id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2308.04831 | Mayank Raikwar | Mayank Raikwar, Nikita Polyanskii, Sebastian M\"uller | Fairness Notions in DAG-based DLTs | 8 Pages, Accepted in 5th Conference on Blockchain Research &
Applications for Innovative Networks and Services (BRAINS 2023) | null | null | null | cs.CR cs.DC | http://creativecommons.org/licenses/by/4.0/ | This paper investigates the issue of fairness in Distributed Ledger
Technology (DLT), specifically focusing on the shortcomings observed in current
blockchain systems due to Miner Extractable Value (MEV) phenomena and systemic
centralization. We explore the potential of Directed Acyclic Graphs (DAGs) as a
solution to address or mitigate these fairness concerns. Our objective is to
gain a comprehensive understanding of fairness in DAG-based DLTs by examining
its different aspects and measurement metrics. We aim to establish a shared
knowledge base that facilitates accurate fairness assessment and allows for an
evaluation of whether DAG-based DLTs offer a more equitable design. We describe
the various dimensions of fairness and conduct a comparative analysis to
examine how they relate to different components of DLTs. This analysis serves
as a catalyst for further research, encouraging the development of
cryptographic systems that promote fairness.
| [
{
"version": "v1",
"created": "Wed, 9 Aug 2023 09:40:14 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 17:18:52 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Raikwar",
"Mayank",
""
],
[
"Polyanskii",
"Nikita",
""
],
[
"Müller",
"Sebastian",
""
]
] |
2308.05106 | Antoun Yaacoub | Pajon Quentin, Serre Swan, Wissocq Hugo, Rabaud L\'eo, Haidar Siba,
Yaacoub Antoun | Balancing Accuracy and Training Time in Federated Learning for Violence
Detection in Surveillance Videos: A Study of Neural Network Architectures | 8 pages, 2 figures, FL-IJCAI'23 | null | 10.1007/s11390-024-3702-7 | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an investigation into machine learning techniques for
violence detection in videos and their adaptation to a federated learning
context. The study includes experiments with spatio-temporal features extracted
from benchmark video datasets, comparison of different methods, and proposal of
a modified version of the "Flow-Gated" architecture called "Diff-Gated."
Additionally, various machine learning techniques, including super-convergence
and transfer learning, are explored, and a method for adapting centralized
datasets to a federated learning context is developed. The research achieves
better accuracy results compared to state-of-the-art models by training the
best violence detection model in a federated learning context.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2023 19:44:02 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Quentin",
"Pajon",
""
],
[
"Swan",
"Serre",
""
],
[
"Hugo",
"Wissocq",
""
],
[
"Léo",
"Rabaud",
""
],
[
"Siba",
"Haidar",
""
],
[
"Antoun",
"Yaacoub",
""
]
] |
2308.05759 | Felipe Meneguitti Dias | Douglas A.Almeida, Felipe M. Dias, Marcelo A. F. Toledo, Diego A. C.
Cardenas, Filipe A. C. Oliveira, Estela Ribeiro, Jose E. Krieger, Marco A.
Gutierrez | A machine-learning sleep-wake classification model using a reduced
number of features derived from photoplethysmography and activity signals | 8 pages, 3 figures | null | 10.5753/sbcas.2024.1872 | null | eess.SP cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Sleep is a crucial aspect of our overall health and well-being. It plays a
vital role in regulating our mental and physical health, impacting our mood,
memory, and cognitive function to our physical resilience and immune system.
The classification of sleep stages is a mandatory step to assess sleep quality,
providing the metrics to estimate the quality of sleep and how well our body is
functioning during this essential period of rest. Photoplethysmography (PPG)
has been demonstrated to be an effective signal for sleep stage inference,
meaning it can be used on its own or in a combination with others signals to
determine sleep stage. This information is valuable in identifying potential
sleep issues and developing strategies to improve sleep quality and overall
health. In this work, we present a machine learning sleep-wake classification
model based on the eXtreme Gradient Boosting (XGBoost) algorithm and features
extracted from PPG signal and activity counts. The performance of our method
was comparable to current state-of-the-art methods with a Sensitivity of 91.15
$\pm$ 1.16%, Specificity of 53.66 $\pm$ 1.12%, F1-score of 83.88 $\pm$ 0.56%,
and Kappa of 48.0 $\pm$ 0.86%. Our method offers a significant improvement over
other approaches as it uses a reduced number of features, making it suitable
for implementation in wearable devices that have limited computational power.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2023 13:43:19 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Almeida",
"Douglas A.",
""
],
[
"Dias",
"Felipe M.",
""
],
[
"Toledo",
"Marcelo A. F.",
""
],
[
"Cardenas",
"Diego A. C.",
""
],
[
"Oliveira",
"Filipe A. C.",
""
],
[
"Ribeiro",
"Estela",
""
],
[
"Krieger",
"Jose E.",
""
],
[
"Gutierrez",
"Marco A.",
""
]
] |
2308.09784 | Peyman Azodi | Peyman Azodi, Herschel A Rabitz | Dynamics and Geometry of Entanglement in Many-Body Quantum Systems | null | null | 10.1142/S0219887825501105 | null | quant-ph cond-mat.stat-mech math-ph math.MP | http://creativecommons.org/licenses/by/4.0/ | A new framework is formulated to study entanglement dynamics in many-body
quantum systems along with an associated geometric description. In this
formulation, called the Quantum Correlation Transfer Function (QCTF), the
system's wave function or density matrix is transformed into a new space of
complex functions with isolated singularities. Accordingly, entanglement
dynamics is encoded in specific residues of the QCTF, and importantly, the
explicit evaluation of the system's time dependence is avoided. Notably, the
QCTF formulation allows for various algebraic simplifications and
approximations to address the normally encountered complications due to the
exponential growth of the many-body Hilbert space with the number of bodies.
These simplifications are facilitated through considering the
\textit{patterns}, in lieu of the elements, lying within the system's state.
Consequently, a main finding of this paper is the exterior (Grassmannian)
algebraic expression of many-body entanglement as the collective areas of
regions in the Hilbert space spanned by pairs of projections of the wave
function onto an arbitrary basis. This latter geometric measure is shown to be
equivalent to the second-order R\'enyi entropy. Additionally, the geometric
description of the QCTF shows that characterizing features of the reduced
density matrix can be related to experimentally observable quantities. The
QCTF-based geometric description offers the prospect of theoretically revealing
aspects of many-body entanglement, by drawing on the vast scope of methods from
geometry.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2023 19:16:44 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Oct 2024 14:35:57 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 15:33:46 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Azodi",
"Peyman",
""
],
[
"Rabitz",
"Herschel A",
""
]
] |
2308.10781 | Swati Gupta | Mehak Arora, Hassan Mortagy, Nathan Dwarshuis, Jeffrey Wang, Philip
Yang, Andre L Holder, Swati Gupta, Rishikesan Kamaleswaran | Improving Clinical Decision Support through Interpretable Machine
Learning and Error Handling in Electronic Health Records | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | The objective of this work is to develop an Electronic Medical Record (EMR)
data processing tool that confers clinical context to Machine Learning (ML)
algorithms for error handling, bias mitigation and interpretability. We present
Trust-MAPS, an algorithm that translates clinical domain knowledge into
high-dimensional, mixed-integer programming models that capture physiological
and biological constraints on clinical measurements. EMR data is projected onto
this constrained space, effectively bringing outliers to fall within a
physiologically feasible range. We then compute the distance of each data point
from the constrained space modeling healthy physiology to quantify deviation
from the norm. These distances, termed "trust-scores," are integrated into the
feature space for downstream ML applications. We demonstrate the utility of
Trust-MAPS by training a binary classifier for early sepsis prediction on data
from the 2019 PhysioNet Computing in Cardiology Challenge, using the XGBoost
algorithm and applying SMOTE for overcoming class-imbalance. The Trust-MAPS
framework shows desirable behavior in handling potential errors and boosting
predictive performance. We achieve an AUROC of 0.91 (0.89, 0.92 : 95% CI) for
predicting sepsis 6 hours before onset - a marked 15% improvement over a
baseline model trained without Trust-MAPS. Trust-scores emerge as clinically
meaningful features that not only boost predictive performance for clinical
decision support tasks, but also lend interpretability to ML models. This work
is the first to translate clinical domain knowledge into mathematical
constraints, model cross-vital dependencies, and identify aberrations in
high-dimensional medical data. Our method allows for error handling in EMR, and
confers interpretability and superior predictive power to models trained for
clinical decision support.
| [
{
"version": "v1",
"created": "Mon, 21 Aug 2023 15:14:49 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 15:54:32 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Arora",
"Mehak",
""
],
[
"Mortagy",
"Hassan",
""
],
[
"Dwarshuis",
"Nathan",
""
],
[
"Wang",
"Jeffrey",
""
],
[
"Yang",
"Philip",
""
],
[
"Holder",
"Andre L",
""
],
[
"Gupta",
"Swati",
""
],
[
"Kamaleswaran",
"Rishikesan",
""
]
] |
2308.12486 | Bowen Xu | Bowen Xu | A Brain-Inspired Sequence Learning Model based on a Logic | null | null | 10.1038/s41598-025-97777-8 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sequence learning is an essential aspect of intelligence. In Artificial
Intelligence, sequence prediction task is usually used to test a sequence
learning model. In this paper, a model of sequence learning, which is
interpretable through Non-Axiomatic Logic, is designed and tested. The learning
mechanism is composed of three steps, hypothesizing, revising, and recycling,
which enable the model to work under the Assumption of Insufficient Knowledge
and Resources. Synthetic datasets for sequence prediction task are generated to
test the capacity of the model. The results show that the model works well
within different levels of difficulty. In addition, since the model adopts
concept-centered representation, it theoretically does not suffer from
catastrophic forgetting, and the practical results also support this property.
This paper shows the potential of learning sequences in a logical way.
| [
{
"version": "v1",
"created": "Thu, 24 Aug 2023 01:01:41 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Nov 2023 16:26:09 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Xu",
"Bowen",
""
]
] |
2309.02293 | Manuel Donaire | M. Donaire | Acceleration of a polarized neutron by internal weak nuclear forces | 15-page article + 12-page appendix + 1 figure | null | null | null | hep-ph nucl-th | http://creativecommons.org/licenses/by/4.0/ | It is proven that a polarized neutron gets accelerated by internal nuclear
forces along the coherent rotation of its spin. The net force upon the neutron
arises from the weak nuclear interactions between its quarks. It is the result
of the simultaneous breaking of parity symmetry by the chiral interactions
between the neutron's quarks, and of time-reversal symmetry along the inversion
of their spins. The variation of the neutron's kinetic momentum is accompanied
with the transfer of an equivalent momentum to the fields of the Z and W bosons
that mediate the interactions, in the opposite direction. The effect is linear
in Fermi's constant. Using the simplest hadron models, an upper bound of the
order of meters per second is estimated for the velocity variation of the
polarized neutron along the spin-flip process.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2023 14:56:38 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Mar 2025 15:47:41 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Apr 2025 23:04:53 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Donaire",
"M.",
""
]
] |
2309.05195 | Takumi Namba | Takumi Namba, Kiyotsugu Takaba | Cloud-mediated self-triggered synchronization of a general linear
multi-agent system over a directed graph | 14 pages | IET Cyber-Physical Systems: Theory & Applications, 9(4), 2024,
497-508 | 10.1049/cps2.12101 | null | eess.SY cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a self-triggered synchronization control method of a
general high-order linear time-invariant multi-agent system through a cloud
repository. In the cloud-mediated self-triggered control, each agent
asynchronously accesses the cloud repository to get past information on its
neighboring agents. Then, the agent predicts future behaviors of its neighbors
as well as of its own, and locally determines its next access time to the cloud
repository. In the case of a general high-order linear agent dynamics, each
agent has to estimate exponential evolution of its trajectory characterized by
eigenvalues of a system matrix, which is different from single/double
integrator or first-order linear agents. Our proposed method deals with
exponential behaviors of the agents by tightly evaluating the bounds on matrix
exponentials. Based on these bound, we design the self-triggered controller
through a cloud which achieves bounded state synchronization of the closed-loop
system without exhibiting any Zeno behaviors. The effectiveness of the proposed
method is demonstrated through the numerical simulation.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2023 02:14:54 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Namba",
"Takumi",
""
],
[
"Takaba",
"Kiyotsugu",
""
]
] |
2309.09166 | Shun Maeta | Shun Maeta | Complete steady gradient Yamabe solitons with positive scalar curvature
are rotationally symmetric | 5 pages | null | null | null | math.DG | http://creativecommons.org/publicdomain/zero/1.0/ | In this paper, we solve the Yamabe soliton version of the Perelman
conjecture. We show that any nontrivial complete steady gradient Yamabe
solitons with positive scalar curvature are rotationally symmetric.
| [
{
"version": "v1",
"created": "Sun, 17 Sep 2023 05:41:42 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Mar 2024 04:27:47 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Apr 2025 01:42:40 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Maeta",
"Shun",
""
]
] |
2309.10026 | Wei-Chen Wang | Wei-Chen Wang, Feng-Wu Chen, Kuan-Sen Lin, Justin T. Hou, Ho-Chun Lin,
Mei-Yin Chou | Origin of magic angles in twisted bilayer graphene: The magic ring | 12 pages, 4 figures | Phys. Rev. B 110, 115154 (2024) | 10.1103/PhysRevB.110.115154 | null | cond-mat.mes-hall cond-mat.mtrl-sci | http://creativecommons.org/licenses/by/4.0/ | The unexpected discovery of superconductivity and strong electron correlation
in twisted bilayer graphene (TBG), a system containing only sp electrons, is
considered as one of the most intriguing developments in two-dimensional
materials in recent years. The key feature is the emergent flat energy bands
near the Fermi level, a favorable condition for novel many-body phases, at the
so-called "magic angles". The physical origin of these interesting flat bands
has been elusive to date, hindering the construction of an effective theory for
the unconventional electron correlation. In this work, we have identified the
importance of charge accumulation in the AA region of the moire supercell and
the most critical role of the Fermi ring in AA-stacked bilayer graphene. We
show that the magic angles can be predicted by the moire periodicity determined
by the size of this Fermi ring. The resonant criterion in momentum space makes
it possible to coherently combine states on the Fermi ring through scattering
by the moire potential, leading to flat bands near the Fermi level. We thus
establish the physical origin of the magic angles in TBG and identify the
characteristics of one-particle states associated with the flat bands for
further many-body investigations.
| [
{
"version": "v1",
"created": "Mon, 18 Sep 2023 18:00:01 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 13:46:00 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Wang",
"Wei-Chen",
""
],
[
"Chen",
"Feng-Wu",
""
],
[
"Lin",
"Kuan-Sen",
""
],
[
"Hou",
"Justin T.",
""
],
[
"Lin",
"Ho-Chun",
""
],
[
"Chou",
"Mei-Yin",
""
]
] |
2309.10257 | Ye Tian | Yajuan Zhao, Ye Tian, Jilai Ye, Yue Wu, Zihan Zhao, Zhihao Chi, Tian
Tian, Hepeng Yao, Jiazhong Hu, Yu Chen and Wenlan Chen | Observation of universal dissipative dynamics in strongly correlated
quantum gas | null | Nature Physics 21, 530-535 (2025) | 10.1038/s41567-025-02800-4 | null | cond-mat.quant-gas cond-mat.stat-mech cond-mat.str-el physics.atom-ph quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dissipation is unavoidable in quantum systems. It usually induces
decoherences and changes quantum correlations. To access the information of
strongly correlated quantum matters, one has to overcome or suppress
dissipation to extract out the underlying quantum phenomena. However, here we
find an opposite effect that dissipation can be utilized as a powerful tool to
probe the intrinsic correlations of quantum many-body systems. Applying
highly-controllable dissipation in ultracold atomic systems, we observe a
universal dissipative dynamics in strongly correlated one-dimensional quantum
gases. The total particle number of this system follows a universal
stretched-exponential decay, and the stretched exponent measures the anomalous
dimension of the spectral function, a critical exponent characterizing strong
quantum fluctuations of this system. This method could have broad applications
in detecting strongly correlated features, including spin-charge separations
and Fermi arcs in quantum materials.
| [
{
"version": "v1",
"created": "Tue, 19 Sep 2023 02:32:02 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Zhao",
"Yajuan",
""
],
[
"Tian",
"Ye",
""
],
[
"Ye",
"Jilai",
""
],
[
"Wu",
"Yue",
""
],
[
"Zhao",
"Zihan",
""
],
[
"Chi",
"Zhihao",
""
],
[
"Tian",
"Tian",
""
],
[
"Yao",
"Hepeng",
""
],
[
"Hu",
"Jiazhong",
""
],
[
"Chen",
"Yu",
""
],
[
"Chen",
"Wenlan",
""
]
] |
2309.13159 | Joseph Chow | Xiyuan Ren, Joseph Y. J. Chow, Prateek Bansal | Nonparametric mixed logit model with market-level parameters estimated
from market share data | null | Transportation Research Part B 196 (2025) 103220 | 10.1016/j.trb.2025.103220 | null | econ.EM | http://creativecommons.org/licenses/by-sa/4.0/ | We propose a nonparametric mixed logit model that is estimated using
market-level choice share data. The model treats each market as an agent and
represents taste heterogeneity through market-specific parameters by solving a
multiagent inverse utility maximization problem, addressing the limitations of
existing market-level choice models with parametric estimation. A simulation
study is conducted to evaluate the performance of our model in terms of
estimation time, estimation accuracy, and out-of-sample predictive accuracy. In
a real data application, we estimate the travel mode choice of 53.55 million
trips made by 19.53 million residents in New York State. These trips are
aggregated based on population segments and census block group-level
origin-destination (OD) pairs, resulting in 120,740 markets. We benchmark our
model against multinomial logit (MNL), nested logit (NL), inverse product
differentiation logit (IPDL), and the BLP models. The results show that the
proposed model improves the out-of-sample accuracy from 65.30% to 81.78%, with
a computation time less than one-tenth of that taken to estimate the BLP model.
