ than the random
$2$-SAT problem.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:17:56 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Basse-O'Connor",
"Andreas",
""
],
[
"Overgaard",
"Tobias Lindhardt",
""
],
[
"Skjøtt",
"Mette",
""
]
] |
2504.11980 | Stephen D. Bartlett | Nicholas Fazio, Robert Freund, Debankan Sannamoth, Alex Steiner,
Christian D. Marciniak, Manuel Rispler, Robin Harper, Thomas Monz, Joseph
Emerson, and Stephen D. Bartlett | Characterizing physical and logical errors in a transversal CNOT via
cycle error reconstruction | 18 pages, 8 figures, comments welcome | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | The development of prototype quantum information processors has progressed to
a stage where small instances of logical qubit systems perform better than the
best of their physical constituents. Advancing towards fault-tolerant quantum
computing will require an understanding of the underlying error mechanisms in
logical primitives as they relate to the performance of quantum error
correction. In this work we demonstrate the novel capability to characterize
the physical error properties relevant to fault-tolerant operations via cycle
error reconstruction. We illustrate this diagnostic capability for a
transversal CNOT, a prototypical component of quantum logical operations, in a
16-qubit register of a trapped-ion quantum computer. Our error characterization
technique offers three key capabilities: (i) identifying context-dependent
physical layer errors, enabling their mitigation; (ii) contextualizing
component gates in the environment of logical operators, validating the
performance differences in terms of characterized component-level physics, and
(iii) providing a scalable method for predicting quantum error correction
performance using pertinent error terms, differentiating correctable versus
uncorrectable physical layer errors. The methods with which our results are
obtained have scalable resource requirements that can be extended with moderate
overhead to capture overall logical performance in increasingly large and
complex systems.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:22:32 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Fazio",
"Nicholas",
""
],
[
"Freund",
"Robert",
""
],
[
"Sannamoth",
"Debankan",
""
],
[
"Steiner",
"Alex",
""
],
[
"Marciniak",
"Christian D.",
""
],
[
"Rispler",
"Manuel",
""
],
[
"Harper",
"Robin",
""
],
[
"Monz",
"Thomas",
""
],
[
"Emerson",
"Joseph",
""
],
[
"Bartlett",
"Stephen D.",
""
]
] |
2504.11981 | Sosei Ikeda | Sosei Ikeda, Hiromitsu Awano, Takashi Sato | Hardware-Friendly Delayed-Feedback Reservoir for Multivariate
Time-Series Classification | null | null | 10.1109/TCAD.2022.3197488 | null | cs.LG cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reservoir computing (RC) is attracting attention as a machine-learning
technique for edge computing. In time-series classification tasks, the number
of features obtained using a reservoir depends on the length of the input
series. Therefore, the features must be converted to a constant-length
intermediate representation (IR), such that they can be processed by an output
layer. Existing conversion methods involve computationally expensive matrix
inversion that significantly increases the circuit size and requires processing
power when implemented in hardware. In this article, we propose a simple but
effective IR, namely, dot-product-based reservoir representation (DPRR), for RC
based on the dot product of data features. Additionally, we propose a
hardware-friendly delayed-feedback reservoir (DFR) consisting of a nonlinear
element and delayed feedback loop with DPRR. The proposed DFR successfully
classified multivariate time series data that has been considered particularly
difficult to implement efficiently in hardware. In contrast to conventional DFR
models that require analog circuits, the proposed model can be implemented in a
fully digital manner suitable for high-level syntheses. A comparison with
existing machine-learning methods via field-programmable gate array
implementation using 12 multivariate time-series classification tasks confirmed
the superior accuracy and small circuit size of the proposed method.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:22:38 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ikeda",
"Sosei",
""
],
[
"Awano",
"Hiromitsu",
""
],
[
"Sato",
"Takashi",
""
]
] |
2504.11982 | Alberto Bemporad | Alberto Bemporad and Roland T\'oth | Efficient identification of linear, parameter-varying, and nonlinear
systems with noise models | 28 pages, 3 figures | null | null | null | math.OC cs.LG cs.SY eess.SY | http://creativecommons.org/licenses/by/4.0/ | We present a general system identification procedure capable of estimating of
a broad spectrum of state-space dynamical models, including linear
time-invariant (LTI), linear parameter-varying} (LPV), and nonlinear (NL)
dynamics, along with rather general classes of noise models. Similar to the LTI
case, we show that for this general class of model structures, including the NL
case, the model dynamics can be separated into a deterministic process and a
stochastic noise part, allowing to seamlessly tune the complexity of the
combined model both in terms of nonlinearity and noise modeling. We
parameterize the involved nonlinear functional relations by means of artificial
neural-networks (ANNs), although alternative parametric nonlinear mappings can
also be used. To estimate the resulting model structures, we optimize a
prediction-error-based criterion using an efficient combination of a
constrained quasi-Newton approach and automatic differentiation, achieving
training times in the order of seconds compared to existing state-of-the-art
ANN methods which may require hours for models of similar complexity. We
formally establish the consistency guarantees for the proposed approach and
demonstrate its superior estimation accuracy and computational efficiency on
several benchmark LTI, LPV, and NL system identification problems.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:23:30 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Bemporad",
"Alberto",
""
],
[
"Tóth",
"Roland",
""
]
] |
2504.11983 | Jung-Wan Ryu | Jung-Wan Ryu, Jae-Ho Han, Moon Jip Park, Hee Chul Park, Chang-Hwan Yi | Non-orientable Exceptional Points in Twisted Boundary Systems | 12. pages, 8 figures | null | null | null | physics.optics cond-mat.mes-hall quant-ph | http://creativecommons.org/licenses/by/4.0/ | Non-orientable manifolds, such as the M\"obius strip and the Klein bottle,
defy conventional geometric intuition through their twisted boundary
conditions. As a result, topological defects on non-orientable manifolds give
rise to novel physical phenomena. We study the adiabatic transport of
exceptional points (EPs) along non-orientable closed loops and uncover distinct
topological responses arising from the lack of global orientation. Notably, we
demonstrate that the cyclic permutation of eigenstates across an EP depends
sensitively on the loop orientation, yielding inequivalent braid
representations for clockwise and counterclockwise encirclement; this is a
feature unique to non-orientable geometries. Orientation-dependent geometric
quantities, such as the winding number, cannot be consistently defined due to
the absence of a global orientation. However, when a boundary is introduced,
such quantities become well defined within the local interior, even though the
global manifold remains non-orientable. We further demonstrate the adiabatic
evolution of EPs and the emergence of orientation-sensitive observables in a
Klein Brillouin zone, described by an effective non-Hermitian Hamiltonian that
preserves momentum-space glide symmetry. Finally, we numerically implement
these ideas in a microdisk cavity with embedded scatterers using synthetic
momenta.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:26:05 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ryu",
"Jung-Wan",
""
],
[
"Han",
"Jae-Ho",
""
],
[
"Park",
"Moon Jip",
""
],
[
"Park",
"Hee Chul",
""
],
[
"Yi",
"Chang-Hwan",
""
]
] |
2504.11984 | Mahdi Miraz | Md Nasiruzzaman, Maaruf Ali, Iftekhar Salam and Mahdi H. Miraz | The Evolution of Zero Trust Architecture (ZTA) from Concept to
Implementation | null | Proceedings of the 2025 International Conference on Information
Technology (IT), \v{Z}abljak, Montenegro | 10.1109/IT64745.2025.10930254 | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Zero Trust Architecture (ZTA) is one of the paradigm changes in
cybersecurity, from the traditional perimeter-based model to perimeterless.