The price elasticities and diversion ratios retrieved from our model and
benchmark models exhibit similar substitution patterns. Moreover, the
market-level parameters estimated by our model provide additional insights and
facilitate their seamless integration into supply-side optimization models for
transportation design. By measuring the compensating variation for the driving
mode, we found that a $9 congestion toll would impact roughly 60 % of the total
travelers. As an application of supply-demand integration, we showed that a 50%
discount of transit fare could bring a maximum ridership increase of 9402 trips
per day under a budget of $50,000 per day.
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2023 19:50:55 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Aug 2024 15:14:19 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 19:00:39 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Ren",
"Xiyuan",
""
],
[
"Chow",
"Joseph Y. J.",
""
],
[
"Bansal",
"Prateek",
""
]
] |
2309.16565 | Gil Puig i Surroca | Ararat Harutyunyan, Gil Puig i Surroca | Colouring Complete Multipartite and Kneser-type Digraphs | 16 pages; minor corrections, updated references, added note at the
end of Section 4 | null | null | null | math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The dichromatic number of a digraph $D$ is the smallest $k$ such that $D$ can
be partitioned into $k$ acyclic subdigraphs, and the dichromatic number of an
undirected graph is the maximum dichromatic number over all its orientations.
Extending a well-known result of Lov\'{a}sz, we show that the dichromatic
number of the Kneser graph $KG(n,k)$ is $\Theta(n-2k+2)$ and that the
dichromatic number of the Borsuk graph $BG(n+1,a)$ is $n+2$ if $a$ is large
enough. We then study the list version of the dichromatic number. We show that,
for any $\varepsilon>0$ and $2\leq k\leq n^{1/2-\varepsilon}$, the list
dichromatic number of $KG(n,k)$ is $\Theta(n\ln n)$. This extends a recent
result of Bulankina and Kupavskii on the list chromatic number of $KG(n,k)$,
where the same behaviour was observed. We also show that for any $\rho>3$,
$r\geq 2$ and $m\geq\max\{\ln^{\rho}r,2\}$, the list dichromatic number of the
complete $r$-partite graph with $m$ vertices in each part is $\Theta(r\ln m)$,
extending a classical result of Alon. Finally, we give a directed analogue of
Sabidussi's theorem on the chromatic number of graph products.
| [
{
"version": "v1",
"created": "Thu, 28 Sep 2023 16:22:43 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 10:26:12 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Harutyunyan",
"Ararat",
""
],
[
"Surroca",
"Gil Puig i",
""
]
] |
2310.00717 | Peyman Azodi | Peyman Azodi, Herschel A Rabitz | Entanglement Propagation in Integrable Heisenberg Chains from a New Lens | Supplementary material document attached | null | 10.1088/2399-6528/ad829a | null | quant-ph cond-mat.stat-mech | http://creativecommons.org/licenses/by/4.0/ | The exact single-magnon entanglement evolution in Heisenberg chains is
obtained using the Quantum Correlation Transfer Function (QCTF) formulation. A
dual, i.e., frequency and time-domain, analysis shows that the transient
dynamics of individual spins' entanglement is described via a Bessel function
of the first kind. Through QCTF, we bypass the evaluation of the full system's
state for the purpose of obtaining entanglement. Although it is known that the
observable entanglement edge is formed by the arrival of a stream of
quasi-particles that travel with the maximum group velocity, we show how the
early quasi-particles travel faster than the maximum group velocity of the
chain and contribute to entanglement production. Our results can be extended to
the multi-magnon regime, therefore opening up the means to better interpret
equilibration dynamics and thermodynamics in Heisenberg chains.
| [
{
"version": "v1",
"created": "Sun, 1 Oct 2023 16:36:03 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Oct 2023 14:38:23 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 15:55:57 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Azodi",
"Peyman",
""
],
[
"Rabitz",
"Herschel A",
""
]
] |
2310.02901 | Mathew Mithra Noel | Mathew Mithra Noel, Venkataraman Muthiah-Nakarajan and Yug D Oswal | Efficient Vectorized Backpropagation Algorithms for Training Feedforward
Networks Composed of Quadratic Neurons | 8 pages | null | null | null | cs.NE cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Higher order artificial neurons whose outputs are computed by applying an
activation function to a higher order multinomial function of the inputs have
been considered in the past, but did not gain acceptance due to the extra
parameters and computational cost. However, higher order neurons have
significantly greater learning capabilities since the decision boundaries of
higher order neurons can be complex surfaces instead of just hyperplanes. The
boundary of a single quadratic neuron can be a general hyper-quadric surface
allowing it to learn many nonlinearly separable datasets. Since quadratic forms
can be represented by symmetric matrices, only $\frac{n(n+1)}{2}$ additional
parameters are needed instead of $n^2$. A quadratic Logistic regression model
is first presented. Solutions to the XOR problem with a single quadratic neuron
are considered. The complete vectorized equations for both forward and backward
propagation in feedforward networks composed of quadratic neurons are derived.
A reduced parameter quadratic neural network model with just $ n $ additional
parameters per neuron that provides a compromise between learning ability and
computational cost is presented. Comparison on benchmark classification
datasets are used to demonstrate that a final layer of quadratic neurons
enables networks to achieve higher accuracy with significantly fewer hidden
layer neurons. In particular this paper shows that any dataset composed of
$\mathcal{C}$ bounded clusters can be separated with only a single layer of
$\mathcal{C}$ quadratic neurons.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2023 15:39:57 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Jan 2024 19:22:19 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Nov 2024 06:06:02 GMT"
},
{
"version": "v4",
"created": "Mon, 21 Apr 2025 07:20:39 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Noel",
"Mathew Mithra",
""
],
[
"Muthiah-Nakarajan",
"Venkataraman",
""
],
[
"Oswal",
"Yug D",
""
]
] |
2310.04321 | Andrea Gloppen Johnsen | Andrea Gloppen Johnsen, Lesia Mitridati, Donato Zarrilli, and Jalal
Kazempour | The Value of Ancillary Services for Electrolyzers | null | null | null | null | math.OC | http://creativecommons.org/licenses/by/4.0/ | Although primarily designed for hydrogen production, electrolyzers can
support power systems by providing various ancillary services, opening new
revenue streams that enhance their economic viability. This paper investigates
the participation of an electrolyzer in frequency-supporting reserve markets,
analyzing how bid structures and activation intensities affect its value. We
develop a mixed-integer linear program to co-optimize electricity procurement
and reserve provision, and analytically derive the opportunity cost of reserve
provision, which determines the optimal bid price. Using historical price and
frequency data from western Denmark, we show that asymmetric, hourly reserve
products often entail no opportunity cost and can increase profits by up to
47%. However, energy-intensive reserves may disrupt hydrogen production and
risk unmet demand. Our findings reveal that flexible bidding can mitigate these
risks while maintaining profitability. We also highlight the benefits of
diversifying across reserve products and offer two recommendations: System
operators should reconsider reserve bid structures to better accommodate
electrolyzers, and electrolyzer owners should not overlook energy-intensive
reserve services when hydrogen demand is flexible.
| [
{
"version": "v1",
"created": "Fri, 6 Oct 2023 15:33:40 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Oct 2023 05:42:29 GMT"
},
{
"version": "v3",
"created": "Sun, 20 Apr 2025 14:17:02 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Johnsen",
"Andrea Gloppen",
""
],
[
"Mitridati",
"Lesia",
""
],
[
"Zarrilli",
"Donato",
""
],
[
"Kazempour",
"Jalal",
""
]
] |
2310.04722 | Monan Zhou Dr | Monan Zhou, Shangda Wu, Shaohua Ji, Zijin Li, Wei Li | A Holistic Evaluation of Piano Sound Quality | 15 pages, 9 figures | Proceedings of the 10th Conference on Sound and Music Technology.
CSMT 2023. Lecture Notes in Electrical Engineering, vol 1268. Springer,
Singapore | 10.1007/978-981-97-7962-8_1 | null | cs.SD cs.AI eess.AS | http://creativecommons.org/licenses/by/4.0/ | This paper aims to develop a holistic evaluation method for piano sound
quality to assist in purchasing decisions. Unlike previous studies that focused
on the effect of piano performance techniques on sound quality, this study
evaluates the inherent sound quality of different pianos. To derive quality
evaluation systems, the study uses subjective questionnaires based on a piano
sound quality dataset. The method selects the optimal piano classification
models by comparing the fine-tuning results of different pre-training models of
Convolutional Neural Networks (CNN). To improve the interpretability of the
models, the study applies Equivalent Rectangular Bandwidth (ERB) analysis. The
results reveal that musically trained individuals are better able to
distinguish between the sound quality differences of different pianos. The best
fine-tuned CNN pre-trained backbone achieves a high accuracy of 98.3% as the
piano classifier. However, the dataset is limited, and the audio is sliced to
increase its quantity, resulting in a lack of diversity and balance, so we use
focal loss to reduce the impact of data imbalance. To optimize the method, the
dataset will be expanded, or few-shot learning techniques will be employed in
future research.
| [
{
"version": "v1",
"created": "Sat, 7 Oct 2023 07:51:34 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Mar 2025 02:31:56 GMT"
},
{
"version": "v3",
"created": "Sun, 20 Apr 2025 03:54:59 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Zhou",
"Monan",
""
],
[
"Wu",
"Shangda",
""
],
[
"Ji",
"Shaohua",
""
],
[
"Li",
"Zijin",
""
],
[
"Li",
"Wei",
""
]
] |
2310.05325 | Gonzalo Cao-Labora | Gonzalo Cao-Labora, Javier G\'omez-Serrano, Jia Shi, Gigliola
Staffilani | Non-radial implosion for compressible Euler and Navier-Stokes in
$\mathbb{T}^3$ and $\mathbb{R}^3$ | 80 pages, 6 figures. To appear in Cambridge Journal of Mathematics | null | null | null | math.AP math-ph math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we construct smooth, non-radial solutions of the compressible
Euler and Navier-Stokes equation that develop an imploding finite time
singularity. Our construction is motivated by the works [Merle, Rapha\"{e}l,
Rodnianski, and Szeftel, Ann. of Math., 196(2):567-778, 2022, Ann. of Math.,
196(2):779-889, 2022], [Buckmaster, Cao-Labora, and G\'{o}mez-Serrano,
arXiv:2208.09445, 2022], but is flexible enough to handle both periodic and
non-radial initial data.
| [
{
"version": "v1",
"created": "Mon, 9 Oct 2023 01:12:00 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 13:53:07 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Cao-Labora",
"Gonzalo",
""
],
[
"Gómez-Serrano",
"Javier",
""
],
[
"Shi",
"Jia",
""
],
[
"Staffilani",
"Gigliola",
""
]
] |
2310.05796 | Ognjen To\v{s}i\'c | Ognjen To\v{s}i\'c | Harmonic projections in negative curvature II: large convex sets | 27 pages, 1 figure | null | 10.1007/s10711-025-01001-w | null | math.DG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important result in the theory of harmonic maps is due to Benoist--Hulin:
given a quasi-isometry $f:X\to Y$ between pinched Hadamard manifolds, there
exists a unique harmonic map at a finite distance from $f$. Here we show
existence of harmonic maps under a weaker condition on $f$, that we call
non-collapsing -- we require that the following two conditions hold uniformly
in $x\in X$: (1) average distance from $f(x)$ to $f(y)$ for $y$ on the sphere
of radius $R$ centered at $x$ grows linearly with $R$ (2) the pre-image under
$f$ of small cones with apex $f(x)$ have low harmonic measures on spheres
centered at $x$. Using these ideas, we also continue the previous work of the
author on existence of harmonic maps that are at a finite distance from
projections to certain convex sets. We show this existence in a pinched
negative curvature setting, when the convex set is large enough. For hyperbolic
spaces, this includes the convex hulls of open sets in the sphere at infinity
with sufficiently regular boundary.
| [
{
"version": "v1",
"created": "Mon, 9 Oct 2023 15:30:21 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Dec 2024 21:42:48 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Apr 2025 11:09:48 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Tošić",
"Ognjen",
""
]
] |
2310.06669 | Artem Kalmykov | Artem Kalmykov | Yangians, Mirabolic Subalgebras, and Whittaker Vectors | null | SIGMA 21 (2025), 025, 54 pages | 10.3842/SIGMA.2025.025 | null | math.RT math.QA | http://creativecommons.org/licenses/by/4.0/ | We construct an element in a completion of the universal enveloping algebra
of $\mathfrak{gl}_N$, which we call the Kirillov projector, that connects the
topics of the title: on the one hand, it is defined using the evaluation
homomorphism from the Yangian of $\mathfrak{gl}_N$, on the other hand, it gives
a canonical projection onto the space of Whittaker vectors for any Whittaker
module over the mirabolic subalgebra. Using the Kirillov projector, we deduce
some categorical properties of Whittaker modules, for instance, we prove a
mirabolic analog of Kostant's theorem. We also show that it quantizes a
rational version of the Cremmer-Gervais $r$-matrix. As application, we
construct a universal vertex-IRF transformation from the standard dynamical
$R$-matrix to this constant one in categorical terms.
| [
{
"version": "v1",
"created": "Tue, 10 Oct 2023 14:45:58 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Mar 2024 00:25:55 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 21:03:11 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Kalmykov",
"Artem",
""
]
] |
2310.07481 | Liu Zhao | Long Cui, Xin Hao and Liu Zhao | A general relativistic kinetic theory approach to linear transport in
generic hydrodynamic frame | 16 pages, 1 figure. Title and substantial text changes, published
version | Journal of Non-Equilibrium Thermodynamics, 2025 | 10.1515/jnet-2024-0024 | null | gr-qc cond-mat.stat-mech | http://creativecommons.org/licenses/by/4.0/ | In this study, we investigate the linear transport of neutral system within
the framework of relativistic kinetic theory. Under the relaxation time
approximation, we obtain an iterative solution to the relativistic Boltzmann
equation in generic stationary spacetime. This solution provides a scheme to
study non-equilibrium system order by order. Our calculations are performed in
generic hydrodynamic frame, and the results can be reduced to a specific
hydrodynamic frame by imposing constraints. As a specific example, we
analytically calculated the covariant expressions of the particle flow and the
energy momentum tensor up to the first order in relaxation time. Finally and
most importantly, we present all 14 kinetic coefficients for a neutral system,
which are verified to satisfy the Onsager reciprocal relation in a generic
hydrodynamic frame and guarantee a non-negative entropy production in the frame
where the first order conservation laws are restored.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2023 13:27:05 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 01:53:23 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Cui",
"Long",
""
],
[
"Hao",
"Xin",
""
],
[
"Zhao",
"Liu",
""
]
] |
2310.07729 | Siwei Cai | Bill Cai, Fei Lu, Lifeng Zhou | Energy-Aware Routing Algorithm for Mobile Ground-to-Air Charging | null | null | null | null | cs.RO cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the problem of energy-constrained planning for a cooperative
system of an Unmanned Ground Vehicles (UGV) and an Unmanned Aerial Vehicle
(UAV). In scenarios where the UGV serves as a mobile base to ferry the UAV and
as a charging station to recharge the UAV, we formulate a novel
energy-constrained routing problem. To tackle this problem, we design an
energy-aware routing algorithm, aiming to minimize the overall mission duration
under the energy limitations of both vehicles. The algorithm first solves a
Traveling Salesman Problem (TSP) to generate a guided tour. Then, it employs
the Monte-Carlo Tree Search (MCTS) algorithm to refine the tour and generate
paths for the two vehicles. We evaluate the performance of our algorithm
through extensive simulations and a proof-of-concept experiment. The results
show that our algorithm consistently achieves near-optimal mission time and
maintains fast running time across a wide range of problem instances.
| [
{
"version": "v1",
"created": "Sat, 30 Sep 2023 00:19:05 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Aug 2024 20:02:24 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 21:59:34 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Cai",
"Bill",
""
],
[
"Lu",
"Fei",
""
],
[
"Zhou",
"Lifeng",
""
]
] |
2310.07800 | Bahareh Nikpour | Bahareh Nikpour, Narges Armanfard | Language-Guided Reinforcement Learning for Hard Attention in Few-Shot
Learning | null | null | null | null | cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Attention mechanisms have demonstrated significant potential in enhancing
learning models by identifying key portions of input data, particularly in
scenarios with limited training samples. Inspired by human perception, we
propose that focusing on essential data segments, rather than the entire
dataset, can improve the accuracy and reliability of the learning models.
However, identifying these critical data segments, or "hard attention finding,"
is challenging, especially in few-shot learning, due to the scarcity of
training data and the complexity of model parameters. To address this, we
introduce LaHA, a novel framework that leverages language-guided deep
reinforcement learning to identify and utilize informative data regions,
thereby improving both interpretability and performance. Extensive experiments
on benchmark datasets validate the effectiveness of LaHA.
| [
{
"version": "v1",
"created": "Wed, 11 Oct 2023 18:33:17 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Oct 2024 14:19:24 GMT"
},
{
"version": "v3",
"created": "Sun, 20 Apr 2025 17:24:04 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Nikpour",
"Bahareh",
""
],
[
"Armanfard",
"Narges",
""
]
] |
2310.09107 | Hanmeng Liu | Hanmeng liu, Zhiyang Teng, Ruoxi Ning, Yiran Ding, Xiulai Li,
Xiaozhang Liu, Yue Zhang | GLoRE: Evaluating Logical Reasoning of Large Language Models | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Large language models (LLMs) have shown significant general language
understanding abilities. However, there has been a scarcity of attempts to
assess the logical reasoning capacities of these LLMs, an essential facet of
natural language understanding. To encourage further investigation in this
area, we introduce GLoRE, a General Logical Reasoning Evaluation platform that
not only consolidates diverse datasets but also standardizes them into a
unified format suitable for evaluating large language models across zero-shot
and few-shot scenarios. Our experimental results show that compared to the
performance of humans and supervised fine-tuning models, the logical reasoning
capabilities of large reasoning models, such as OpenAI's o1 mini, DeepSeek R1
and QwQ-32B, have seen remarkable improvements, with QwQ-32B achieving the
highest benchmark performance to date. GLoRE is designed as a living project
that continuously integrates new datasets and models, facilitating robust and
comparative assessments of model performance in both commercial and Huggingface
communities.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2023 13:52:15 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 04:31:16 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"liu",
"Hanmeng",
""
],
[
"Teng",
"Zhiyang",
""
],
[
"Ning",
"Ruoxi",
""
],
[
"Ding",
"Yiran",
""
],
[
"Li",
"Xiulai",
""
],
[
"Liu",
"Xiaozhang",
""
],
[
"Zhang",
"Yue",
""
]
] |
2310.10232 | Dongkyu Lee | Dongkyu Lee, Ziqi Wang, Junho Song | Efficient seismic reliability and fragility analysis of lifeline
networks using subset simulation | null | null | 10.1016/j.ress.2025.110947 | null | stat.AP stat.CO | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Various simulation-based and analytical methods have been developed to
evaluate the seismic fragilities of individual structures. However, a
community's seismic safety and resilience are substantially affected by network
reliability, determined not only by component fragilities but also by network
topology and commodity/information flows. However, seismic reliability analyses
of networks often encounter significant challenges due to complex network
topologies, interdependencies among ground motions, and low failure
probabilities. This paper proposes to overcome these challenges by a
variance-reduction method for network fragility analysis using subset
simulation. The binary network limit-state function in the subset simulation is
reformulated into more informative piecewise continuous functions. The proposed
limit-state functions quantify the proximity of each sample to a potential
network failure domain, thereby enabling the construction of specialized
intermediate failure events, which can be utilized in subset simulation and
other sequential Monte Carlo approaches. Moreover, by discovering an implicit
connection between intermediate failure events and seismic intensity, we
propose a technique to obtain the entire network fragility curve with a single
execution of specialized subset simulation. Numerical examples demonstrate that
the proposed method can effectively evaluate system-level fragility for
large-scale networks.
| [
{
"version": "v1",
"created": "Mon, 16 Oct 2023 09:42:27 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Lee",
"Dongkyu",
""
],
[
"Wang",
"Ziqi",
""
],
[
"Song",
"Junho",
""
]
] |
2310.12935 | Andrew Craig | Andrew Craig and Claudette Robinson | Representing Sugihara monoids via weakening relations | 29 pages, 1 figure | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that all Sugihara monoids can be represented as algebras of binary
relations, with the monoid operation given by relational composition. Moreover,
the binary relations are weakening relations. The first step is to obtain an
explicit relational representation of all finite odd Sugihara chains. Our
construction mimics that of Maddux (2010), where a relational representation of
the finite even Sugihara chains is given. We define the class of representable
Sugihara monoids as those which can be represented as reducts of distributive
involutive FL-algebras of binary relations. We then show that the class of
representable distributive involutive FL-algebras is closed under
ultraproducts. This fact is used to demonstrate that the two infinite Sugihara
monoids that generate the quasivariety are also representable. From this it
follows that all Sugihara monoids are representable.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2023 17:33:21 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Jul 2024 08:06:41 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Apr 2025 20:29:46 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Craig",
"Andrew",
""
],
[
"Robinson",
"Claudette",
""
]
] |
2310.14848 | Zhibo Xing | Zhibo Xing, Zijian Zhang, Ziang Zhang, Zhen Li, Meng Li, Jiamou Liu,
Zongyang Zhang, Yi Zhao, Qi Sun, Liehuang Zhu, Giovanni Russello | Zero-Knowledge Proof-based Verifiable Decentralized Machine Learning in
Communication Network: A Comprehensive Survey | null | null | 10.1109/COMST.2025.3561657 | null | cs.LG cs.CR | http://creativecommons.org/licenses/by/4.0/ | Over recent decades, machine learning has significantly advanced network
communication, enabling improved decision-making, user behavior analysis, and
fault detection. Decentralized approaches, where participants exchange
computation results instead of raw private data, mitigate these risks but
introduce challenges related to trust and verifiability. A critical issue
arises: How can one ensure the integrity and validity of computation results
shared by other participants? Existing survey articles predominantly address
security and privacy concerns in decentralized machine learning, whereas this
survey uniquely highlights the emerging issue of verifiability. Recognizing the
critical role of zero-knowledge proofs in ensuring verifiability, we present a
comprehensive review of Zero-Knowledge Proof-based Verifiable Machine Learning
(ZKP-VML). To clarify the research problem, we present a definition of ZKP-VML
consisting of four algorithms, along with several corresponding key security
properties. Besides, we provide an overview of the current research landscape
by systematically organizing the research timeline and categorizing existing
schemes based on their security properties. Furthermore, through an in-depth
analysis of each existing scheme, we summarize their technical contributions
and optimization strategies, aiming to uncover common design principles
underlying ZKP-VML schemes. Building on the reviews and analysis presented, we
identify current research challenges and suggest future research directions. To
the best of our knowledge, this is the most comprehensive survey to date on
verifiable decentralized machine learning and ZKP-VML.
| [
{
"version": "v1",
"created": "Mon, 23 Oct 2023 12:15:23 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Mar 2025 12:52:30 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Xing",
"Zhibo",
""
],
[
"Zhang",
"Zijian",
""
],
[
"Zhang",
"Ziang",
""
],
[
"Li",
"Zhen",
""
],
[
"Li",
"Meng",
""
],
[
"Liu",
"Jiamou",
""
],
[
"Zhang",
"Zongyang",
""
],
[
"Zhao",
"Yi",
""
],
[
"Sun",
"Qi",
""
],
[
"Zhu",
"Liehuang",
""
],
[
"Russello",
"Giovanni",
""
]
] |
2310.18388 | George Iosifidis Dr | Konstantinos Benidis, Georgios Paschos, Martin Gross, George Iosifidis | Last Truck Scheduling for Middle-mile Next-day Delivery Coverage | null | null | null | null | cs.DS | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We consider an e-commerce retailer operating a supply chain that consists of
middle- and last-mile transportation, and study its ability to deliver products
stored in warehouses within a day from customer's order time. Successful
next-day delivery requires inventory availability and timely truck schedules in
the middle-mile and in this paper we assume a fixed inventory position and
focus on optimizing the middle-mile last truck schedule. We formulate a novel
optimization problem which decides the departure of the last truck at each
(potential) network connection in order to maximize the number of customer
orders that are served with next-day promise. We show that the respective
next-day delivery optimization is a combinatorial problem that is NP-hard to
approximate within $(1-1/e)opt\approx 0.632opt$, hence every retailer that
offers one-day deliveries has to deal with this complexity barrier. We study
three variants of the problem motivated by operational constraints that
different retailers encounter, and propose solutions schemes tailored to each
problem's properties. To that end, we rely on greedy submodular maximization,
pipage rounding techniques, and Lagrangian heuristics. The algorithms are
scalable, offer worst-case optimality gap guarantees, and evaluated in
realistic datasets and network scenarios were found to achieve even
near-optimal results.
| [
{
"version": "v1",
"created": "Fri, 27 Oct 2023 10:32:12 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Apr 2025 19:12:19 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Benidis",
"Konstantinos",
""
],
[
"Paschos",
"Georgios",
""
],
[
"Gross",
"Martin",
""
],
[
"Iosifidis",
"George",
""
]
] |
2310.18881 | Hongye Yu | Hongye Yu, Tzu-Chieh Wei | Efficient separate quantification of state preparation errors and
measurement errors on quantum computers and their mitigation | 18 pages, 11 figures | null | null | null | quant-ph | http://creativecommons.org/licenses/by-sa/4.0/ | Current noisy quantum computers have multiple types of errors, which can
occur in the state preparation, measurement/readout, and gate operation, as
well as intrinsic decoherence and relaxation. Partly motivated by the booming
of intermediate-scale quantum processors, measurement and gate errors have been
recently extensively studied, and several methods of mitigating them have been
proposed and formulated in software packages (e.g., in IBM Qiskit). Despite
this, the state preparation error and the procedure to quantify it have not yet
been standardized, as state preparation and measurement errors are usually
considered not directly separable. Inspired by a recent work of Laflamme, Lin,
and Mor [Phys. Rev. A 106, 012439 (2022)], we propose a simple and
resource-efficient approach to quantify separately the state preparation and
readout error rates. With these two errors separately quantified, we also
propose methods to mitigate them separately, especially mitigating state
preparation errors with linear (with the number of qubits) complexity. As a
result of the separate mitigation, we show that the fidelity of the outcome can
be improved by an order of magnitude compared to the standard measurement error
mitigation scheme. We also show that the quantification and mitigation scheme
is resilient against gate noise and can be immediately applied to current noisy
quantum computers. To demonstrate this, we present results from cloud
experiments on IBM's superconducting quantum computers. The results indicate
that the state preparation error rate is also an important metric for qubit
metrology that can be efficiently obtained.
| [
{
"version": "v1",
"created": "Sun, 29 Oct 2023 02:51:06 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Apr 2025 20:14:33 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Yu",
"Hongye",
""
],
[
"Wei",
"Tzu-Chieh",
""
]
] |
2310.18961 | Qihang Zhou | Qihang Zhou, Guansong Pang, Yu Tian, Shibo He, Jiming Chen | AnomalyCLIP: Object-agnostic Prompt Learning for Zero-shot Anomaly
Detection | Accepted by ICLR 2024 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Zero-shot anomaly detection (ZSAD) requires detection models trained using
auxiliary data to detect anomalies without any training sample in a target
dataset. It is a crucial task when training data is not accessible due to
various concerns, eg, data privacy, yet it is challenging since the models need
to generalize to anomalies across different domains where the appearance of
foreground objects, abnormal regions, and background features, such as
defects/tumors on different products/organs, can vary significantly. Recently
large pre-trained vision-language models (VLMs), such as CLIP, have
demonstrated strong zero-shot recognition ability in various vision tasks,
including anomaly detection. However, their ZSAD performance is weak since the
VLMs focus more on modeling the class semantics of the foreground objects
rather than the abnormality/normality in the images. In this paper we introduce
a novel approach, namely AnomalyCLIP, to adapt CLIP for accurate ZSAD across
different domains. The key insight of AnomalyCLIP is to learn object-agnostic
text prompts that capture generic normality and abnormality in an image
regardless of its foreground objects. This allows our model to focus on the
abnormal image regions rather than the object semantics, enabling generalized
normality and abnormality recognition on diverse types of objects. Large-scale
experiments on 17 real-world anomaly detection datasets show that AnomalyCLIP
achieves superior zero-shot performance of detecting and segmenting anomalies
in datasets of highly diverse class semantics from various defect inspection
and medical imaging domains. Code will be made available at
https://github.com/zqhang/AnomalyCLIP.
| [
{
"version": "v1",
"created": "Sun, 29 Oct 2023 10:03:49 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Nov 2023 05:21:58 GMT"
},
{
"version": "v3",
"created": "Sun, 3 Dec 2023 07:26:16 GMT"
},
{
"version": "v4",
"created": "Sun, 4 Feb 2024 10:28:24 GMT"
},
{
"version": "v5",
"created": "Tue, 6 Feb 2024 16:30:05 GMT"
},
{
"version": "v6",
"created": "Sat, 17 Feb 2024 16:12:42 GMT"
},
{
"version": "v7",
"created": "Thu, 14 Mar 2024 14:08:05 GMT"
},
{
"version": "v8",
"created": "Sat, 16 Mar 2024 07:57:23 GMT"
},
{
"version": "v9",
"created": "Mon, 21 Apr 2025 08:17:03 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Zhou",
"Qihang",
""
],
[
"Pang",
"Guansong",
""
],
[
"Tian",
"Yu",
""
],
[
"He",
"Shibo",
""
],
[
"Chen",
"Jiming",
""
]
] |
2310.19279 | Uday S. Goteti | Uday S. Goteti and Robert C. Dynes | Information dynamics of our brains in dynamically driven disordered
superconducting loop networks | 6 figures, 26 pages | null | null | null | cond-mat.dis-nn cond-mat.stat-mech cond-mat.supr-con | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Complex systems of many interacting components exhibit patterns of recurrence
and emergent behaviors in their time evolution that can be understood from a
new perspective of physics of information dynamics, modeled after one such
system, our brains. A generic brain-like network model is derived from a system
of disordered superconducting loops with Josephson junction oscillators to
demonstrate these behaviors. The loops can trap multiples of fluxons that
represent quantized information units in many distinct memory configurations
populating a state space. The state can be updated by exciting the junctions to
allow the movement of fluxons through the network as the current through them
surpasses their thresholds. Numerical simulations performed with a lumped
circuit model of a 4-loop network show that information written through
excitations is translated into stable states of trapped flux and their time
evolution. Experimental implementation on the 4-loop network shows dynamically
stable flux flow in each pathway characterized by the junction firing
statistics. The network separates information from multiple excitations into
state categories with large energy barriers observed in simulations that
correspond to different flux (information) flow patterns observed across
junctions in experiments. Strong evidence for associative and time-dependent
(short-to-long-term) memories distributed across the network is observed,
dependent on its intrinsic and geometrical properties as described by the
model. Loop network topology abstraction using the model separates the flowing
patterns of information from its physical constraints and describes systems of
any scale and complexity. The accuracy of flow statistics are limited by the
resolution of local external measuring clock(s) revealing the universal nature
of information dynamics through the stated two principles.
| [
{
"version": "v1",
"created": "Mon, 30 Oct 2023 05:33:10 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Nov 2023 17:40:09 GMT"
},
{
"version": "v3",
"created": "Sun, 20 Oct 2024 18:56:35 GMT"
},
{
"version": "v4",
"created": "Wed, 29 Jan 2025 21:32:39 GMT"
},
{
"version": "v5",
"created": "Mon, 14 Apr 2025 15:49:29 GMT"
},
{
"version": "v6",
"created": "Mon, 21 Apr 2025 08:54:00 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Goteti",
"Uday S.",
""
],
[
"Dynes",
"Robert C.",
""
]
] |
2310.20460 | Lin Gui | Lin Gui, Yuchao Jiang, Jingshu Wang | Aggregating Dependent Signals with Heavy-Tailed Combination Tests | null | null | null | null | stat.ME math.ST stat.AP stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Combining dependent p-values poses a long-standing challenge in statistical
inference, particularly when aggregating findings from multiple methods to
enhance signal detection. Recently, p-value combination tests based on
regularly varying-tailed distributions, such as the Cauchy combination test and
harmonic mean p-value, have attracted attention for their robustness to unknown
dependence. This paper provides a theoretical and empirical evaluation of these
methods under an asymptotic regime where the number of p-values is fixed and
the global test significance level approaches zero. We examine two types of
dependence among the p-values. First, when p-values are pairwise asymptotically
independent, such as with bivariate normal test statistics with no perfect
correlation, we prove that these combination tests are asymptotically valid.