This article studies the core concepts of ZTA, its beginning, a few use cases
and future trends. Emphasising the always verify and least privilege access,
some key tenets of ZTA have grown to be integration technologies like Identity
Management, Multi-Factor Authentication (MFA) and real-time analytics. ZTA is
expected to strengthen cloud environments, education, work environments
(including from home) while controlling other risks like lateral movement and
insider threats. Despite ZTA's benefits, it comes with challenges in the form
of complexity, performance overhead and vulnerabilities in the control plane.
These require phased implementation and continuous refinement to keep up with
evolving organisational needs and threat landscapes. Emerging technologies,
such as Artificial Intelligence (AI) and Machine Learning (ML) will further
automate policy enforcement and threat detection in keeping up with dynamic
cyber threats.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:26:54 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Nasiruzzaman",
"Md",
""
],
[
"Ali",
"Maaruf",
""
],
[
"Salam",
"Iftekhar",
""
],
[
"Miraz",
"Mahdi H.",
""
]
] |
2504.11985 | Jakub Vicha | Jakub V\'icha, Alena Bakalov\'a, Ana L. M\"uller, Olena Tkachenko,
Maximilian K. Stadelmaier | A Heavy-Metal Scenario of Ultra-High-Energy Cosmic Rays | Submitted to ApJ | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The mass composition of ultra-high-energy cosmic rays is an open problem in
astroparticle physics. It is usually inferred from the depth of the shower
maximum (Xmax) of cosmic-ray showers, which is only ambiguously determined by
modern hadronic interaction models. We examine a data-driven scenario, in which
we consider the expectation value of Xmax as a free parameter. We test the
novel hypothesis whether the cosmic-ray data from the Pierre Auger Observatory
can be interpreted in a consistent picture, under the assumption that the mass
composition of cosmic rays at the highest energies is dominated by high
metallicity, resulting in pure iron nuclei at energies above ~40 EeV. We
investigate the implications on astrophysical observations and hadronic
interactions, and we discuss the global consistency of the data assuming this
heavy-metal scenario. We conclude that the data from the Pierre Auger
Observatory can be interpreted consistently if the expectation values for Xmax
from modern hadronic interaction models are shifted to larger values.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:27:23 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Vícha",
"Jakub",
""
],
[
"Bakalová",
"Alena",
""
],
[
"Müller",
"Ana L.",
""
],
[
"Tkachenko",
"Olena",
""
],
[
"Stadelmaier",
"Maximilian K.",
""
]
] |
2504.11986 | Jos\'e Manuel Guevara-Vela | Jose Manuel Guevara-Vela | Language Models as Quasi-Crystalline Thought: Structure, Constraint, and
Emergence in Generative Systems | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This essay proposes an analogy between large language models (LLMs) and
quasicrystals: systems that exhibit global coherence without periodic
repetition and that are generated through local constraints. While LLMs are
often evaluated in terms of predictive accuracy, factuality, or alignment, this
structural perspective suggests that their most characteristic behavior is the
production of internally resonant linguistic patterns. Just as quasicrystals
forced a redefinition of order in physical systems, viewing LLMs as generators
of quasi-structured language opens new paths for evaluation and design:
privileging propagation of constraint over token-level accuracy, and coherence
of form over fixed meaning. LLM outputs should be read not only for what they
say, but for the patterns of constraint and coherence that organize them. This
shift reframes generative language as a space of emergent patterning: LLMs are
neither fully random nor strictly rule-based, but defined by a logic of
constraint, resonance, and structural depth.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:27:47 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Guevara-Vela",
"Jose Manuel",
""
]
] |
2504.11987 | Elisabeth Mayer | Elisabeth Mayer, Thomas Odaker, Dieter Kranzlm\"uller | No Fuss, Just Function -- A Proposal for Non-Intrusive Full Body
Tracking in XR for Meaningful Spatial Interactions | Presented at CHI 2025 (arXiv:2504.07475) | null | null | CHIXR/2025/07 | cs.HC | http://creativecommons.org/licenses/by/4.0/ | Extended Reality (XR) is a rapidly growing field with a wide range of
hardware from head mounted displays to installations. Users have the
possibility to access the entire Mixed Reality (MR) continuum. Goal of the
human-computer-interaction (HCI) community is to allow natural and intuitive
interactions but in general interactions for XR often rely on handheld
controllers. One natural interaction method is full body tracking (FBT), where
a user can use their body to interact with the experience. Classically, FBT
systems require markers or trackers on the users to capture motion. Recently,
there have been approaches based on Human Pose Estimation (HPE), which
highlight the potential of low-cost non-intrusive FBT for XR. Due to the lack
of handheld devices, HPE may also improve accessibility with people struggling
with traditional input methods. This paper proposes the concept of
non-intrusive FBT for XR for all. The goal is to spark a discussion on
advantages for users by using a non-intrusive FBT system for accessibility and
user experience.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:28:34 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Mayer",
"Elisabeth",
""
],
[
"Odaker",
"Thomas",
""
],
[
"Kranzlmüller",
"Dieter",
""
]
] |
2504.11988 | Victoria Knopova Ms | Denis Platonov, Victoria Knopova | Strong Convergence Rates for Euler Schemes of Levy-Driven SDE using
Dynamic Cutting | null | null | null | null | math.PR cs.NA math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We derive strong Lp convergence rates for the Euler-Maruyama schemes of
Levy-driven SDE using a new dynamic cutting (DC) method with a time-dependent
jump threshold. In addition, we present results from numerical simulations
comparing the DC and Asmussen-Rosinski (AR) approaches. These simulations
demonstrate the superior accuracy achieved by the DC method.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:29:14 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Platonov",
"Denis",
""
],
[
"Knopova",
"Victoria",
""
]
] |
2504.11989 | Andreas Alexander Buchheit | Andreas A. Buchheit and Jonathan K. Busse | Epstein zeta method for many-body lattice sums | null | null | null | null | math.NA cond-mat.mtrl-sci cond-mat.str-el cs.NA | http://creativecommons.org/licenses/by/4.0/ | Many-body interactions arise naturally in the perturbative treatment of
classical and quantum many-body systems and play a crucial role in the
description of condensed matter systems. In the case of three-body
interactions, the Axilrod-Teller-Muto (ATM) potential is highly relevant for
the quantitative prediction of material properties. The computation of the
resulting energies in d-dimensional lattice systems is challenging, as a
high-dimensional lattice sum needs to be evaluated to high precision. This work
solves this long-standing issue. We present an efficiently computable
representation of many-body lattice sums in terms of singular integrals over
products of Epstein zeta functions. For three-body interactions in 3D, this
approach reduces the runtime for computing the ATM lattice sum from weeks to
minutes. Our approach further extends to a broad class of n-body lattice sums.