However, they become equivalent to the Bonferroni test as the significance
level tends to zero for both one-sided and two-sided p-values. Empirical
investigations suggest that this equivalence can emerge at moderately small
significance levels. Second, under pairwise quasi-asymptotic dependence, such
as with bivariate t-distributed test statistics, our simulations suggest that
these combination tests can remain valid and exhibit notable power gains over
Bonferroni, even as the significance level diminishes. These findings highlight
the potential advantages of these combination tests in scenarios where p-values
exhibit substantial dependence. Our simulations also examine how test
performance depends on the support and tail heaviness of the underlying
distributions.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2023 13:54:11 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Nov 2024 21:35:23 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 23:59:36 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Gui",
"Lin",
""
],
[
"Jiang",
"Yuchao",
""
],
[
"Wang",
"Jingshu",
""
]
] |
2311.00179 | Wojciech O\.za\'nski | Anuj Kumar, Wojciech O\.za\'nski | A simple proof of linear instability of shear flows with application to
vortex sheets | 13 pages, 1 figure | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the construction of linear instability of parallel shear flows,
which was developed by Zhiwu Lin (SIAM J. Math. Anal. 35(2), 2003). We give an
alternative simple proof in Sobolev setting of the problem, which exposes the
mathematical role of the Plemelj-Sochocki formula in the emergence of the
instability, as well as does not require the cone condition. Moreover, we
localize this approach to obtain an approximation of the Kelvin-Helmholtz
instability of a flat vortex sheet.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2023 22:50:28 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 23:21:45 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Kumar",
"Anuj",
""
],
[
"Ożański",
"Wojciech",
""
]
] |
2311.01373 | Haosen Yang | Haosen Yang, Chuofan Ma, Bin Wen, Yi Jiang, Zehuan Yuan, Xiatian Zhu | Recognize Any Regions | NeurIPS 2024. Github:
https://github.com/Surrey-UPLab/Recognize-Any-Regions | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding the semantics of individual regions or patches of unconstrained
images, such as open-world object detection, remains a critical yet challenging
task in computer vision. Building on the success of powerful image-level
vision-language (ViL) foundation models like CLIP, recent efforts have sought
to harness their capabilities by either training a contrastive model from
scratch with an extensive collection of region-label pairs or aligning the
outputs of a detection model with image-level representations of region
proposals. Despite notable progress, these approaches are plagued by
computationally intensive training requirements, susceptibility to data noise,
and deficiency in contextual information. To address these limitations, we
explore the synergistic potential of off-the-shelf foundation models,
leveraging their respective strengths in localization and semantics. We
introduce a novel, generic, and efficient architecture, named RegionSpot,
designed to integrate position-aware localization knowledge from a localization
foundation model (e.g., SAM) with semantic information from a ViL model (e.g.,
CLIP). To fully exploit pretrained knowledge while minimizing training
overhead, we keep both foundation models frozen, focusing optimization efforts
solely on a lightweight attention-based knowledge integration module. Extensive
experiments in open-world object recognition show that our RegionSpot achieves
significant performance gain over prior alternatives, along with substantial
computational savings (e.g., training our model with 3 million data in a single
day using 8 V100 GPUs). RegionSpot outperforms GLIP-L by 2.9 in mAP on LVIS val
set, with an even larger margin of 13.1 AP for more challenging and rare
categories, and a 2.5 AP increase on ODinW. Furthermore, it exceeds
GroundingDINO-L by 11.0 AP for rare categories on the LVIS minival set.
| [
{
"version": "v1",
"created": "Thu, 2 Nov 2023 16:31:49 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 16:28:14 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 20:22:43 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Yang",
"Haosen",
""
],
[
"Ma",
"Chuofan",
""
],
[
"Wen",
"Bin",
""
],
[
"Jiang",
"Yi",
""
],
[
"Yuan",
"Zehuan",
""
],
[
"Zhu",
"Xiatian",
""
]
] |
2311.05865 | Keishichiro Tanaka | Keishichiro Tanaka | A study for the energy structure of the Mott system with a low-energy
excitation, in terms of the pseudo-gap in HTSC | 7 pages, 9 figures | null | null | null | cond-mat.str-el | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Mott system with a low-energy excitation may well constitute the
underlying system for high temperature superconductivity (HTSC) of under-doped
cuprates. This manuscript explores the above through the Hubbard-1
approximation (the Green function method), especially in terms of its
self-energy while evaluating the calculation of self-energy using effective
mass ratio. Results show it appears the pseudo-gap of HTSC is due to the
self-energy effect on the quasi-particle excitation of the Mott's J.
| [
{
"version": "v1",
"created": "Fri, 10 Nov 2023 04:38:12 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Sep 2024 00:07:22 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Nov 2024 04:55:07 GMT"
},
{
"version": "v4",
"created": "Sun, 20 Apr 2025 23:59:37 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Tanaka",
"Keishichiro",
""
]
] |
2311.10548 | Suvarthi Sarkar Mr. | Suvarthi Sarkar, Akshat Arun, Harshit Surekha, Aryabartta Sahu | Efficient Profit Maximization in Reliability Concerned Static Vehicular
Cloud System | null | null | 10.1016/j.future.2025.107850 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern electric VUs are equipped with a variety of increasingly potent
computing, communication, and storage resources, and with this tremendous
computation power in their arsenal can be used to enhance the computing power
of regular cloud systems, which is termed as vehicular cloud. Unlike in the
traditional cloud computing resources, these vehicular cloud resource moves
around and participates in the vehicular cloud for a sporadic duration at
parking places, shopping malls, etc. This introduces the dynamic nature of
vehicular resource participation in the vehicular cloud. As the user-submitted
task gets allocated on these vehicular units for execution and the dynamic stay
nature of vehicular units, enforce the system to ensure the reliability of task
execution by allocating multiple redundant vehicular units for the task.
In this work, we are maximizing the profit of vehicular cloud by ensuring the
reliability of task execution where user tasks come online manner with
different revenue, execution, and deadline. We propose an efficient approach to
solve this problem by considering (a) task classification based on the deadline
and laxity of the task, (b) ordering of tasks for task admission based on the
expected profit of the task, (c) classification of vehicular units based in
expected residency time and reliability concerned redundant allocation of tasks
of vehicular units considering this classification and (d) handing dynamic
scenario of the vehicular unit leaving the cloud system by copying the maximum
percentage of executed virtual machine of the task to the substitute unit. We
compared our proposed profit maximization approach with the state of art
approach and showed that our approach outperforms the state of art approach
with an extra 10\% to 20\% profit margin.
| [
{
"version": "v1",
"created": "Fri, 17 Nov 2023 14:20:17 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Sarkar",
"Suvarthi",
""
],
[
"Arun",
"Akshat",
""
],
[
"Surekha",
"Harshit",
""
],
[
"Sahu",
"Aryabartta",
""
]
] |
2311.10562 | Lucas Fabian Hackl | Erik Aurell, Lucas Hackl, Pawe{\l} Horodecki, Robert H. Jonsson, Mario
Kieburg | Random pure Gaussian states and Hawking radiation | Published version, with supplementary material. Main paper 7 pages, 3
figures. Supplementary material 30 pages, 1 figure | Phys. Rev. Lett. 133, 060202 (2024) | 10.1103/PhysRevLett.133.060202 | NORDITA 2023-094 (for co-author RHJ) | gr-qc cond-mat.stat-mech quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A black hole evaporates by Hawking radiation. Each mode of that radiation is
thermal. If the total state is nevertheless to be pure, modes must be
entangled. Estimating the minimum size of this entanglement has been an
important outstanding issue. We develop a new theory of constrained random
symplectic transformations, based on that the total state is pure and Gaussian
with given marginals. In the random constrained symplectic model we then
compute the distribution of mode-mode correlations, from which we bound
mode-mode entanglement. Modes of frequency much larger than $\frac{k_B
T_{H}(t)}{\hbar}$ are not populated at time $t$ and drop out of the analysis.
Among the other modes we find that correlations and hence entanglement between
relatively thinly populated modes (early-time high-frequency modes and/or late
modes of any frequency) to be strongly suppressed. Relatively highly populated
modes (early-time low-frequency modes) can on the other hand be strongly
correlated, but a detailed analysis reveals that they are nevertheless very
unlikely to be entangled. Our analysis hence establishes that restoring
unitarity after a complete evaporation of a black hole does not require any
significant quantum entanglement between any pair of Hawking modes. Our
analysis further gives exact general expressions for the distribution of
mode-mode correlations in random, pure, Gaussian states with given marginals,
which may have applications beyond black hole physics.
| [
{
"version": "v1",
"created": "Fri, 17 Nov 2023 14:54:03 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Dec 2023 12:44:42 GMT"
},
{
"version": "v3",
"created": "Wed, 7 Aug 2024 19:47:33 GMT"
},
{
"version": "v4",
"created": "Sun, 20 Apr 2025 14:45:28 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Aurell",
"Erik",
""
],
[
"Hackl",
"Lucas",
""
],
[
"Horodecki",
"Paweł",
""
],
[
"Jonsson",
"Robert H.",
""
],
[
"Kieburg",
"Mario",
""
]
] |
2311.10960 | Pengcheng Su | Pengcheng Su, Haibo Cheng, Wenting Li, and Ping Wang | An Information-theoretic Security Analysis of Honeyword | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Honeyword is a representative "honey" technique that employs decoy objects to
mislead adversaries and protect the real ones. To assess the security of a
Honeyword system, two metrics--flatness and success-number--have been proposed
and evaluated using various simulated attackers. Existing evaluations typically
apply statistical learning methods to distinguish real passwords from decoys on
real-world datasets. However, such evaluations may overestimate the system's
security, as more effective distinguishing attacks could potentially exist.
In this paper, we aim to analyze the security of Honeyword systems under the
strongest theoretical attack, rather than relying on specific, expert-crafted
attacks evaluated in prior experimental studies. We first derive mathematical
expressions for the flatness and success-number under the strongest attack. We
conduct analyses and computations for several typical scenarios, and determine
the security of honeyword generation methods using a uniform distribution and
the List model as examples.
We further evaluate the security of existing honeyword generation methods
based on password probability models (PPMs), which depends on the sample size
used for training. We investigate, for the first time, the sample complexity of
several representative PPMs, introducing two novel polynomial-time
approximation schemes for computing the total variation between PCFG models and
between higher-order Markov models. Our experimental results show that for
small-scale password distributions, sample sizes on the order of
millions--often tens of millions--are required to reduce the total variation
below 0.1. A surprising result is that we establish an equivalence between
flatness and total variation, thus bridging the theoretical study of Honeyword
systems with classical information theory. Finally, we discuss the practical
implications of our findings.
| [
{
"version": "v1",
"created": "Sat, 18 Nov 2023 03:54:37 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 11:44:15 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Su",
"Pengcheng",
""
],
[
"Cheng",
"Haibo",
""
],
[
"Li",
"Wenting",
""
],
[
"Wang",
"Ping",
""
]
] |
2311.11378 | Hoang Nguyen Canh | Hoang C. Nguyen, Haeil Lee, Junmo Kim | Inspecting Explainability of Transformer Models with Additional
Statistical Information | Accepted at Responsible Computer Vision workshop at ECCV 2022 | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Transformer becomes more popular in the vision domain in recent years so
there is a need for finding an effective way to interpret the Transformer model
by visualizing it. In recent work, Chefer et al. can visualize the Transformer
on vision and multi-modal tasks effectively by combining attention layers to
show the importance of each image patch. However, when applying to other
variants of Transformer such as the Swin Transformer, this method can not focus
on the predicted object. Our method, by considering the statistics of tokens in
layer normalization layers, shows a great ability to interpret the
explainability of Swin Transformer and ViT.
| [
{
"version": "v1",
"created": "Sun, 19 Nov 2023 17:22:50 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2025 08:01:14 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Nguyen",
"Hoang C.",
""
],
[
"Lee",
"Haeil",
""
],
[
"Kim",
"Junmo",
""
]
] |
2311.12231 | Sergei Ivanov | Sergei Ivanov, Daniil Mamaev, Anya Nordskova | Local Blaschke--Kakutani ellipsoid characterization and Banach's
isometric subspaces problem | 20 pages, v2: changed title, extended introduction | null | null | null | math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove the following local version of Blaschke--Kakutani's characterization
of ellipsoids: Let $V$ be a finite-dimensional real vector space, $B\subset V$
a convex body with 0 in its interior, and ${2\le k<\dim V}$ an integer. Suppose
that the body $B$ is contained in a cylinder based on the cross-section $B \cap
X$ for every $k$-plane $X$ from a connected open set of linear $k$-planes in
$V$. Then in the region of $V$ swept by these $k$-planes $B$ coincides with
either an ellipsoid, or a cylinder over an ellipsoid, or a cylinder over a
$k$-dimensional base.
For $k=2$ and $k=3$ we obtain as a corollary a local solution to Banach's
isometric subspaces problem: If all cross-sections of $B$ by $k$-planes from a
connected open set are linearly equivalent, then the same conclusion as above
holds.
| [
{
"version": "v1",
"created": "Mon, 20 Nov 2023 23:04:47 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 12:14:22 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Ivanov",
"Sergei",
""
],
[
"Mamaev",
"Daniil",
""
],
[
"Nordskova",
"Anya",
""
]
] |
2311.12304 | Risto Miikkulainen | Daniel Young, Olivier Francon, Elliot Meyerson, Clemens Schwingshackl,
Jacob Bieker, Hugo Cunha, Babak Hodjat, and Risto Miikkulainen | Discovering Effective Policies for Land-Use Planning with Neuroevolution | null | null | null | null | cs.NE cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | How areas of land are allocated for different uses, such as forests, urban
areas, and agriculture, has a large effect on the terrestrial carbon balance,
and therefore climate change. Based on available historical data on land-use
changes and a simulation of the associated carbon emissions and removals, a
surrogate model can be learned that makes it possible to evaluate the different
options available to decision-makers efficiently. An evolutionary search
process can then be used to discover effective land-use policies for specific
locations. Such a system was built on the Project Resilience platform and
evaluated with the Land-Use Harmonization dataset LUH2 and the bookkeeping
model BLUE. It generates Pareto fronts that trade off carbon impact and amount
of land-use change customized to different locations, thus providing a
proof-of-concept tool that is potentially useful for land-use planning.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2023 02:46:14 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Dec 2023 22:03:03 GMT"
},
{
"version": "v3",
"created": "Fri, 9 Feb 2024 22:22:58 GMT"
},
{
"version": "v4",
"created": "Sat, 30 Mar 2024 19:16:29 GMT"
},
{
"version": "v5",
"created": "Tue, 2 Apr 2024 03:35:02 GMT"
},
{
"version": "v6",
"created": "Sun, 22 Dec 2024 13:37:35 GMT"
},
{
"version": "v7",
"created": "Fri, 18 Apr 2025 21:39:11 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Young",
"Daniel",
""
],
[
"Francon",
"Olivier",
""
],
[
"Meyerson",
"Elliot",
""
],
[
"Schwingshackl",
"Clemens",
""
],
[
"Bieker",
"Jacob",
""
],
[
"Cunha",
"Hugo",
""
],
[
"Hodjat",
"Babak",
""
],
[
"Miikkulainen",
"Risto",
""
]
] |
2311.14381 | Fei Cheng | Ming Li, Ariunaa Enkhtur, Beverley Anne Yamamoto, Fei Cheng, Lilan
Chen | Potential Societal Biases of ChatGPT in Higher Education: A Scoping
Review | Open Praxis | 2025, 17(1), pp.79-94 | 10.55982/openpraxis.17.1.750 | null | cs.CY cs.AI | http://creativecommons.org/licenses/by/4.0/ | Purpose:Generative Artificial Intelligence (GAI) models, such as ChatGPT, may
inherit or amplify societal biases due to their training on extensive datasets.
With the increasing usage of GAI by students, faculty, and staff in higher
education institutions (HEIs), it is urgent to examine the ethical issues and
potential biases associated with these technologies.
Design/Approach/Methods:This scoping review aims to elucidate how biases
related to GAI in HEIs have been researched and discussed in recent academic
publications. We categorized the potential societal biases that GAI might cause
in the field of higher education. Our review includes articles written in
English, Chinese, and Japanese across four main databases, focusing on GAI
usage in higher education and bias. Findings:Our findings reveal that while
there is meaningful scholarly discussion around bias and discrimination
concerning LLMs in the AI field, most articles addressing higher education
approach the issue superficially. Few articles identify specific types of bias
under different circumstances, and there is a notable lack of empirical
research. Most papers in our review focus primarily on educational and research
fields related to medicine and engineering, with some addressing English
education. However, there is almost no discussion regarding the humanities and
social sciences. Additionally, a significant portion of the current discourse
is in English and primarily addresses English-speaking contexts.
Originality/Value:To the best of our knowledge, our study is the first to
summarize the potential societal biases in higher education. This review
highlights the need for more in-depth studies and empirical work to understand
the specific biases that GAI might introduce or amplify in educational
settings, guiding the development of more ethical AI applications in higher
education.
| [
{
"version": "v1",
"created": "Fri, 24 Nov 2023 10:00:23 GMT"
},
{
"version": "v2",
"created": "Sat, 22 Jun 2024 11:37:05 GMT"
},
{
"version": "v3",
"created": "Thu, 11 Jul 2024 06:25:36 GMT"
},
{
"version": "v4",
"created": "Mon, 21 Apr 2025 16:33:14 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Li",
"Ming",
""
],
[
"Enkhtur",
"Ariunaa",
""
],
[
"Yamamoto",
"Beverley Anne",
""
],
[
"Cheng",
"Fei",
""
],
[
"Chen",
"Lilan",
""
]
] |
2311.14826 | Anne Weber | Anne Weber, Margarita Khokhlova, and Emilio Pisanty | Quantum tunnelling without a barrier | 7 pages, 5 figures | Phys. Rev. A 111, 043103 (2025) | 10.1103/PhysRevA.111.043103 | null | quant-ph physics.atom-ph physics.optics | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Tunneling is an iconic concept that captures the peculiarity of quantum
dynamics but, despite its ubiquity, questions remain. We focus on strong-field
tunneling, which is vital to all attosecond science. We find an unexpected
optical tunneling event that happens when the instantaneous electric field
vanishes and there is no barrier. This event arises from a color switchover in
a strongly polychromatic field. The tunneling without a barrier reveals the
disconnect between the standard intuition built on the picture of a quasistatic
barrier and the nonadiabatic nature of the process.
| [
{
"version": "v1",
"created": "Fri, 24 Nov 2023 19:50:49 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 01:19:46 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Weber",
"Anne",
""
],
[
"Khokhlova",
"Margarita",
""
],
[
"Pisanty",
"Emilio",
""
]
] |
2311.15064 | Noah Stephens-Davidowitz | Divesh Aggarwal and Thomas Espitau and Spencer Peters and Noah
Stephens-Davidowitz | Recursive lattice reduction -- A framework for finding short lattice
vectors | This version is a minor edit of the previous version | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a recursive lattice reduction framework for finding short non-zero
vectors or dense sublattices of a lattice. The framework works by recursively
searching for dense sublattices of dense sublattices (or their duals) with
progressively lower rank. When the procedure encounters a recursive call on a
lattice $L$ with relatively low rank, we simply use a known algorithm to find a
shortest non-zero vector in $L$.
This new framework is complementary to basis reduction algorithms, which
similarly work to reduce an $n$-dimensional lattice problem with some
approximation factor $\gamma$ to a lower-dimensional exact lattice problem in
some lower dimension $k$, with a tradeoff between $\gamma$, $n$, and $k$. Our
framework provides an alternative and arguably simpler perspective. For
example, our algorithms can be described at a high level without explicitly
referencing any specific basis of the lattice, the Gram-Schmidt
orthogonalization, or even projection (though, of course, concrete
implementations of algorithms in this framework will likely make use of such
things).
We present a number of instantiations of our framework. Our main concrete
result is an efficient reduction that matches the tradeoff achieved by the
best-known basis reduction algorithms. This reduction also can be used to find
dense sublattices with any rank $\ell$ satisfying $\min\{\ell,n-\ell\} \leq
n-k+1$, using only an oracle for SVP in $k$ dimensions, with slightly better
parameters than what was known using basis reduction.
We also show a simple reduction with the same tradeoff for finding short
vectors in quasipolynomial time, and a reduction from finding dense sublattices
of a high-dimensional lattice to this problem in lower dimension. Finally, we
present an automated search procedure that finds algorithms in this framework
that (provably) achieve better approximations with fewer oracle calls.
| [
{
"version": "v1",
"created": "Sat, 25 Nov 2023 16:20:22 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Oct 2024 23:44:51 GMT"
},
{
"version": "v3",
"created": "Sun, 20 Apr 2025 20:38:18 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Aggarwal",
"Divesh",
""
],
[
"Espitau",
"Thomas",
""
],
[
"Peters",
"Spencer",
""
],
[
"Stephens-Davidowitz",
"Noah",
""
]
] |
2311.15208 | Kyoengman Park | Kyeongman Park, Nakyeong Yang, Kyomin Jung | LongStory: Coherent, Complete and Length Controlled Long story
Generation | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | A human author can write any length of story without losing coherence. Also,
they always bring the story to a proper ending, an ability that current
language models lack. In this work, we present the LongStory for coherent,
complete, and length-controlled long story generation. LongStory introduces two
novel methodologies: (1) the long and short-term contexts weight calibrator
(CWC) and (2) long story structural positions (LSP). The CWC adjusts weights
for long-term context Memory and short-term context Cheating, acknowledging
their distinct roles. The LSP employs discourse tokens to convey the structural
positions of a long story. Trained on three datasets with varied average story
lengths, LongStory outperforms other baselines, including the strong story
generator Plotmachine, in coherence, completeness, relevance, and
repetitiveness. We also perform zero-shot tests on each dataset to assess the
model's ability to predict outcomes beyond its training data and validate our
methodology by comparing its performance with variants of our model.
| [
{
"version": "v1",
"created": "Sun, 26 Nov 2023 06:24:25 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 02:43:54 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Park",
"Kyeongman",
""
],
[
"Yang",
"Nakyeong",
""
],
[
"Jung",
"Kyomin",
""
]
] |
2311.18674 | Saleh Darzi | Attila A. Yavuz, Saleh Darzi, Saif E. Nouma | LiteQSign: Lightweight and Quantum-Safe Signatures for Heterogeneous IoT
Applications | 20 pages | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | The rapid proliferation of resource-constrained IoT devices across sectors
like healthcare, industrial automation, and finance introduces major security
challenges. Traditional digital signatures, though foundational for
authentication, are often infeasible for low-end devices with limited
computational, memory, and energy resources. Also, the rise of quantum
computing necessitates post-quantum (PQ) secure alternatives. However,
NIST-standardized PQ signatures impose substantial overhead, limiting their
practicality in energy-sensitive applications such as wearables, where
signer-side efficiency is critical. To address these challenges, we present
LightQSign (LightQS), a novel lightweight PQ signature that achieves
near-optimal signature generation efficiency with only a small, constant number
of hash operations per signing. Its core innovation enables verifiers to obtain
one-time hash-based public keys without interacting with signers or third
parties through secure computation. We formally prove the security of
LightQSign in the random oracle model and evaluate its performance on commodity
hardware and a resource-constrained 8-bit AtMega128A1 microcontroller.
Experimental results show that LightQSign outperforms NIST PQC standards with
lower computational overhead, minimal memory usage, and compact signatures. On
an 8-bit microcontroller, it achieves up to 1.5-24x higher energy efficiency
and 1.7-22x shorter signatures than PQ counterparts, and 56-76x better energy
efficiency than conventional standards-enabling longer device lifespans and
scalable, quantum-resilient authentication.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2023 16:20:50 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Dec 2023 19:53:35 GMT"
},
{
"version": "v3",
"created": "Thu, 9 May 2024 19:40:53 GMT"
},
{
"version": "v4",
"created": "Sun, 2 Mar 2025 22:54:03 GMT"
},
{
"version": "v5",
"created": "Mon, 21 Apr 2025 15:46:23 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Yavuz",
"Attila A.",
""
],
[
"Darzi",
"Saleh",
""
],
[
"Nouma",
"Saif E.",
""
]
] |
2312.01715 | Zili Xu | Jian-Feng Cai, Zhiqiang Xu, and Zili Xu | Interlacing Polynomial Method for Matrix Approximation via Generalized
Column and Row Selection | Accepted by Foundations of Computational Mathematics | null | null | null | math.FA math.CO math.OA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper delves into the spectral norm aspect of the Generalized Column and
Row Subset Selection (GCRSS) problem. Given a target matrix $\mathbf{A}\in
\mathbb{R}^{n\times d}$, the objective of GCRSS is to select a column submatrix
$\mathbf{B}_{:,S}\in\mathbb{R}^{n\times k}$ from the source matrix
$\mathbf{B}\in\mathbb{R}^{n\times d_B}$ and a row submatrix
$\mathbf{C}_{R,:}\in\mathbb{R}^{r\times d}$ from the source matrix
$\mathbf{C}\in\mathbb{R}^{n_C\times d}$, such that the residual matrix
$(\mathbf{I}_n-\mathbf{B}_{:,S}\mathbf{B}_{:,S}^{\dagger})\mathbf{A}(\mathbf{I}_d-\mathbf{C}_{R,:}^{\dagger}
\mathbf{C}_{R,:})$ has a small spectral norm. By employing the method of
interlacing polynomials, we show that the smallest possible spectral norm of a
residual matrix can be bounded by the largest root of a related expected
characteristic polynomial. A deterministic polynomial time algorithm is
provided for the spectral norm case of the GCRSS problem. We next focus on two
specific GCRSS scenarios: the Generalized Column Subset Selection (GCSS)
problem ($r=0$), and the submatrix selection problem
($\mathbf{B}=\mathbf{C}=\mathbf{I}_d$). In the GCSS scenario, we connect the
expected characteristic polynomials to the convolution of multi-affine
polynomials, leading to the derivation of the first provable reconstruction
bound on the spectral norm of a residual matrix. In the submatrix selection
scenario, we show that for any sufficiently small $\varepsilon>0$ and any
square matrix $\mathbf{A}\in\mathbb{R}^{d\times d}$, there exist two subsets
$S\subset [d]$ and $R\subset [d]$ of sizes $O(d\cdot \varepsilon^2)$ such that
$\Vert\mathbf{A}_{S,R}\Vert_2\leq \varepsilon\cdot \Vert\mathbf{A}\Vert_2$.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2023 08:14:23 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Apr 2025 22:23:55 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Cai",
"Jian-Feng",
""
],
[
"Xu",
"Zhiqiang",
""
],
[
"Xu",
"Zili",
""
]
] |
2312.02518 | Tianming Zhu | Tianming Zhu | The general linear hypothesis testing problem for multivariate
functional data with applications | null | null | null | null | stat.ME stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As technology continues to advance at a rapid pace, the prevalence of
multivariate functional data (MFD) has expanded across diverse disciplines,
spanning biology, climatology, finance, and numerous other fields of study.
Although MFD are encountered in various fields, the development of methods for
hypotheses on mean functions, especially the general linear hypothesis testing
(GLHT) problem for such data has been limited. In this study, we propose and
study a new global test for the GLHT problem for MFD, which includes the
one-way FMANOVA, post hoc, and contrast analysis as special cases. The
asymptotic null distribution of the test statistic is shown to be a
chi-squared-type mixture dependent of eigenvalues of the heteroscedastic
covariance functions. The distribution of the chi-squared-type mixture can be
well approximated by a three-cumulant matched chi-squared-approximation with
its approximation parameters estimated from the data. By incorporating an
adjustment coefficient, the proposed test performs effectively irrespective of
the correlation structure in the functional data, even when dealing with a
relatively small sample size. Additionally, the proposed test is shown to be
root-n consistent, that is, it has a nontrivial power against a local
alternative. Simulation studies and a real data example demonstrate
finite-sample performance and broad applicability of the proposed test.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2023 05:53:43 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Apr 2024 08:49:24 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Apr 2025 01:55:10 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Zhu",
"Tianming",
""
]
] |
2312.02817 | Nana Liu | Yu Cao, Shi Jin and Nana Liu | Quantum simulation for time-dependent Hamiltonians -- with applications
to non-autonomous ordinary and partial differential equations | null | Journal of Physics A, Vol 58, No. 15, 155304, 2025 | 10.1088/1751-8121/adb3fe | null | quant-ph math-ph math.MP | http://creativecommons.org/licenses/by/4.0/ | Non-autonomous dynamical systems appear in a very wide range of interesting
applications, both in classical and quantum dynamics, where in the latter case
it corresponds to having a time-dependent Hamiltonian. However, the quantum
simulation of these systems often needs to appeal to rather complicated
procedures involving the Dyson series, considerations of time-ordering,
requirement of time steps to be discrete and/or requiring multiple measurements
and postselection. These procedures are generally much more complicated than
the quantum simulation of time-independent Hamiltonians. Here we propose an
alternative formalism that turns any non-autonomous unitary dynamical system
into an autonomous unitary system, i.e., quantum system with a time-independent
Hamiltonian, in one higher dimension, while keeping time continuous. This makes
the simulation with time-dependent Hamiltonians not much more difficult than
that of time-independent Hamiltonians, and can also be framed in terms of an
analogue quantum system evolving continuously in time. We show how our new
quantum protocol for time-dependent Hamiltonians can be performed in a
resource-efficient way and without measurements, and can be made possible on
either continuous-variable, qubit or hybrid systems. Combined with a technique
called Schrodingerisation, this dilation technique can be applied to the
quantum simulation of any linear ODEs and PDEs, and nonlinear ODEs and certain
nonlinear PDEs, with time-dependent coefficients.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2023 14:59:23 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Cao",
"Yu",
""
],
[
"Jin",
"Shi",
""
],
[
"Liu",
"Nana",
""
]
] |
2312.03640 | Rafa{\l} Mantiuk Rafal Mantiuk | Andrew Yanzhe Ke, Lei Luo, Xiaoyu Xiang, Yuchen Fan, Rakesh Ranjan,
Alexandre Chapiro, Rafa{\l} K. Mantiuk | Training Neural Networks on RAW and HDR Images for Restoration Tasks | null | null | null | null | eess.IV cs.CV | http://creativecommons.org/licenses/by/4.0/ | The vast majority of standard image and video content available online is
represented in display-encoded color spaces, in which pixel values are
conveniently scaled to a limited range (0-1) and the color distribution is
approximately perceptually uniform. In contrast, both camera RAW and high
dynamic range (HDR) images are often represented in linear color spaces, in
which color values are linearly related to colorimetric quantities of light.