We demonstrate that the computational cost of our method only increases
linearly with n, evading the exponential increase in complexity of direct
summation. The evaluation of 51-body interactions on a two-dimensional lattice,
corresponding to a 100-dimensional sum, can be performed within seconds on a
laptop. We discuss techniques for computing the arising singular integrals and
compare the accuracy of our results against computable benchmarks, achieving
full precision for exponents greater than the system dimension. Finally, we
apply our method to study the stability of a three-dimensional lattice system
with Lennard-Jones two-body interactions under the inclusion of an ATM
three-body term at finite pressure, finding a transition from the
face-centered-cubic to the body-centered-cubic lattice structure with
increasing ATM coupling strength. This work establishes the mathematical
foundation for an ongoing investigation into the influence of many-body
interactions on the stability of matter.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:30:11 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Buchheit",
"Andreas A.",
""
],
[
"Busse",
"Jonathan K.",
""
]
] |
2504.11990 | Yechao Zhang | Yechao Zhang, Yuxuan Zhou, Tianyu Li, Minghui Li, Shengshan Hu, Wei
Luo, Leo Yu Zhang | Secure Transfer Learning: Training Clean Models Against Backdoor in
(Both) Pre-trained Encoders and Downstream Datasets | To appear at IEEE Symposium on Security and Privacy 2025, 20 pages | null | null | null | cs.LG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transfer learning from pre-trained encoders has become essential in modern
machine learning, enabling efficient model adaptation across diverse tasks.
However, this combination of pre-training and downstream adaptation creates an
expanded attack surface, exposing models to sophisticated backdoor embeddings
at both the encoder and dataset levels--an area often overlooked in prior
research. Additionally, the limited computational resources typically available
to users of pre-trained encoders constrain the effectiveness of generic
backdoor defenses compared to end-to-end training from scratch. In this work,
we investigate how to mitigate potential backdoor risks in resource-constrained
transfer learning scenarios. Specifically, we conduct an exhaustive analysis of
existing defense strategies, revealing that many follow a reactive workflow
based on assumptions that do not scale to unknown threats, novel attack types,
or different training paradigms. In response, we introduce a proactive mindset
focused on identifying clean elements and propose the Trusted Core (T-Core)
Bootstrapping framework, which emphasizes the importance of pinpointing
trustworthy data and neurons to enhance model security. Our empirical
evaluations demonstrate the effectiveness and superiority of T-Core,
specifically assessing 5 encoder poisoning attacks, 7 dataset poisoning
attacks, and 14 baseline defenses across five benchmark datasets, addressing
four scenarios of 3 potential backdoor threats.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:33:03 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zhang",
"Yechao",
""
],
[
"Zhou",
"Yuxuan",
""
],
[
"Li",
"Tianyu",
""
],
[
"Li",
"Minghui",
""
],
[
"Hu",
"Shengshan",
""
],
[
"Luo",
"Wei",
""
],
[
"Zhang",
"Leo Yu",
""
]
] |
2504.11991 | Hing Tong Cho | Hing-Tong Cho and Bei-Lok Hu | Non-Markovian Quantum Master and Fokker-Planck Equation for
Gravitational Systems and Gravitational Decoherence | 65 pages | null | null | null | gr-qc cond-mat.stat-mech hep-th quant-ph | http://creativecommons.org/licenses/by/4.0/ | A quantum master equation describing the stochastic dynamics of a quantum
massive system interacting with a quantum gravitational field is useful for the
investigation of quantum gravitational and quantum informational issues such as
the quantum nature of gravity, gravity-induced entanglement and gravitational
decoherence. Studies of the decoherence of quantum systems by an
electromagnetic field shows that a lower temperature environment is more
conducive to successful quantum information processing experiments. Likewise,
the quantum nature of (perturbative) gravity is far better revealed at lower
temperatures than high, minimizing the corruptive effects of thermal noise. In
this work, generalizing earlier results of the Markovian ABH master equation
[1,2] which is valid only for high temperatures, we derive a non-Markovian
quantum master equation for the reduced density matrix, and the associated
Fokker-Planck equation for the Wigner distribution function, for the stochastic
dynamics of two masses following quantum trajectories, interacting with a
graviton field, including the effects of graviton noise, valid for all
temperatures. We follow the influence functional approach exemplified in the
derivation of the non-Markovian Hu-Paz-Zhang master equation [62,64] for
quantum Brownian motion. We find that in the low temperature limit, the
off-diagonal elements of the reduced density matrix decrease in time
logarithmically for the zero temperature part and quadratically in time for the
temperature-dependent part, which is distinctly different from the Markovian
case. We end with a summary of our findings and a discussion on how this
problem studied here is related to the quantum stochastic equation derived in
[77] for gravitational self force studies, and to quantum optomechanics where
experimental observation of gravitational decoherence and entanglement may be
implemented.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:33:23 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Cho",
"Hing-Tong",
""
],
[
"Hu",
"Bei-Lok",
""
]
] |
2504.11992 | Pascal Schlachter | Pascal Schlachter, Jonathan Fuss, Bin Yang | Analysis of Pseudo-Labeling for Online Source-Free Universal Domain
Adaptation | Submitted to the 33rd European Signal Processing Conference (EUSIPCO
2025) | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A domain (distribution) shift between training and test data often hinders
the real-world performance of deep neural networks, necessitating unsupervised
domain adaptation (UDA) to bridge this gap. Online source-free UDA has emerged
as a solution for practical scenarios where access to source data is restricted
and target data is received as a continuous stream. However, the open-world
nature of many real-world applications additionally introduces category shifts
meaning that the source and target label spaces may differ. Online source-free
universal domain adaptation (SF-UniDA) addresses this challenge. Existing
methods mainly rely on self-training with pseudo-labels, yet the relationship
between pseudo-labeling and adaptation outcomes has not been studied yet. To
bridge this gap, we conduct a systematic analysis through controlled
experiments with simulated pseudo-labeling, offering valuable insights into
pseudo-labeling for online SF-UniDA. Our findings reveal a substantial gap
between the current state-of-the-art and the upper bound of adaptation achieved
with perfect pseudo-labeling. Moreover, we show that a contrastive loss enables
effective adaptation even with moderate pseudo-label accuracy, while a
cross-entropy loss, though less robust to pseudo-label errors, achieves
superior results when pseudo-labeling approaches perfection. Lastly, our
findings indicate that pseudo-label accuracy is in general more crucial than
quantity, suggesting that prioritizing fewer but high-confidence pseudo-labels
is beneficial. Overall, our study highlights the critical role of
pseudo-labeling in (online) SF-UniDA and provides actionable insights to drive
future advancements in the field. Our code is available at
https://github.com/pascalschlachter/PLAnalysis.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:34:18 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Schlachter",
"Pascal",
""
],
[
"Fuss",
"Jonathan",
""
],
[
"Yang",
"Bin",
""
]
] |
2504.11993 | Iman Mohammed Attia Abd Elkhalik Abo Elreesh Dr. | Iman Mohamed Attia | New Three Different Generators for Constructing New Three Different
Bivariate Copulas | null | null | null | null | math.ST math.PR stat.TH | http://creativecommons.org/licenses/by/4.0/ | In this paper, the author introduces new methods to construct Archimedean
copulas. The generator of each copula fulfills the sufficient conditions as
regards the boundary and being continuous, decreasing, and convex. Each inverse
generator also fulfills the necessary conditions as regards the boundary
conditions, marginal uniformity, and 2-increasing properties. Although these
copulas satisfy these conditions, they have some limitations. They do not cover
the entire dependency spectrum, ranging from perfect negative dependency to
perfect positive dependency, passing through the independence state
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:37:27 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Attia",
"Iman Mohamed",
""
]
] |
2504.11994 | Leticia Cugliandolo | Leticia F. Cugliandolo | Introduction to Langevin Stochastic Processes | Lecture Notes | null | null | null | cond-mat.stat-mech | http://creativecommons.org/licenses/by-nc-sa/4.0/ | These lecture notes provide an introduction to Langevin processes and briefly
discuss some interesting properties and simple applications. They compile
material presented at the "School of Physics and Mathematics Without Frontiers"
(ZigZag), held at La Havana, Cuba, in March 2024, the School "Information,
Noise and Physics of Life" held at Ni\v{s}, Serbia, in June 2024, both
sponsored by ICTP, the PEBBLE summer camp at Westlake University, China, in
August 2024, the Barcelona school on "Non-equilibrium Statistical Physics", in
April 2025, and the 2012-2016 course "Out of Equilibrium Dynamics of Complex
Systems" for the Master 2 program "Physics of Complex Systems" in the Paris
area.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:38:31 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Cugliandolo",
"Leticia F.",
""
]
] |
2504.11995 | Rahima Khanam | Rahima Khanam and Muhammad Hussain | A Review of YOLOv12: Attention-Based Enhancements vs. Previous Versions | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | The YOLO (You Only Look Once) series has been a leading framework in
real-time object detection, consistently improving the balance between speed
and accuracy. However, integrating attention mechanisms into YOLO has been
challenging due to their high computational overhead. YOLOv12 introduces a
novel approach that successfully incorporates attention-based enhancements
while preserving real-time performance. This paper provides a comprehensive
review of YOLOv12's architectural innovations, including Area Attention for
computationally efficient self-attention, Residual Efficient Layer Aggregation
Networks for improved feature aggregation, and FlashAttention for optimized
memory access. Additionally, we benchmark YOLOv12 against prior YOLO versions
and competing object detectors, analyzing its improvements in accuracy,
inference speed, and computational efficiency. Through this analysis, we
demonstrate how YOLOv12 advances real-time object detection by refining the
latency-accuracy trade-off and optimizing computational resources.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:40:55 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Khanam",
"Rahima",
""
],
[
"Hussain",
"Muhammad",
""
]
] |
2504.11996 | Marcio Santos | Jaqueline de Lima, M\'arcio Santos and Joyce Sindeaux | Rigidity of Serrin-type problems via integral identities | null | null | null | null | math.DG math.AP | http://creativecommons.org/licenses/by/4.0/ | In this short note, we deal with Serrin-type problems in Riemannian
manifolds. Firstly, we provide a Soap Bubble type theorem and rigidity results.
In another direction, we obtain a rigidity result addressed to annular regions
in Einstein manifolds endowed with a conformal vector field.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:46:10 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"de Lima",
"Jaqueline",
""
],
[
"Santos",
"Márcio",
""
],
[
"Sindeaux",
"Joyce",
""
]
] |
2504.11997 | Kihyuk Hong | Kihyuk Hong, Ambuj Tewari | A Computationally Efficient Algorithm for Infinite-Horizon
Average-Reward Linear MDPs | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | We study reinforcement learning in infinite-horizon average-reward settings
with linear MDPs. Previous work addresses this problem by approximating the
average-reward setting by discounted setting and employing a value
iteration-based algorithm that uses clipping to constrain the span of the value
function for improved statistical efficiency. However, the clipping procedure
requires computing the minimum of the value function over the entire state
space, which is prohibitive since the state space in linear MDP setting can be
large or even infinite. In this paper, we introduce a value iteration method
with efficient clipping operation that only requires computing the minimum of
value functions over the set of states visited by the algorithm. Our algorithm
enjoys the same regret bound as the previous work while being computationally
efficient, with computational complexity that is independent of the size of the
state space.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:47:41 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Hong",
"Kihyuk",
""
],
[
"Tewari",
"Ambuj",
""
]
] |
2504.11998 | Suddhasattwa Brahma | Idrus Husin Belfaqih, Martin Bojowald, Suddhasattwa Brahma and Erick
I. Duque | Hawking evaporation and the fate of black holes in loop quantum gravity | 7 pages (including appendix); 3 figures | null | null | null | gr-qc hep-th | http://creativecommons.org/licenses/by/4.0/ | A recent covariant formulation, that includes non-perturbative effects from
loop quantum gravity (LQG) as self-consistent effective models, has revealed
the possibility of non-singular black hole solutions. The new framework makes
it possible to couple scalar matter to such LQG black holes and derive Hawking
radiation in the presence of quantum space-time effects while respecting
general covariance. Standard methods to derive particle production both within
the geometric optics approximation and the Parikh-Wilczek tunneling approach
are therefore available and confirm the thermal nature of Hawking radiation.
The covariant description of scale-dependent decreasing holonomy corrections
maintains Hawking temperature as well as universality of the low-energy
transmission coefficients, stating that the absorption rates are proportional
to the horizon area at leading order. Quantum-geometry effects enter the
thermal distribution only through sub-leading corrections in the greybody
factors. Nevertheless, they do impact energy emission of the black hole and its
final state in a crucial way regarding one of the main questions of black-hole
evaporation: whether a black-to-white-hole transition, or a stable remnant, is
preferred. For the first time, a first-principles derivation, based on a
discussion of backreaction, finds evidence that points to the former outcome.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:49:53 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Belfaqih",
"Idrus Husin",
""
],
[
"Bojowald",
"Martin",
""
],
[
"Brahma",
"Suddhasattwa",
""
],
[
"Duque",
"Erick I.",
""
]
] |
2504.11999 | Mengyu Wang | Mengyu Wang, Hanbo Bi, Yingchao Feng, Linlin Xin, Shuo Gong, Tianqi
Wang, Zhiyuan Yan, Peijin Wang, Wenhui Diao, and Xian Sun | A Complex-valued SAR Foundation Model Based on Physically Inspired
Representation Learning | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Vision foundation models in remote sensing have been extensively studied due
to their superior generalization on various downstream tasks. Synthetic
Aperture Radar (SAR) offers all-day, all-weather imaging capabilities,
providing significant advantages for Earth observation. However, establishing a
foundation model for SAR image interpretation inevitably encounters the
challenges of insufficient information utilization and poor interpretability.