While training on commonly available display-encoded images is a
well-established practice, there is no consensus on how neural networks should
be trained for tasks on RAW and HDR images in linear color spaces. In this
work, we test several approaches on three popular image restoration
applications: denoising, deblurring, and single-image super-resolution. We
examine whether HDR/RAW images need to be display-encoded using popular
transfer functions (PQ, PU21, and mu-law), or whether it is better to train in
linear color spaces, but use loss functions that correct for perceptual
non-uniformity. Our results indicate that neural networks train significantly
better on HDR and RAW images represented in display-encoded color spaces, which
offer better perceptual uniformity than linear spaces. This small change to the
training strategy can bring a very substantial gain in performance, between 2
and 9 dB.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2023 17:47:16 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Mar 2025 10:23:16 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 16:34:50 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Ke",
"Andrew Yanzhe",
""
],
[
"Luo",
"Lei",
""
],
[
"Xiang",
"Xiaoyu",
""
],
[
"Fan",
"Yuchen",
""
],
[
"Ranjan",
"Rakesh",
""
],
[
"Chapiro",
"Alexandre",
""
],
[
"Mantiuk",
"Rafał K.",
""
]
] |
2312.04861 | Shanliang Yao | Shanliang Yao, Runwei Guan, Zitian Peng, Chenhang Xu, Yilu Shi,
Weiping Ding, Eng Gee Lim, Yong Yue, Hyungjoon Seo, Ka Lok Man, Jieming Ma,
Xiaohui Zhu, Yutao Yue | Exploring Radar Data Representations in Autonomous Driving: A
Comprehensive Review | Accepted by TITS | IEEE Transactions on Intelligent Transportation Systems 2025 | 10.1109/TITS.2025.3554781 | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rapid advancements of sensor technology and deep learning,
autonomous driving systems are providing safe and efficient access to
intelligent vehicles as well as intelligent transportation. Among these
equipped sensors, the radar sensor plays a crucial role in providing robust
perception information in diverse environmental conditions. This review focuses
on exploring different radar data representations utilized in autonomous
driving systems. Firstly, we introduce the capabilities and limitations of the
radar sensor by examining the working principles of radar perception and signal
processing of radar measurements. Then, we delve into the generation process of
five radar representations, including the ADC signal, radar tensor, point
cloud, grid map, and micro-Doppler signature. For each radar representation, we
examine the related datasets, methods, advantages and limitations. Furthermore,
we discuss the challenges faced in these data representations and propose
potential research directions. Above all, this comprehensive review offers an
in-depth insight into how these representations enhance autonomous system
capabilities, providing guidance for radar perception researchers. To
facilitate retrieval and comparison of different data representations, datasets
and methods, we provide an interactive website at
https://radar-camera-fusion.github.io/radar.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2023 06:31:19 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Apr 2024 08:55:34 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Apr 2025 08:37:24 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Yao",
"Shanliang",
""
],
[
"Guan",
"Runwei",
""
],
[
"Peng",
"Zitian",
""
],
[
"Xu",
"Chenhang",
""
],
[
"Shi",
"Yilu",
""
],
[
"Ding",
"Weiping",
""
],
[
"Lim",
"Eng Gee",
""
],
[
"Yue",
"Yong",
""
],
[
"Seo",
"Hyungjoon",
""
],
[
"Man",
"Ka Lok",
""
],
[
"Ma",
"Jieming",
""
],
[
"Zhu",
"Xiaohui",
""
],
[
"Yue",
"Yutao",
""
]
] |
2312.05693 | Xuan Shen | Xuan Shen, Peiyan Dong, Lei Lu, Zhenglun Kong, Zhengang Li, Ming Lin,
Chao Wu, Yanzhi Wang | Agile-Quant: Activation-Guided Quantization for Faster Inference of LLMs
on the Edge | Accepted by AAAI 2024 | null | null | null | cs.LG cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large Language Models (LLMs) stand out for their impressive performance in
intricate language modeling tasks. However, their demanding computational and
memory needs pose obstacles for broad use on edge devices. Quantization is then
introduced to boost LLMs' on-device efficiency. Recent works show that 8-bit or
lower weight quantization is feasible with minimal impact on end-to-end task
performance, while the activation is still not quantized. On the other hand,
mainstream commodity edge devices still struggle to execute these sub-8-bit
quantized networks effectively. In this paper, we propose Agile-Quant, an
activation-guided quantization framework for popular Large Language Models
(LLMs), and implement an end-to-end accelerator on multiple edge devices for
faster inference. Considering the hardware profiling and activation analysis,
we first introduce a basic activation quantization strategy to balance the
trade-off of task performance and real inference speed. Then we leverage the
activation-aware token pruning technique to reduce the outliers and the adverse
impact on attentivity. Ultimately, we utilize the SIMD-based 4-bit multiplier
and our efficient TRIP matrix multiplication to implement the accelerator for
LLMs on the edge. We apply our framework on different scales of LLMs including
LLaMA, OPT, and BLOOM with 4-bit or 8-bit for the activation and 4-bit for the
weight quantization. Experiments show that Agile-Quant achieves simultaneous
quantization of model weights and activations while maintaining task
performance comparable to existing weight-only quantization methods. Moreover,
in the 8- and 4-bit scenario, Agile-Quant achieves an on-device speedup of up
to 2.55x compared to its FP16 counterparts across multiple edge devices,
marking a pioneering advancement in this domain. Code:
https://github.com/shawnricecake/agile-quant
| [
{
"version": "v1",
"created": "Sat, 9 Dec 2023 22:12:52 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 01:24:31 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Shen",
"Xuan",
""
],
[
"Dong",
"Peiyan",
""
],
[
"Lu",
"Lei",
""
],
[
"Kong",
"Zhenglun",
""
],
[
"Li",
"Zhengang",
""
],
[
"Lin",
"Ming",
""
],
[
"Wu",
"Chao",
""
],
[
"Wang",
"Yanzhi",
""
]
] |
2312.10298 | Aditya Pawar | Aditya Pawar, Yingheng Li, Zewei Mo, Yanan Guo, Youtao Zhang, Xulong
Tang, Jun Yang | QRCC: Evaluating Large Quantum Circuits on Small Quantum Computers
through Integrated Qubit Reuse and Circuit Cutting | null | ASPLOS 2024 volume 4, pages 236-251 | 10.1145/3622781.3674179 | null | quant-ph cs.ET | http://creativecommons.org/licenses/by/4.0/ | Quantum computing has recently emerged as a promising computing paradigm for
many application domains. However, the size of quantum circuits that can be run
with high fidelity is constrained by the limited quantity and quality of
physical qubits. Recently proposed schemes, such as wire cutting and qubit
reuse, mitigate the problem but produce sub-optimal results as they address the
problem individually. In addition, gate cutting, an alternative circuit-cutting
strategy that is suitable for circuits computing expectation values, has not
been fully explored in the field.
In this paper, we propose QRCC, an integrated approach that exploits qubit
reuse and circuit-cutting (including wire cutting and gate cutting) to run
large circuits on small quantum computers. Circuit-cutting techniques introduce
non-negligible post-processing overhead, which increases exponentially with the
number of cuts. QRCC exploits qubit reuse to find better cutting solutions to
minimize the cut numbers and thus the post-processing overhead. Our evaluation
results show that on average we reduce the number of cuts by 29% and additional
reduction when considering gate cuts.
| [
{
"version": "v1",
"created": "Sat, 16 Dec 2023 02:49:28 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Mar 2025 15:47:23 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Apr 2025 16:35:54 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Pawar",
"Aditya",
""
],
[
"Li",
"Yingheng",
""
],
[
"Mo",
"Zewei",
""
],
[
"Guo",
"Yanan",
""
],
[
"Zhang",
"Youtao",
""
],
[
"Tang",
"Xulong",
""
],
[
"Yang",
"Jun",
""
]
] |
2312.10560 | Luis Balderas Ruiz | Luis Balderas, Miguel Lastra and Jos\'e M. Ben\'itez | Optimizing Dense Feed-Forward Neural Networks | null | Neural Networks, Volume 171, 2024, Pages 229-241, ISSN 0893-6080, | 10.1016/j.neunet.2023.12.015 | null | cs.LG cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Deep learning models have been widely used during the last decade due to
their outstanding learning and abstraction capacities. However, one of the main
challenges any scientist has to face using deep learning models is to establish
the network's architecture. Due to this difficulty, data scientists usually
build over complex models and, as a result, most of them result computationally
intensive and impose a large memory footprint, generating huge costs,
contributing to climate change and hindering their use in computational-limited
devices. In this paper, we propose a novel feed-forward neural network
constructing method based on pruning and transfer learning. Its performance has
been thoroughly assessed in classification and regression problems. Without any
accuracy loss, our approach can compress the number of parameters by more than
70%. Even further, choosing the pruning parameter carefully, most of the
refined models outperform original ones. We also evaluate the transfer learning
level comparing the refined model and the original one training from scratch a
neural network with the same hyper parameters as the optimized model. The
results obtained show that our constructing method not only helps in the design
of more efficient models but also more effective ones.
| [
{
"version": "v1",
"created": "Sat, 16 Dec 2023 23:23:16 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Balderas",
"Luis",
""
],
[
"Lastra",
"Miguel",
""
],
[
"Benítez",
"José M.",
""
]
] |
2312.10702 | Luis Balderas Ruiz | Luis Balderas, Miguel Lastra and Jos\'e M. Ben\'itez | Can persistent homology whiten Transformer-based black-box models? A
case study on BERT compression | null | Applied Sciences. 2025, 15, 390 | 10.3390/app15010390 | null | cs.LG cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Large Language Models (LLMs) like BERT have gained significant prominence due
to their remarkable performance in various natural language processing tasks.
However, they come with substantial computational and memory costs.
Additionally, they are essentially black-box models, challenging to explain and
interpret. In this article, we propose Optimus BERT Compression and
Explainability (OBCE), a methodology to bring explainability to BERT models
using persistent homology, aiming to measure the importance of each neuron by
studying the topological characteristics of their outputs. As a result, we can
compress BERT significantly by reducing the number of parameters (58.47% of the
original parameters for BERT Base, 52.3% for BERT Large). We evaluated our
methodology on the standard GLUE Benchmark, comparing the results with
state-of-the-art techniques and achieving outstanding results. Consequently,
our methodology can "whiten" BERT models by providing explainability to its
neurons and reducing the model's size, making it more suitable for deployment
on resource-constrained devices.
| [
{
"version": "v1",
"created": "Sun, 17 Dec 2023 12:33:50 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Balderas",
"Luis",
""
],
[
"Lastra",
"Miguel",
""
],
[
"Benítez",
"José M.",
""
]
] |
2312.13446 | Kiril Datchev | T. J. Christiansen and K. Datchev | Low energy resolvent expansions in dimension two | 31 pages, 2 figures, expanded introduction compared to v1 | Communications of the American Mathematical Society, Vol. 5, pp.
48--80, 2025 | null | null | math.AP math-ph math.MP math.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The behavior of the resolvent at low energies has implications for many kinds
of asymptotics, including for the scattering matrix and phase, for the
Dirichlet-to-Neumann map, and for wave evolution. In this paper we present a
robust method, based in part on resolvent identity arguments following Vodev
and boundary pairing arguments following Melrose, for deriving such expansions,
and implement it in detail for compactly supported perturbations of the
Laplacian on $\mathbb R^2$. We obtain precise results for general self-adjoint
black box perturbations, in the sense of Sj\"ostrand--Zworski, and also for
some non-self-adjoint ones. The most important terms are the most singular
ones, and we compute them in detail, relating them to spaces of zero
eigenvalues and resonances.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2023 21:39:31 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jan 2024 15:49:31 GMT"
},
{
"version": "v3",
"created": "Thu, 20 Mar 2025 19:00:11 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Christiansen",
"T. J.",
""
],
[
"Datchev",
"K.",
""
]
] |
2312.13467 | Brendan Rhyno | Brendan Rhyno and Ivan Velkovsky and Peter Adshead and Bryce Gadway
and Smitha Vishveshwara | Mechanical cosmology: simulating scalar fluctuations in expanding
Universes using synthetic mechanical lattices | 7 pages, 3 figures | null | 10.1103/PhysRevResearch.7.L022004 | null | cond-mat.mes-hall astro-ph.CO gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inspired by recent advances in observational astrophysics and continued
explorations in the field of analog gravity, we discuss the prospect of
simulating models of cosmology within the context of synthetic mechanical
lattice experiments. We focus on the physics of expanding Universe scenarios
described by the Friedmann-Lema\^itre-Robertson-Walker (FLRW) metric.
Specifically, quantizing scalar fluctuations in a background FLRW spacetime
leads to a quadratic bosonic Hamiltonian with temporally varying pair
production terms. Here we present a mapping that provides a one-to-one
correspondence between these classes of cosmology models and feedback-coupled
mechanical oscillators. As proof-of-principle, we then perform experiments on a
synthetic mechanical lattice composed of such oscillators. We simulate two
different FLRW expansion scenarios with Universes dominated by vacuum energy
and matter and discuss our experimental results.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2023 22:34:52 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 19:54:49 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Rhyno",
"Brendan",
""
],
[
"Velkovsky",
"Ivan",
""
],
[
"Adshead",
"Peter",
""
],
[
"Gadway",
"Bryce",
""
],
[
"Vishveshwara",
"Smitha",
""
]
] |
2312.14216 | Brian Nlong Zhao | Brian Nlong Zhao, Yuhang Xiao, Jiashu Xu, Xinyang Jiang, Yifan Yang,
Dongsheng Li, Laurent Itti, Vibhav Vineet, Yunhao Ge | DreamDistribution: Learning Prompt Distribution for Diverse
In-distribution Generation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The popularization of Text-to-Image (T2I) diffusion models enables the
generation of high-quality images from text descriptions. However, generating
diverse customized images with reference visual attributes remains challenging.
This work focuses on personalizing T2I diffusion models at a more abstract
concept or category level, adapting commonalities from a set of reference
images while creating new instances with sufficient variations. We introduce a
solution that allows a pretrained T2I diffusion model to learn a set of soft
prompts, enabling the generation of novel images by sampling prompts from the
learned distribution. These prompts offer text-guided editing capabilities and
additional flexibility in controlling variation and mixing between multiple
distributions. We also show the adaptability of the learned prompt distribution
to other tasks, such as text-to-3D. Finally we demonstrate effectiveness of our
approach through quantitative analysis including automatic evaluation and human
assessment. Project website: https://briannlongzhao.github.io/DreamDistribution
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2023 12:11:00 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 16:26:57 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Zhao",
"Brian Nlong",
""
],
[
"Xiao",
"Yuhang",
""
],
[
"Xu",
"Jiashu",
""
],
[
"Jiang",
"Xinyang",
""
],
[
"Yang",
"Yifan",
""
],
[
"Li",
"Dongsheng",
""
],
[
"Itti",
"Laurent",
""
],
[
"Vineet",
"Vibhav",
""
],
[
"Ge",
"Yunhao",
""
]
] |
2312.14429 | Yuichi Ike | Tomohiro Asano, Yuichi Ike, Wenyuan Li | Lagrangian cobordism and shadow distance in Tamarkin category | 34 pages, 4 figures. v2: Revised, published in Selecta Mathematica | Selecta Mathematica 31, 45 (2025) | 10.1007/s00029-025-01034-9 | null | math.SG math.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study exact Lagrangian cobordisms between exact Lagrangians in a cotangent
bundle in the sense of Arnol'd, using microlocal theory of sheaves. We
construct a sheaf quantization for an exact Lagrangian cobordism between
Lagrangians with conical ends, prove an iterated cone decomposition of the
sheaf quantization for cobordisms with multiple ends, and show that the
interleaving distance of sheaves is bounded by the shadow distance of the
cobordism. Using the result, we prove a rigidity result on Lagrangian
intersection by estimating the energy cost of splitting and connecting
Lagrangians through cobordisms.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2023 04:33:36 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 12:04:52 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Asano",
"Tomohiro",
""
],
[
"Ike",
"Yuichi",
""
],
[
"Li",
"Wenyuan",
""
]
] |
2312.14450 | Chi Hoi Yip | Chi Hoi Yip | Multiplicatively reducible subsets of shifted perfect $k$-th powers and
bipartite Diophantine tuples | 17 pages, revised based on referee comments, references updated | Acta Arith. 218 (2025), no.3, 251-271 | 10.4064/aa240520-24-9 | null | math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, Hajdu and S\'{a}rk\"{o}zy studied the multiplicative decompositions
of polynomial sequences. In particular, they showed that when $k \geq 3$, each
infinite subset of $\{x^k+1: x \in \mathbb{N}\}$ is multiplicatively
irreducible. In this paper, we attempt to make their result effective by
building a connection between this problem and the bipartite generalization of
the well-studied Diophantine tuples. More precisely, given an integer $k \geq
3$ and a nonzero integer $n$, we call a pair of subsets of positive integers
$(A,B)$ a bipartite Diophantine tuple with property $BD_k(n)$ if $|A|,|B| \geq
2$ and $AB+n \subset \{x^k: x \in \mathbb{N}\}$. We show that $\min \{|A|,
|B|\} \ll \log |n|$, extending a celebrated work of Bugeaud and Dujella (where
they considered the case $n=1$). We also provide an upper bound on $|A||B|$ in
terms of $n$ and $k$ under the assumption $\min \{|A|,|B|\}\geq 4$ and $k \geq
6$. Specializing our techniques to Diophantine tuples, we significantly improve
several results by B\'{e}rczes-Dujella-Hajdu-Luca, Bhattacharjee-Dixit-Saikia,
and Dixit-Kim-Murty.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2023 05:48:51 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Jan 2024 06:15:14 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Jan 2024 07:59:24 GMT"
},
{
"version": "v4",
"created": "Tue, 10 Sep 2024 03:02:57 GMT"
},
{
"version": "v5",
"created": "Thu, 13 Feb 2025 03:14:21 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Yip",
"Chi Hoi",
""
]
] |
2312.15217 | Minxin Lu | Minxin Lu, Annie Green Howard, Penny Gordon-Larsen, Katie A. Meyer,
Hsiao-Chuan Tien, Shufa Du, Huijun Wang, Bing Zhang, Michael R. Kosorok | Constructing a T-test for Value Function Comparison of Individualized
Treatment Regimes in the Presence of Multiple Imputation for Missing Data | null | null | null | null | stat.ME stat.AP | http://creativecommons.org/licenses/by/4.0/ | Optimal individualized treatment decision-making has improved health outcomes
in recent years. The value function is commonly used to evaluate the goodness
of an individualized treatment decision rule. Despite recent advances,
comparing value functions between different treatment decision rules or
constructing confidence intervals around value functions remains difficult. We
propose a t-test based method applied to a test set that generates valid
p-values to compare value functions between a given pair of treatment decision
rules when some of the data are missing. We demonstrate the ease in use of this
method and evaluate its performance via simulation studies and apply it to the
China Health and Nutrition Survey data.