In this paper, we propose a remote sensing foundation model based on
complex-valued SAR data, which simulates the polarimetric decomposition process
for pre-training, i.e., characterizing pixel scattering intensity as a weighted
combination of scattering bases and scattering coefficients, thereby endowing
the foundation model with physical interpretability. Specifically, we construct
a series of scattering queries, each representing an independent and meaningful
scattering basis, which interact with SAR features in the scattering query
decoder and output the corresponding scattering coefficient. To guide the
pre-training process, polarimetric decomposition loss and power
self-supervision loss are constructed. The former aligns the predicted
coefficients with Yamaguchi coefficients, while the latter reconstructs power
from the predicted coefficients and compares it to the input image's power. The
performance of our foundation model is validated on six typical downstream
tasks, achieving state-of-the-art results. Notably, the foundation model can
extract stable feature representations and exhibits strong generalization, even
in data-scarce conditions.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:51:34 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wang",
"Mengyu",
""
],
[
"Bi",
"Hanbo",
""
],
[
"Feng",
"Yingchao",
""
],
[
"Xin",
"Linlin",
""
],
[
"Gong",
"Shuo",
""
],
[
"Wang",
"Tianqi",
""
],
[
"Yan",
"Zhiyuan",
""
],
[
"Wang",
"Peijin",
""
],
[
"Diao",
"Wenhui",
""
],
[
"Sun",
"Xian",
""
]
] |
2504.12000 | Thorben Markmann | Thorben Markmann, Michiel Straat, Sebastian Peitz, Barbara Hammer | Control of Rayleigh-B\'enard Convection: Effectiveness of Reinforcement
Learning in the Turbulent Regime | null | null | null | null | physics.flu-dyn cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data-driven flow control has significant potential for industry, energy
systems, and climate science. In this work, we study the effectiveness of
Reinforcement Learning (RL) for reducing convective heat transfer in the 2D
Rayleigh-B\'enard Convection (RBC) system under increasing turbulence. We
investigate the generalizability of control across varying initial conditions
and turbulence levels and introduce a reward shaping technique to accelerate
the training. RL agents trained via single-agent Proximal Policy Optimization
(PPO) are compared to linear proportional derivative (PD) controllers from
classical control theory. The RL agents reduced convection, measured by the
Nusselt Number, by up to 33% in moderately turbulent systems and 10% in highly
turbulent settings, clearly outperforming PD control in all settings. The
agents showed strong generalization performance across different initial
conditions and to a significant extent, generalized to higher degrees of
turbulence. The reward shaping improved sample efficiency and consistently
stabilized the Nusselt Number to higher turbulence levels.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:51:59 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Markmann",
"Thorben",
""
],
[
"Straat",
"Michiel",
""
],
[
"Peitz",
"Sebastian",
""
],
[
"Hammer",
"Barbara",
""
]
] |
2504.12001 | Shiwei Bai | S. W. Bai, X. F. Yang, \'A. Koszor\'us, J. C. Berengut, J. Billowes,
M. L. Bissell, K. Blaum, A. Borschevsky, P. Campbell, B. Cheal, C. S. Devlin,
K. T. Flanagan, R. F. Garcia Ruiz, H. Heylen, J. D. Holt, B. S. Hu, A.
Kanellakopoulos, J. Kr\"amer, V. Lagaki, B. Maa{\ss}, S. Malbrunot-Ettenauer,
T. Miyagi, K. K\"onig, M. Kortelainen, W. Nazarewicz, R. Neugart, G. Neyens,
W. N\"ortersh\"auser, P.-G. Reinhard, M. L. Reitsma, L. V. Rodr\'iguez, F.
Sommer, Z. Y. Xu | Charge radii of neutron-rich scandium isotopes and the seniority
symmetry in the $0f_{7/2}$ shell | Version accepted for publication in Phys. Rev. Lett | null | null | null | nucl-ex nucl-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nuclear charge radii of neutron-rich $^{47-49}$Sc isotopes were measured
using collinear laser spectroscopy at CERN-ISOLDE. The new data reveal that the
charge radii of scandium isotopes exhibit a distinct trend between $N=20$ and
$N=28$, with $^{41}$Sc and $^{49}$Sc isotopes having similar values, mirroring
the closeness of the charge radii of $^{40}$Ca and $^{48}$Ca. Theoretical
models that successfully interpret the radii of calcium isotopes could not
account for the observed behavior in scandium radii, in particular the reduced
odd-even staggering. Remarkably, the inclusion of the new $^{49}$Sc radius data
has unveiled a similar trend in the charge radii of $N=28$ isotones and $Z=20$
isotopes when adding the neutrons atop the $^{40}$Ca core and the protons atop
the $^{48}$Ca core, respectively. We demonstrate that this trend is consistent
with the prediction of the seniority model.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:53:55 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Bai",
"S. W.",
""
],
[
"Yang",
"X. F.",
""
],
[
"Koszorús",
"Á.",
""
],
[
"Berengut",
"J. C.",
""
],
[
"Billowes",
"J.",
""
],
[
"Bissell",
"M. L.",
""
],
[
"Blaum",
"K.",
""
],
[
"Borschevsky",
"A.",
""
],
[
"Campbell",
"P.",
""
],
[
"Cheal",
"B.",
""
],
[
"Devlin",
"C. S.",
""
],
[
"Flanagan",
"K. T.",
""
],
[
"Ruiz",
"R. F. Garcia",
""
],
[
"Heylen",
"H.",
""
],
[
"Holt",
"J. D.",
""
],
[
"Hu",
"B. S.",
""
],
[
"Kanellakopoulos",
"A.",
""
],
[
"Krämer",
"J.",
""
],
[
"Lagaki",
"V.",
""
],
[
"Maaß",
"B.",
""
],
[
"Malbrunot-Ettenauer",
"S.",
""
],
[
"Miyagi",
"T.",
""
],
[
"König",
"K.",
""
],
[
"Kortelainen",
"M.",
""
],
[
"Nazarewicz",
"W.",
""
],
[
"Neugart",
"R.",
""
],
[
"Neyens",
"G.",
""
],
[
"Nörtershäuser",
"W.",
""
],
[
"Reinhard",
"P. -G.",
""
],
[
"Reitsma",
"M. L.",
""
],
[
"Rodríguez",
"L. V.",
""
],
[
"Sommer",
"F.",
""
],
[
"Xu",
"Z. Y.",
""
]
] |
2504.12002 | Armando Martino | Harry Iveson and Armando Martino and Wagner Sgobbi and Peter Wong | Property $R_{\infty}$ for groups with infinitely many ends | 25 pages. Comments welcome | null | null | null | math.GR math.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that an accessible group with infinitely many ends has property
$R_{\infty}$. That is, it has infinitely many twisted conjugacy classes for any
twisting automorphism. We deduce that having property $R_{\infty}$ is
undecidable amongst finitely presented groups.