| [
{
"version": "v1",
"created": "Sat, 23 Dec 2023 10:35:36 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Dec 2023 12:01:43 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 19:02:51 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Lu",
"Minxin",
""
],
[
"Howard",
"Annie Green",
""
],
[
"Gordon-Larsen",
"Penny",
""
],
[
"Meyer",
"Katie A.",
""
],
[
"Tien",
"Hsiao-Chuan",
""
],
[
"Du",
"Shufa",
""
],
[
"Wang",
"Huijun",
""
],
[
"Zhang",
"Bing",
""
],
[
"Kosorok",
"Michael R.",
""
]
] |
2401.00020 | Zijie Yang | Zijie Yang, Yongjing Yin, Chaojun Kong, Tiange Chi, Wufan Tao, Yue
Zhang, Tian Xu | ShennongAlpha: an AI-driven sharing and collaboration platform for
intelligent curation, acquisition, and translation of natural medicinal
material knowledge | 53 pages, 6 figures, 10 supplementary figures, 2 supplementary tables | Cell Discov 11, 32 (2025) | 10.1038/s41421-025-00776-2 | null | cs.AI cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Natural Medicinal Materials (NMMs) have a long history of global clinical
applications and a wealth of records and knowledge. Although NMMs are a major
source for drug discovery and clinical application, the utilization and sharing
of NMM knowledge face crucial challenges, including the standardized
description of critical information, efficient curation and acquisition, and
language barriers. To address these, we developed ShennongAlpha, an AI-driven
sharing and collaboration platform for intelligent knowledge curation,
acquisition, and translation. For standardized knowledge curation, the platform
introduced a Systematic Nomenclature to enable accurate differentiation and
identification of NMMs. More than fourteen thousand Chinese NMMs have been
curated into the platform along with their knowledge. Furthermore, the platform
pioneered chat-based knowledge acquisition, standardized machine translation,
and collaborative knowledge updating. Together, our study represents the first
major advance in leveraging AI to empower NMM knowledge sharing, which not only
marks a novel application of AI for Science, but also will significantly
benefit the global biomedical, pharmaceutical, physician, and patient
communities.
| [
{
"version": "v1",
"created": "Wed, 27 Dec 2023 18:48:27 GMT"
},
{
"version": "v2",
"created": "Thu, 16 May 2024 15:38:21 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Yang",
"Zijie",
""
],
[
"Yin",
"Yongjing",
""
],
[
"Kong",
"Chaojun",
""
],
[
"Chi",
"Tiange",
""
],
[
"Tao",
"Wufan",
""
],
[
"Zhang",
"Yue",
""
],
[
"Xu",
"Tian",
""
]
] |
2401.01519 | Luoma Ke | Luoma Ke (1), Song Tong (1), Peng Cheng (2), Kaiping Peng (1) ((1)
Department of Psychological and Cognitive Sciences, Tsinghua University, (2)
School of Social Science, Tsinghua University) | Exploring the Frontiers of LLMs in Psychological Applications: A
Comprehensive Review | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper explores the frontiers of large language models (LLMs) in
psychology applications. Psychology has undergone several theoretical changes,
and the current use of Artificial Intelligence (AI) and Machine Learning,
particularly LLMs, promises to open up new research directions. We provide a
detailed exploration of how LLMs like ChatGPT are transforming psychological
research. It discusses the impact of LLMs across various branches of
psychology, including cognitive and behavioral, clinical and counseling,
educational and developmental, and social and cultural psychology, highlighting
their potential to simulate aspects of human cognition and behavior. The paper
delves into the capabilities of these models to emulate human-like text
generation, offering innovative tools for literature review, hypothesis
generation, experimental design, experimental subjects, data analysis, academic
writing, and peer review in psychology. While LLMs are essential in advancing
research methodologies in psychology, the paper also cautions about their
technical and ethical challenges. There are issues like data privacy, the
ethical implications of using LLMs in psychological research, and the need for
a deeper understanding of these models' limitations. Researchers should
responsibly use LLMs in psychological studies, adhering to ethical standards
and considering the potential consequences of deploying these technologies in
sensitive areas. Overall, the article provides a comprehensive overview of the
current state of LLMs in psychology, exploring potential benefits and
challenges. It serves as a call to action for researchers to leverage LLMs'
advantages responsibly while addressing associated risks.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2024 03:01:29 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Jan 2024 10:22:47 GMT"
},
{
"version": "v3",
"created": "Sat, 16 Mar 2024 13:37:48 GMT"
},
{
"version": "v4",
"created": "Sun, 20 Apr 2025 08:45:26 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Ke",
"Luoma",
""
],
[
"Tong",
"Song",
""
],
[
"Cheng",
"Peng",
""
],
[
"Peng",
"Kaiping",
""
]
] |
2401.02247 | Jayam Joshi | Jayam Joshi, Pawan Kumar Mishra, and Shradha Mishra | Effective single particle theory for active particles using local
density fluctuations | null | null | null | null | cond-mat.stat-mech cond-mat.soft physics.bio-ph | http://creativecommons.org/publicdomain/zero/1.0/ | We characterize the dynamic non-equilibrium steady state behavior of active
particles using density fluctuations in the system. We analyze the effective
local density around a particle in the steady state and numerically calculate
its mean, variance and autocorrelation. Thus, using local density and its
statistical properties as a temporally correlated stochastic variable, we
develop an effective single-particle theoretical model and analytically derive
an expression for the particle's diffusivity as a function of the global
packing density in the system. Our theory accurately predicts the transport
properties of an active particle, validated against numerical simulations.
Unlike mean-field theory, which fails at high packing densities due to
significant density fluctuations from dynamic cluster formation, our model
remains effective across all densities. It also captures the well-known phase
transition beyond a critical packing density. The key novelty of our model lies
in the introduction of a stochastic local density field, which encapsulates the
effect of steric interactions on an active particle and helps predict
single-particle behavior in a collection, a feature often absent in standard
active matter models. This approach could be useful in experimental setups
where fluctuations in local density around a tagged particle are measurable.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2024 12:59:00 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 12:57:21 GMT"
},
{
"version": "v3",
"created": "Sat, 2 Nov 2024 07:30:40 GMT"
},
{
"version": "v4",
"created": "Mon, 21 Apr 2025 07:42:49 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Joshi",
"Jayam",
""
],
[
"Mishra",
"Pawan Kumar",
""
],
[
"Mishra",
"Shradha",
""
]
] |
2401.03383 | Robert Davis | Robert Davis and Akihiro Higashitani and Hidefumi Ohsugi | On the Ehrhart Theory of Generalized Symmetric Edge Polytopes | 24 pages. Revisions made to clarify several constructions and proofs | null | null | null | math.CO | http://creativecommons.org/licenses/by/4.0/ | The symmetric edge polytope (SEP) of a (finite, undirected) graph is a
centrally symmetric lattice polytope whose vertices are defined by the edges of
the graph. SEPs have been studied extensively in the past twenty years.
Recently, T\'othm\'er\'esz and, independently, D'Al\'i, Juhnke-Kubitzke, and
Koch generalized the definition of an SEP to regular matroids, which are the
matroids that can be represented by totally unimodular matrices. Generalized
SEPs are known to have symmetric Ehrhart $h^*$-polynomials, and Ohsugi and
Tsuchiya conjectured that (ordinary) SEPs have nonnegative $\gamma$-vectors.
In this article, we use combinatorial and Gr\"obner basis techniques to
extend additional known properties of SEPs to generalized SEPs. Along the way,
we show that generalized SEPs are not necessarily $\gamma$-nonnegative by
providing explicit examples. We prove that the polytopes we construct are
``nearly'' $\gamma$-nonnegative in the sense that, by deleting exactly two
elements from the matroid, one obtains SEPs for graphs that are
$\gamma$-nonnegative. This provides further evidence that Ohsugi and Tsuchiya's
conjecture holds in the ordinary case.
| [
{
"version": "v1",
"created": "Sun, 7 Jan 2024 04:29:29 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Mar 2024 01:32:11 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 22:57:01 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Davis",
"Robert",
""
],
[
"Higashitani",
"Akihiro",
""
],
[
"Ohsugi",
"Hidefumi",
""
]
] |
2401.03434 | Ling Wang | Jianwei Yang, Zhao Liu, and Ling Wang | Ground state phase diagram and the exotic phases in the spin-1/2 square
lattice J1-J2-Jx model | 9 pages, 10 figures | Phys. Rev. B 110, 224404 (2024) | null | null | cond-mat.str-el | http://creativecommons.org/licenses/by/4.0/ | The intricate interplay between frustration and spin chirality has the
potential to give rise to unprecedented phases in frustrated quantum magnets.
We examine the ground state phase diagram of the spin-1/2 square lattice
J1-J2-Jx model by employing critical level crossings and ground state fidelity
susceptibility (FS) using exact diagonalization (ED) with full lattice
symmetries. Our analysis reveals the evolution of highly symmetric energy
levels as a function of J2 at fixed Jx. During a magnetic to non-magnetic phase
transition, the precise identification of the phase boundary is achieved
through critical level crossings between the gapless excitation of a magnetic
phase and the quasi-degenerate ground state of a non-magnet phase. Conversely,
a direct transition between two non-magnetic phases is characterized by a FS
peak accompanied by an avoided ground state level crossing, serving as a
distinctive signal. Within a substantial range of Jx, we identify an
anticipated chiral spin liquid (CSL) state and an adjacent nematic spin liquid
(NSL) phase with a degeneracy of two on a cylinder. These two phases are
demarcated by a nearly vertical boundary line at J2 = 0.65. This critical line
terminates at the lower boundary of a magnetic ordered chiral spin solid (CSS)
phase. We validate the topological nature of the CSL using the modular S matrix
of the minimum entangled states (MES) on a torus, along with the entanglement
spectra (ES) of even and odd sectors on a cylinder, employing an
SU(2)-symmetric density matrix renormalization group (DMRG) method.
Furthermore, we delve into a comprehensive discussion on the nature of the NSL,
exploring aspects such as ground state degeneracy, the local bond energy
landscape, and the singlet and triplet gaps on various tori. These analysis
provide substantial evidence supporting the nematic nature of the NSL.
| [
{
"version": "v1",
"created": "Sun, 7 Jan 2024 09:28:34 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2025 03:50:45 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Yang",
"Jianwei",
""
],
[
"Liu",
"Zhao",
""
],
[
"Wang",
"Ling",
""
]
] |
2401.04633 | Natalia Maslova | Natalia V. Maslova | On arithmetical properties and arithmetical characterizations of finite
groups | null | null | null | null | math.GR | http://creativecommons.org/licenses/by/4.0/ | Arithmetical properties of a finite group are properties of the group which
are defined by its arithmetical parameters such as the order of the group, the
element orders and so on. In this paper, we discuss a number of results on
arithmetical properties of finite groups and characterizations of finite groups
by their arithmetical parameters obtained recently. This paper is based on the
talk by the author given in frame of (WM)^2 - World Meeting for Women in
Mathematics-2022.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2024 16:01:49 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 18:40:29 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Maslova",
"Natalia V.",
""
]
] |
2401.04789 | Natalia Maslova | Mingzhu Chen, Ilya B. Gorshkov, Natalia V. Maslova, Nanying Yang | On combinatorial properties of Gruenberg--Kegel graphs of finite groups | The authors of this paper are ordered with respect to alphabet
ordering in English | null | null | null | math.GR math.CO | http://creativecommons.org/licenses/by/4.0/ | If $G$ is a finite group, then the spectrum $\omega(G)$ is the set of all
element orders of $G$. The prime spectrum $\pi(G)$ is the set of all primes
belonging to $\omega(G)$. A simple graph $\Gamma(G)$ whose vertex set is
$\pi(G)$ and in which two distinct vertices $r$ and $s$ are adjacent if and
only if $rs \in \omega(G)$ is called the Gruenberg-Kegel graph or the prime
graph of $G$.
In this paper, we prove that if $G$ is a group of even order, then the set of
vertices which are non-adjacent to $2$ in $\Gamma(G)$ form a union of cliques.
Moreover, we decide when a strongly regular graph is isomorphic to the
Gruenberg-Kegel graph of a finite group. Besides this, we prove that a complete
bipartite graph with each part of size at least $3$ can not be isomorphic to
the Gruenberg-Kegel graph of a finite group.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2024 19:26:48 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 18:45:45 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Chen",
"Mingzhu",
""
],
[
"Gorshkov",
"Ilya B.",
""
],
[
"Maslova",
"Natalia V.",
""
],
[
"Yang",
"Nanying",
""
]
] |
2401.05866 | Suryansh Srivastava | Suryansh Srivastava, Arun K. Pati, Samyadeb Bhattacharya, Indranil
Chakrabarty | Using Quantum Switches to Mitigate Noise in Grover's Search Algorithm | 26 pages (14 + 12), 7 figures | J. Phys. A: Math. Theor. 58 (2025) 105304 | 10.1088/1751-8121/ad9efc | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | Grover's quantum search algorithm promises a quadratic speedup for
unstructured search over its classical counterpart. But this advantage is
gradually reduced with noise acting on the search space. In this article, we
demonstrate that a quantum switch can act as a resource operation in mitigating
the effect of the noise in the search space. In this scenario, fault-tolerant
model quantum computing is costly. In addition to the noise modeled by a
depolarizing channel, which coherently acts on the entire quantum register,
such an error correction method can not be trivially implemented. We show that
a quantum switch can significantly add value by reducing this error. In
particular, we propose two frameworks for the application of switches. In the
first framework, we apply the superposition of channels' orders in the form of
a switch and do a post-selection at every iteration of the applications of the
Grover operator. In the second framework, we delay the post-selection until the
very end. In other words, if we want to look at the switch's action at the kth
step, we already have k-1 post-selection measurements in place for the first
framework. In the second case, we only have a single measurement. The number of
post selections is minimal in the second scenario, so its effect is more
credited to the switch. It also gives a significant advantage regarding the
success probability of Grover's algorithm. We take the success probability as
the sole quantifier of the switch's action in diminishing the effect of noise
in search space.
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2024 12:18:58 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Srivastava",
"Suryansh",
""
],
[
"Pati",
"Arun K.",
""
],
[
"Bhattacharya",
"Samyadeb",
""
],
[
"Chakrabarty",
"Indranil",
""
]
] |
2401.06697 | Emine Akpinar | Emine Akpinar | Quantum Machine Learning in the Cognitive Domain: Alzheimer's Disease
Study | 6 pages, 5 figures and 1 table | null | 10.1109/HPEC62836.2024.10938482 | null | cs.LG quant-ph | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Alzheimer's disease (AD) is the most prevalent neurodegenerative disorder,
primarily affecting the elderly population and leading to significant cognitive
decline. This decline manifests in various mental faculties such as attention,
memory, and higher-order cognitive functions, severely impacting an
individual's ability to comprehend information, acquire new knowledge, and
communicate effectively. One of the tasks influenced by cognitive impairments
is handwriting. By analyzing specific features of handwriting, including
pressure, velocity, and spatial organization, researchers can detect subtle
changes that may indicate early-stage cognitive impairments, particularly AD.
Recent developments in classical artificial intelligence (AI) methods have
shown promise in detecting AD through handwriting analysis. However, as the
dataset size increases, these AI approaches demand greater computational
resources, and diagnoses are often affected by limited classical vector spaces
and feature correlations. Recent studies have shown that quantum computing
technologies, developed by harnessing the unique properties of quantum
particles such as superposition and entanglement, can not only address the
aforementioned problems but also accelerate complex data analysis and enable
more efficient processing of large datasets. In this study, we propose a
variational quantum classifier with fewer circuit elements to facilitate early
AD diagnosis based on handwriting data. Our model has demonstrated comparable
classification performance to classical methods and underscores the potential
of quantum computing models in addressing cognitive problems, paving the way
for future research in this domain.
| [
{
"version": "v1",
"created": "Fri, 15 Sep 2023 16:50:57 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 12:28:11 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Sep 2024 19:03:28 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Akpinar",
"Emine",
""
]
] |
2401.06718 | Eugenii Shustin | Ilia Itenberg and Eugenii Shustin | Real enumerative invariants relative to the toric boundary and their
refinement | This is a substantially revised version: two signed counts of real
curves of genus 0, 1, and 2 are introduced, both giving real enumerative
invariants; two extremal cases are excluded from the main theorems | null | null | null | math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce new invariants of a class of toric surfaces (including the
projective plane) that arise from appropriate enumeration of real curves of
genus one and two. These invariants admit a refinement similar to the one
introduced by Grigory Mikhalkin in the rational case.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2024 17:41:26 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2025 16:12:42 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Itenberg",
"Ilia",
""
],
[
"Shustin",
"Eugenii",
""
]
] |
2401.07152 | Timothy Sudijono | Lihua Lei, Timothy Sudijono | Inference for Synthetic Controls via Refined Placebo Tests | 43 pages. V3: New results + references | null | null | null | stat.ME econ.EM math.ST stat.TH | http://creativecommons.org/licenses/by/4.0/ | The synthetic control method is often applied to problems with one treated
unit and a small number of control units. A common inferential task in this
setting is to test null hypotheses regarding the average treatment effect on
the treated. Inference procedures that are justified asymptotically are often
unsatisfactory due to (1) small sample sizes that render large-sample
approximation fragile and (2) simplification of the estimation procedure that
is implemented in practice. An alternative is permutation inference, which is
related to a common diagnostic called the placebo test. It has provable Type-I
error guarantees in finite samples without simplification of the method, when
the treatment is uniformly assigned. Despite this robustness, the placebo test
suffers from low resolution since the null distribution is constructed from
only $N$ reference estimates, where $N$ is the sample size. This creates a
barrier for statistical inference at a common level like $\alpha = 0.05$,
especially when $N$ is small. We propose a novel leave-two-out procedure that
bypasses this issue, while still maintaining the same finite-sample Type-I
error guarantee under uniform assignment for a wide range of $N$. Unlike the
placebo test whose Type-I error always equals the theoretical upper bound, our
procedure often achieves a lower unconditional Type-I error than theory
suggests; this enables useful inference in the challenging regime when $\alpha
< 1/N$. Empirically, our procedure achieves a higher power when the effect size
is reasonably large and a comparable power otherwise. We generalize our
procedure to non-uniform assignments and show how to conduct sensitivity
analysis. From a methodological perspective, our procedure can be viewed as a
new type of randomization inference different from permutation or rank-based
inference, which is particularly effective in small samples.
| [
{
"version": "v1",
"created": "Sat, 13 Jan 2024 19:52:19 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Apr 2024 17:38:32 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 04:12:09 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Lei",
"Lihua",
""
],
[
"Sudijono",
"Timothy",
""
]
] |
2401.07261 | Lipeng He | Shoupeng Ren, Lipeng He, Tianyu Tu, Di Wu, Jian Liu, Kui Ren, Chun
Chen | LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts | 23 pages, 7 figures; Accepted to FSE 2025, to be published in The
Proceedings of the ACM on Software Engineering (PACMSE) | null | 10.1145/3729353 | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | The exploitation of smart contract vulnerabilities in Decentralized Finance
(DeFi) has resulted in financial losses exceeding 3 billion US dollars.