We also show that the same is true for a wide class of relatively hyperbolic
groups, filling in some of the gaps in the literature. Specifically, we show
that a non-elementary, finitely presented relatively hyperbolic group with
finitely generated peripheral subgroups which are not themselves relatively
hyperbolic, has property $R_{\infty}$.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:55:40 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Iveson",
"Harry",
""
],
[
"Martino",
"Armando",
""
],
[
"Sgobbi",
"Wagner",
""
],
[
"Wong",
"Peter",
""
]
] |
2504.12003 | Michael Reichelt | Mario Gobrial, Lukas Domenig, Michael Reichelt, Manfred Kaltenbacher,
Olaf Steinbach | Inclusion of an Inverse Magnetic Hysteresis Model into the Space-Time
Finite Element Method for Magnetoquasistatics | null | null | null | null | math.NA cs.NA | http://creativecommons.org/licenses/by/4.0/ | In this note we discuss the numerical solution of the eddy current
approximation of the Maxwell equations using the simple Pragmatic Algebraic
Model to include hysteresis effects. In addition to the more standard
time-stepping approach we propose a space-time finite element method which
allows both for parallelization and adaptivity simultaneously in space and
time. Numerical experiments confirm both approaches yield the same numerical
results.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:56:42 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gobrial",
"Mario",
""
],
[
"Domenig",
"Lukas",
""
],
[
"Reichelt",
"Michael",
""
],
[
"Kaltenbacher",
"Manfred",
""
],
[
"Steinbach",
"Olaf",
""
]
] |
2504.12004 | Sameh Abdulah | Qilong Pan, Sameh Abdulah, Mustafa Abduljabbar, Hatem Ltaief, Andreas
Herten, Mathis Bode, Matthew Pratola, Arindam Fadikar, Marc G. Genton, David
E. Keyes, Ying Sun | Scaled Block Vecchia Approximation for High-Dimensional Gaussian Process
Emulation on GPUs | null | null | null | null | cs.DC | http://creativecommons.org/licenses/by/4.0/ | Emulating computationally intensive scientific simulations is essential to
enable uncertainty quantification, optimization, and decision-making at scale.
Gaussian Processes (GPs) offer a flexible and data-efficient foundation for
statistical emulation, but their poor scalability limits applicability to large
datasets. We introduce the Scaled Block Vecchia (SBV) algorithm for distributed
GPU-based systems. SBV integrates the Scaled Vecchia approach for anisotropic
input scaling with the Block Vecchia (BV) method to reduce computational and
memory complexity while leveraging GPU acceleration techniques for efficient
linear algebra operations. To the best of our knowledge, this is the first
distributed implementation of any Vecchia-based GP variant. Our implementation
employs MPI for inter-node parallelism and the MAGMA library for
GPU-accelerated batched matrix computations. We demonstrate the scalability and
efficiency of the proposed algorithm through experiments on synthetic and
real-world workloads, including a 50M point simulation from a respiratory
disease model. SBV achieves near-linear scalability on up to 64 A100 and GH200
GPUs, handles 320M points, and reduces energy use relative to exact GP solvers,
establishing SBV as a scalable and energy-efficient framework for emulating
large-scale scientific models on GPU-based distributed systems.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:57:20 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Pan",
"Qilong",
""
],
[
"Abdulah",
"Sameh",
""
],
[
"Abduljabbar",
"Mustafa",
""
],
[
"Ltaief",
"Hatem",
""
],
[
"Herten",
"Andreas",
""
],
[
"Bode",
"Mathis",
""
],
[
"Pratola",
"Matthew",
""
],
[
"Fadikar",
"Arindam",
""
],
[
"Genton",
"Marc G.",
""
],
[
"Keyes",
"David E.",
""
],
[
"Sun",
"Ying",
""
]
] |
2504.12005 | Dabi Ahn | Soobin Suh, Dabi Ahn, Heewoong Park, Jonghun Park | Voice Conversion with Diverse Intonation using Conditional Variational
Auto-Encoder | 2 pages, Machine Learning in Speech and Language Processing Workshop
(MLSLP) 2018 | null | null | null | cs.SD cs.LG eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Voice conversion is a task of synthesizing an utterance with target speaker's
voice while maintaining linguistic information of the source utterance. While a
speaker can produce varying utterances from a single script with different
intonations, conventional voice conversion models were limited to producing
only one result per source input. To overcome this limitation, we propose a
novel approach for voice conversion with diverse intonations using conditional
variational autoencoder (CVAE). Experiments have shown that the speaker's style
feature can be mapped into a latent space with Gaussian distribution. We have
also been able to convert voices with more diverse intonation by making the
posterior of the latent space more complex with inverse autoregressive flow
(IAF). As a result, the converted voice not only has a diversity of
intonations, but also has better sound quality than the model without CVAE.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:59:56 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Suh",
"Soobin",
""
],
[
"Ahn",
"Dabi",
""
],
[
"Park",
"Heewoong",
""
],
[
"Park",
"Jonghun",
""
]
] |
2504.12006 | Benjamin Knorr | Aaron Held, Benjamin Knorr, Jan M. Pawlowski, Alessia Platania, Manuel
Reichert, Frank Saueressig, Marc Schiffer | Comment on Path integral measure and RG equations for gravity | Comment on arXiv:2412.10194 and arXiv:2412.14108 | null | null | null | hep-th | http://creativecommons.org/licenses/by/4.0/ | Asymptotic safety is a candidate for a predictive quantum theory of gravity
and matter. Recent works (arXiv:2412.10194 and arXiv:2412.14108) challenged
this scenario. We show that their arguments fail on a basic level.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 12:00:22 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Held",
"Aaron",
""
],
[
"Knorr",
"Benjamin",
""
],
[
"Pawlowski",
"Jan M.",
""
],
[
"Platania",
"Alessia",
""
],
[
"Reichert",
"Manuel",
""
],
[
"Saueressig",
"Frank",
""
],
[
"Schiffer",
"Marc",
""
]
] |
2504.12007 | Haohao Qu | Haohao Qu, Wenqi Fan, Shanru Lin | Generative Recommendation with Continuous-Token Diffusion | null | null | null | null | cs.IR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, there has been a significant trend toward using large
language model (LLM)-based recommender systems (RecSys). Current research
primarily focuses on representing complex user-item interactions within a
discrete space to align with the inherent discrete nature of language models.
However, this approach faces limitations due to its discrete nature: (i)
information is often compressed during discretization; (ii) the tokenization
and generation for the vast number of users and items in real-world scenarios
are constrained by a limited vocabulary. Embracing continuous data presents a
promising alternative to enhance expressive capabilities, though this approach
is still in its early stages. To address this gap, we propose a novel
framework, DeftRec, which incorporates \textbf{de}noising di\textbf{f}fusion
models to enable LLM-based RecSys to seamlessly support continuous
\textbf{t}oken as input and target. First, we introduce a robust tokenizer with
a masking operation and an additive K-way architecture to index users and
items, capturing their complex collaborative relationships into continuous
tokens. Crucially, we develop a denoising diffusion model to process user
preferences within continuous domains by conditioning on reasoning content from
pre-trained large language model. During the denoising process, we reformulate
the objective to include negative interactions, building a comprehensive
understanding of user preferences for effective and accurate recommendation
generation. Finally, given a continuous token as output, recommendations can be
easily generated through score-based retrieval. Extensive experiments
demonstrate the effectiveness of the proposed methods, showing that DeftRec
surpasses competitive benchmarks, including both traditional and emerging
LLM-based RecSys.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 12:01:03 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Qu",
"Haohao",
""
],
[
"Fan",
"Wenqi",
""
],
[
"Lin",
"Shanru",
""
]
] |
2504.12008 | Jingfang Fan | Yuhao Feng, Jun Meng, and Jingfang Fan | Global Patterns of Extreme Temperature Teleconnections Using Climate
Network Analysis | null | null | null | null | physics.ao-ph | http://creativecommons.org/licenses/by/4.0/ | Extreme weather events, rare yet profoundly impactful, are often accompanied
by severe conditions. Increasing global temperatures are poised to exacerbate
these events, resulting in greater human casualties, economic losses, and
ecological destruction. Complex global climate interactions, known as
teleconnections, can lead to widespread repercussions triggered by localized
extreme weather. Understanding these teleconnection patterns is crucial for
weather forecasting, enhancing safety, and advancing climate science. Here, we
employ climate network analysis to uncover teleconnection patterns associated
with extreme temperature fluctuations, including both extreme warming and
cooling events occurring on a daily basis. Our study results demonstrate that
the distances of significant teleconnections initially conform to a power-law
decay, signifying a decline in connectivity with distance. However, this
power-law decay tendency breaks beyond a certain threshold distance, suggesting
the existence of long-distance connections. Additionally, we uncover a greater
prevalence of long-distance connectivity among extreme cooling events compared
to extreme warming events. The global pattern of teleconnections is, in part,
driven by the mechanism of Rossby waves, which serve as a rapid conduit for
inducing correlated fluctuations in both pressure and temperature. These
results enhance our understanding of the multiscale nature of climate
teleconnections and hold significant implications for improving weather
forecasting and assessing climate risks in a warming world.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 12:05:15 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Feng",
"Yuhao",
""
],
[
"Meng",
"Jun",
""
],
[
"Fan",
"Jingfang",
""
]
] |
2504.12009 | Jagadeesh Harshan | Soumita Hazra and J. Harshan | Network-Centric Countermeasures Against Integrated Sensing Enabled
Jamming Adversaries | 8 pages. To appear in the proceedings of WiOpt 2025 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent developments in Integrated Sensing and Communication have led to new
adversarial models in wireless security through Integrated Sensing and Jamming
(ISAJ) adversaries. ISAJ adversaries, owing to their sensing capabilities, are
known to inject jamming energy over the victim's frequency band, and also use
generalized energy measurements on various network frequencies to detect the
presence of countermeasures. Existing countermeasures against such ISAJ
adversaries are laid under the assumption that the adversary does not have the
knowledge of the countermeasure. However, according to Kerchoffs' principle in
cryptography, security of a countermeasure should only rely on the secret-keys,
not on the obfuscation of the countermeasure. On testing the security of
existing countermeasures, we observe that they violate Kerchoffs' principle,
thus motivating the need for new countermeasures. In this regard, we propose a
novel network-centric countermeasure against ISAJ adversaries, wherein a group
of users in the network assist the victim to reliably communicate her messages
in a covert manner. Firstly, we analyse the error performance of the proposed
countermeasure, and study its behavior on the number of assisting users in the
network. Subsequently, to validate its security against Kerchoffs' principle,
we study the Shannon's entropy associated with the presence of the victim's
messages in the network and analyse its behaviour as a function of the number
of assisting users. Finally, to study the interplay between reliability and
covertness, we pose interesting optimization problems and solve them to choose
the underlying parameters of the countermeasure and the number of assisting
users.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 12:05:30 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Hazra",
"Soumita",
""
],
[
"Harshan",
"J.",
""
]
] |
2504.12011 | Hogun Park | Heesoo Jung, Hogun Park | Balancing Graph Embedding Smoothness in Self-Supervised Learning via
Information-Theoretic Decomposition | Accepted to the Web Conference (WWW) 2025 | null | 10.1145/3696410.3714611 | null | cs.LG cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Self-supervised learning (SSL) in graphs has garnered significant attention,
particularly in employing Graph Neural Networks (GNNs) with pretext tasks
initially designed for other domains, such as contrastive learning and feature
reconstruction. However, it remains uncertain whether these methods effectively
reflect essential graph properties, precisely representation similarity with
its neighbors. We observe that existing methods position opposite ends of a
spectrum driven by the graph embedding smoothness, with each end corresponding
to outperformance on specific downstream tasks. Decomposing the SSL objective
into three terms via an information-theoretic framework with a neighbor
representation variable reveals that this polarization stems from an imbalance
among the terms, which existing methods may not effectively maintain. Further
insights suggest that balancing between the extremes can lead to improved
performance across a wider range of downstream tasks. A framework, BSG
(Balancing Smoothness in Graph SSL), introduces novel loss functions designed
to supplement the representation quality in graph-based SSL by balancing the
derived three terms: neighbor loss, minimal loss, and divergence loss. We
present a theoretical analysis of the effects of these loss functions,
highlighting their significance from both the SSL and graph smoothness
perspectives. Extensive experiments on multiple real-world datasets across node
classification and link prediction consistently demonstrate that BSG achieves
state-of-the-art performance, outperforming existing methods. Our
implementation code is available at https://github.com/steve30572/BSG.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 12:09:56 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Jung",
"Heesoo",
""
],
[
"Park",
"Hogun",
""
]
] |
2504.12012 | Esen K. T\"ut\"unc\"u | Kris Pilcher, Esen K. T\"ut\"unc\"u | Purposefully Induced Psychosis (PIP): Embracing Hallucination as
Imagination in Large Language Models | 5 pages, 3 figures | null | null | null | cs.AI cs.HC | http://creativecommons.org/licenses/by/4.0/ | Hallucinations in Large Language Models (LLMs) are widely regarded as errors
- outputs that deviate from factual accuracy. However, in creative or
exploratory contexts, these "mistakes" may represent unexpected avenues for
innovation. We introduce Purposefully Induced Psychosis (PIP), a novel approach
that amplifies LLM hallucinations for imaginative tasks such as speculative
fiction, interactive storytelling, and mixed-reality simulations. Drawing on
Herman Melville's Moby-Dick, where Pip's "madness" reveals profound insight, we
reframe hallucinations as a source of computational imagination rather than a
flaw. Our method fine-tunes LLMs to encourage speculative, metaphorical, and
surreal outputs - hallucinations that are useful when factual accuracy is not
the chief objective. Inspired by the consensual illusions of theater and stage
magic, PIP situates these creative missteps in contexts where users willingly
suspend disbelief, thereby transforming "errors" into catalysts for new ways of
thinking. We discuss potential applications, design principles for ensuring
user consent, preliminary observations, and implications for broader AI ethics
and human-AI collaboration.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 12:13:02 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Pilcher",
"Kris",
""
],
[
"Tütüncü",
"Esen K.",
""
]
] |
2504.12013 | Nikolai Maas | Robert Krause, Lars Gottesb\"uren and Nikolai Maas | Deterministic Parallel High-Quality Hypergraph Partitioning | null | null | null | null | cs.DC | http://creativecommons.org/licenses/by/4.0/ | We present a deterministic parallel multilevel algorithm for balanced
hypergraph partitioning that matches the state of the art for non-deterministic
algorithms. Deterministic parallel algorithms produce the same result in each
invocation, which is crucial for reproducibility. Moreover, determinism is
highly desirable in application areas such as VLSI design. While there has been
tremendous progress in parallel hypergraph partitioning algorithms recently,
deterministic counterparts for high-quality local search techniques are
missing. Consequently, solution quality is severely lacking in comparison to
the non-deterministic algorithms.
In this work we close this gap. First, we present a generalization of the
recently proposed Jet refinement algorithm. While Jet is naturally amenable to
determinism, significant changes are necessary to achieve competitive
performance on hypergraphs. We also propose an improved deterministic
rebalancing algorithm for Jet. Moreover, we consider the powerful but slower
flow-based refinement and introduce a scheme that enables deterministic results
while building upon a non-deterministic maximum flow algorithm.
As demonstrated in our thorough experimental evaluation, this results in the
first deterministic parallel partitioner that is competitive to the highest
quality solvers. With Jet refinement, we match or exceed the quality of
Mt-KaHyPar's non-deterministic default configuration while being only 15\%
slower on average. We observe self-relative speedups of up to 55 on 64 cores
with a 22.5$\times$ average speedup. Our deterministic flow-based refinement
exceeds the quality of the non-deterministic variant by roughly 1\% on average
but requires 31\% more running time.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 12:13:21 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Krause",
"Robert",
""
],
[
"Gottesbüren",
"Lars",
""
],
[
"Maas",
"Nikolai",
""
]
] |
2504.12014 | Arpita Jana | Arpita Jana, Manjari Dutta, Sunandan Gangopadhyay | Area spectrum and black hole thermodynamics | 9 pages LaTex, comments are welcome | null | null | null | gr-qc hep-th | http://creativecommons.org/licenses/by/4.0/ | The role of horizon area quantization on black hole thermodynamics is
investigated in this article. The coefficient appearing in the quantization of
area is fixed by an appeal to the saturated form of the Landauer's principle.
Then by considering transition between discrete states of the event horizon
area which in turn is equivalent to transitions between discrete mass states of
the black hole, the change in the mass can be obtained. The change in mass is
then equated to the product of the Hawking temperature and change in entropy of
the black hole between two consecutive discrete states applying the first law
of black hole thermodynamics. This gives the corrected Hawking temperature. In
particular, we apply this technique to the Schwarzschild black hole, the
quantum corrected Schwarzschild black hole, the Reissner-Nordstr\"{o}m black
hole which is a charged black hole, and the rotating Kerr black hole geometry,
and obtain the corrected Hawking temperature in each of these cases. We then
take a step forward by inserting this corrected Hawking temperature in the
first law of black hole thermodynamics once again to calculate the entropy of
the black hole in terms of the horizon area of the black hole. This leads to
logarithmic and inverse corrections to the entropy of the black hole.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 12:14:52 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Jana",
"Arpita",
""
],
[
"Dutta",
"Manjari",
""
],
[
"Gangopadhyay",
"Sunandan",
""
]
] |
2504.12015 | Peter Adam Hoeher | Peter A. Hoeher, Yang Leng, Maximilian Mewis, and Rongwu Zhu | Power Line Communication vs. Talkative Power Conversion: A Benchmarking
Study | 6 pages, 4 figures, 2 tables | null | null | null | eess.SY cs.SY | http://creativecommons.org/licenses/by/4.0/ | The convergence of energy transmission and data communication has become a
key feature of decentralized energy systems across a broad spectrum of
voltage/power ranges, including smart grid applications and cyber-physical
power systems. This paper compares two distinct approaches: Power Line
Communications (PLC) and Talkative Power Conversion (TPC). While PLC leverages
existing power infrastructure for data transmission by using external data
transmitters and receivers, TPC integrates communication capabilities directly
into power electronic converters. We present their technical foundations and
applications, benchmark their strengths and bottlenecks, and outline future
research directions regarding TPC that could bridge the gap between power and
communication technologies.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 12:15:42 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Hoeher",
"Peter A.",
""
],
[
"Leng",
"Yang",
""
],
[
"Mewis",
"Maximilian",
""
],
[
"Zhu",
"Rongwu",
""
]
] |
2504.12016 | Arun Verma | Arun Verma, Xiaoqiang Lin, Zhongxiang Dai, Daniela Rus, Bryan Kian
Hsiang Low | Active Human Feedback Collection via Neural Contextual Dueling Bandits | Accepted at ICLR 2025 Workshop on Bidirectional Human-AI Alignment
(BiAlign) | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Collecting human preference feedback is often expensive, leading recent works
to develop principled algorithms to select them more efficiently. However,
these works assume that the underlying reward function is linear, an assumption
that does not hold in many real-life applications, such as online
recommendation and LLM alignment. To address this limitation, we propose
Neural-ADB, an algorithm based on the neural contextual dueling bandit
framework that provides a principled and practical method for collecting human
preference feedback when the underlying latent reward function is non-linear.
We theoretically show that when preference feedback follows the
Bradley-Terry-Luce model, the worst sub-optimality gap of the policy learned by
Neural-ADB decreases at a sub-linear rate as the preference dataset increases.
Our experimental results on problem instances derived from synthetic preference
datasets further validate the effectiveness of Neural-ADB.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 12:16:10 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Verma",
"Arun",
""
],
[
"Lin",
"Xiaoqiang",
""
],
[
"Dai",
"Zhongxiang",
""
],
[
"Rus",
"Daniela",
""
],
[
"Low",
"Bryan Kian Hsiang",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.