Existing defense mechanisms primarily focus on detecting and reacting to
adversarial transactions executed by attackers that target victim contracts.
However, with the emergence of private transaction pools where transactions are
sent directly to miners without first appearing in public mempools, current
detection tools face significant challenges in identifying attack activities
effectively. Based on the fact that most attack logic rely on deploying
intermediate smart contracts as supporting components to the exploitation of
victim contracts, novel detection methods have been proposed that focus on
identifying these adversarial contracts instead of adversarial transactions.
However, previous state-of-the-art approaches in this direction have failed to
produce results satisfactory enough for real-world deployment. In this paper,
we propose LookAhead, a new framework for detecting DeFi attacks via unveiling
adversarial contracts. LookAhead leverages common attack patterns, code
semantics and intrinsic characteristics found in adversarial smart contracts to
train Machine Learning (ML)-based classifiers that can effectively distinguish
adversarial contracts from benign ones and make timely predictions of different
types of potential attacks. Experiments on our labeled datasets show that
LookAhead achieves an F1-score as high as 0.8966, which represents an
improvement of over 44.4% compared to the previous state-of-the-art solution,
with a False Positive Rate (FPR) at only 0.16%.
| [
{
"version": "v1",
"created": "Sun, 14 Jan 2024 11:39:33 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Feb 2024 08:12:43 GMT"
},
{
"version": "v3",
"created": "Sun, 15 Sep 2024 13:24:34 GMT"
},
{
"version": "v4",
"created": "Wed, 18 Sep 2024 19:29:39 GMT"
},
{
"version": "v5",
"created": "Wed, 2 Apr 2025 02:00:44 GMT"
},
{
"version": "v6",
"created": "Sun, 20 Apr 2025 19:43:06 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Ren",
"Shoupeng",
""
],
[
"He",
"Lipeng",
""
],
[
"Tu",
"Tianyu",
""
],
[
"Wu",
"Di",
""
],
[
"Liu",
"Jian",
""
],
[
"Ren",
"Kui",
""
],
[
"Chen",
"Chun",
""
]
] |
2401.08219 | Fabian Lenke | Fabian Lenke and Henning Urbat and Stefan Milius | Extended Stone Duality via Monoidal Adjunctions | This paper is the LMCS version of the FOSSACS'24 paper 'Monoidal
Extended Stone Duality' | FoSSaCS 2024. Lecture Notes in Computer Science, vol 14574.
Springer, Cham | 10.1007/978-3-031-57228-9_8 | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Extensions of Stone-type dualities have a long history in algebraic logic and
have also been instrumental in proving results in algebraic language theory. We
show how to extend abstract categorical dualities via monoidal adjunctions,
subsuming various incarnations of classical extended Stone and Priestley
duality as special cases, and providing the foundation for two new concrete
dualities: First, we investigate residuation algebras, which are lattices with
additional residual operators modeling language derivatives algebraically. We
show that the subcategory of derivation algebras is dually equivalent to the
category of profinite ordered monoids, restricting to a duality between Boolean
residuation algebras and profinite monoids. We further refine this duality to
capture relational morphisms of profinite ordered monoids, which dualize to
natural morphisms of residuation algebras. Second, we apply the categorical
extended duality to the discrete setting of sets and complete atomic Boolean
algebras to obtain a concrete description for the dual of the category of all
small categories.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2024 09:10:05 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Nov 2024 12:34:23 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Nov 2024 12:55:33 GMT"
},
{
"version": "v4",
"created": "Sun, 20 Apr 2025 12:51:46 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Lenke",
"Fabian",
""
],
[
"Urbat",
"Henning",
""
],
[
"Milius",
"Stefan",
""
]
] |
2401.09736 | Siyu Ren | Siyu Ren, Junhui Hou, Xiaodong Chen, Hongkai Xiong, and Wenping Wang | DirDist: A Metric for Comparing 3D Shapes Using Directional Distance
Fields | Accepted by T-PAMI | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Qualifying the discrepancy between 3D geometric models, which could be
represented with either point clouds or triangle meshes, is a pivotal issue
with board applications. Existing methods mainly focus on directly establishing
the correspondence between two models and then aggregating point-wise distance
between corresponding points, resulting in them being either inefficient or
ineffective. In this paper, we propose DirDist, an efficient, effective,
robust, and differentiable distance metric for 3D geometry data. Specifically,
we construct DirDist based on the proposed implicit representation of 3D
models, namely directional distance field (DDF), which defines the directional
distances of 3D points to a model to capture its local surface geometry. We
then transfer the discrepancy between two 3D geometric models as the
discrepancy between their DDFs defined on an identical domain, naturally
establishing model correspondence. To demonstrate the advantage of our DirDist,
we explore various distance metric-driven 3D geometric modeling tasks,
including template surface fitting, rigid registration, non-rigid registration,
scene flow estimation and human pose optimization. Extensive experiments show
that our DirDist achieves significantly higher accuracy under all tasks. As a
generic distance metric, DirDist has the potential to advance the field of 3D
geometric modeling. The source code is available at
https://github.com/rsy6318/DirDist.
| [
{
"version": "v1",
"created": "Thu, 18 Jan 2024 05:31:53 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Mar 2025 15:19:59 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Apr 2025 02:29:49 GMT"
},
{
"version": "v4",
"created": "Mon, 21 Apr 2025 05:17:26 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Ren",
"Siyu",
""
],
[
"Hou",
"Junhui",
""
],
[
"Chen",
"Xiaodong",
""
],
[
"Xiong",
"Hongkai",
""
],
[
"Wang",
"Wenping",
""
]
] |
2401.10375 | Jiaqi Wang | Xi Li, Chen Wu, Jiaqi Wang | Foundation Models in Federated Learning: Assessing Backdoor
Vulnerabilities | Xi Li and Chen Wu are equal contribution. The corresponding author is
Jiaqi Wang. This paper has been accepted by IJCNN 2025 | null | null | null | cs.CR cs.DC cs.LG | http://creativecommons.org/licenses/by/4.0/ | Federated Learning (FL), a privacy-preserving machine learning framework,
faces significant data-related challenges. For example, the lack of suitable
public datasets leads to ineffective information exchange, especially in
heterogeneous environments with uneven data distribution. Foundation Models
(FMs) offer a promising solution by generating synthetic datasets that mimic
client data distributions, aiding model initialization and knowledge sharing
among clients. However, the interaction between FMs and FL introduces new
attack vectors that remain largely unexplored. This work therefore assesses the
backdoor vulnerabilities exploiting FMs, where attackers exploit safety issues
in FMs and poison synthetic datasets to compromise the entire system. Unlike
traditional attacks, these new threats are characterized by their one-time,
external nature, requiring minimal involvement in FL training. Given these
uniqueness, current FL defense strategies provide limited robustness against
this novel attack approach. Extensive experiments across image and text domains
reveal the high susceptibility of FL to these novel threats, emphasizing the
urgent need for enhanced security measures in FL in the era of FMs.
| [
{
"version": "v1",
"created": "Thu, 18 Jan 2024 20:56:42 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Apr 2024 01:31:24 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 03:30:43 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Li",
"Xi",
""
],
[
"Wu",
"Chen",
""
],
[
"Wang",
"Jiaqi",
""
]
] |
2401.10858 | Antonio De Rosa | Antonio De Rosa, Yucong Lei, Robert Young | Construction of fillings with prescribed Gaussian image and applications | null | null | null | null | math.AP math.DG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We construct $d$-dimensional polyhedral chains such that the distribution of
tangent planes is close to a prescribed measure on the Grassmannian and the
chains are either cycles (if the barycenter of the prescribed measure,
considered as a measure on $\bigwedge^d \mathbb{R}^n$, is $0$) or their
boundary is the boundary of a unit $d$-cube (if the barycenter of the
prescribed measure is a simple $d$-vector). Such fillings were first proved to
exist by Burago and Ivanov [Geom. funct. anal., 2004]; our work gives an
explicit construction, which is also flexible to generalizations. For instance,
in the case that the measure on the Grassmannian is supported on the set of
positively oriented $d$-planes, we can construct fillings that are Lipschitz
multigraphs. We apply this construction to prove the surprising fact that, for
anisotropic integrands, polyconvexity is equivalent to quasiconvexity of the
associated $Q$-integrands (that is, ellipticity for Lipschitz multigraphs) and
to show that strict polyconvexity is necessary for the atomic condition to
hold.
| [
{
"version": "v1",
"created": "Fri, 19 Jan 2024 18:01:08 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2025 12:32:37 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"De Rosa",
"Antonio",
""
],
[
"Lei",
"Yucong",
""
],
[
"Young",
"Robert",
""
]
] |
2401.11597 | Alex Iosevich | Allan Greenleaf, Alex Iosevich and Krystal Taylor | Realizing trees of configurations in thin sets | null | null | null | null | math.CA math.CO math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $\phi(x,y)$ be a continuous function, smooth away from the diagonal, such
that, for some $\alpha>0$, the associated generalized Radon transforms
\begin{equation} \label{Radon} R_t^{\phi}f(x)=\int_{\phi(x,y)=t} f(y) \psi(y)
d\sigma_{x,t}(y) \end{equation} map $L^2({\mathbb R}^d) \to
L^2_{\alpha}({\mathbb R}^d)$ for all $t>0$. Let $E$ be a compact subset of
${\mathbb R}^d$ for some $d \ge 2$, and suppose that the Hausdorff dimension of
$E$ is $>d-\alpha$. We show that any tree graph $T$ on $k+1$ ($k \ge 1$)
vertices is \new{stably} realizable in $E$, in the sense that \new{for each $t$
in some open interval} there exist distinct $x^1, x^2, \dots, x^{k+1} \in E$
%and $t>0$ such that the $\phi$-distance $\phi(x^i, x^j)=t$ for all pairs
$(i,j)$ corresponding to the edges of $T$.
We extend this result to trees whose edges are prescribed by more complicated
point configurations, such as congruence classes of triangles.
| [
{
"version": "v1",
"created": "Sun, 21 Jan 2024 21:03:20 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Mar 2025 00:52:46 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Apr 2025 03:51:55 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Greenleaf",
"Allan",
""
],
[
"Iosevich",
"Alex",
""
],
[
"Taylor",
"Krystal",
""
]
] |
2401.13760 | Jiayue Wang | Jiayue Wang and Ben Boukai | Early Detection of Treatments Side Effect: A Sequential Approach | There are 21 pages, 8 pictures and 4 tables | null | null | null | stat.AP math.ST stat.ME stat.TH | http://creativecommons.org/licenses/by/4.0/ | With the emergence and spread of infectious diseases with pandemic potential,
such as COVID- 19, the urgency for vaccine development have led to
unprecedented compressed and accelerated schedules that shortened the standard
development timeline. In a relatively short time, the leading pharmaceutical
companies1, received an Emergency Use Authorization (EUA) for vaccine\prime s
en-mass deployment To monitor the potential side effect(s) of the vaccine
during the (initial) vaccination campaign, we developed an optimal sequential
test that allows for the early detection of potential side effect(s). This test
employs a rule to stop the vaccination process once the observed number of side
effect incidents exceeds a certain (pre-determined) threshold. The optimality
of the proposed sequential test is justified when compared with the ({\alpha},
{\beta}) optimality of the non-randomized fixed-sample Uniformly Most Powerful
(UMP) test. In the case of a single side effect, we study the properties of the
sequential test and derive the exact expressions of the Average Sample Number
(ASN) curve of the stopping time (and its variance) via the regularized
incomplete beta function. Additionally, we derive the asymptotic distribution
of the relative savings in ASN as compared to maximal sample size. Moreover, we
construct the post-test parameter estimate and studied its sampling properties,
including its asymptotic behavior under local-type alternatives. These limiting
behavior results are the consistency and asymptotic normality of the post-test
parameter estimator. We conclude the paper with a small simulation study
illustrating the asymptotic performance of the point and interval estimation
and provide a detailed example, based on COVID-19 side effect data (see Beatty
et al. (2021)) of our suggested testing procedure.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2024 19:18:46 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2025 19:50:12 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Wang",
"Jiayue",
""
],
[
"Boukai",
"Ben",
""
]
] |
2401.13931 | Alzayat Saleh | Mostafa Rahimi Azghadi, Alex Olsen, Jake Wood, Alzayat Saleh, Brendan
Calvert, Terry Granshaw, Emilie Fillols, Bronson Philippa | Precision Robotic Spot-Spraying: Reducing Herbicide Use and Enhancing
Environmental Outcomes in Sugarcane | 36 pages, 17 figures, 4 tables. Published at the Computers and
Electronics in Agriculture journal | null | 10.1016/j.compag.2025.110365 | null | cs.RO | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Precise robotic weed control plays an essential role in precision
agriculture. It can help significantly reduce the environmental impact of
herbicides while reducing weed management costs for farmers. In this paper, we
demonstrate that a custom-designed robotic spot spraying tool based on computer
vision and deep learning can significantly reduce herbicide usage on sugarcane
farms. We present results from field trials that compare robotic spot spraying
against industry-standard broadcast spraying, by measuring the weed control
efficacy, the reduction in herbicide usage, and the water quality improvements
in irrigation runoff. The average results across 25 hectares of field trials
show that spot spraying on sugarcane farms is 97\% as effective as broadcast
spraying and reduces herbicide usage by 35\%, proportionally to the weed
density. For specific trial strips with lower weed pressure, spot spraying
reduced herbicide usage by up to 65\%. Water quality measurements of
irrigation-induced runoff, three to six days after spraying, showed reductions
in the mean concentration and mean load of herbicides of 39\% and 54\%,
respectively, compared to broadcast spraying. These promising results reveal
the capability of spot spraying technology to reduce herbicide usage on
sugarcane farms without impacting weed control and potentially providing
sustained water quality benefits.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2024 04:04:44 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 09:02:48 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Azghadi",
"Mostafa Rahimi",
""
],
[
"Olsen",
"Alex",
""
],
[
"Wood",
"Jake",
""
],
[
"Saleh",
"Alzayat",
""
],
[
"Calvert",
"Brendan",
""
],
[
"Granshaw",
"Terry",
""
],
[
"Fillols",
"Emilie",
""
],
[
"Philippa",
"Bronson",
""
]
] |
2401.16105 | Radoslaw Kolkowski | Huayu Bai, Andriy Shevchenko, Radoslaw Kolkowski | Recovery of topologically robust merging bound states in the continuum
in photonic structures with broken symmetry | null | null | 10.1515/nanoph-2024-0609 | null | physics.optics | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Optical bound states in the continuum (BICs) provide a unique mechanism of
light confinement that holds great potential for fundamental and applied
research in optics and photonics. Of particular interest are merging BICs
realized in planar periodic structures by merging accidental and
symmetry-protected BICs. Topological nature of merging BICs renders their $Q$
factors exceptionally high and robust. However, the existence of accidental
BICs relies on the up-down mirror symmetry of the structure. If this symmetry
is broken, e.g., by a substrate, the $Q$ factor of the mode drops down.
Consequently, ultrahigh-$Q$ merging BICs cannot be achieved in
substrate-supported structures. Here, by studying the case of a one-dimensional
periodic dielectric grating, we discover a simple method to fully compensate
for the detrimental effect of breaking the up-down mirror symmetry. The method
makes use of a thin layer of a high-refractive-index dielectric material on one
side of the structure, allowing one to restore the diverging $Q$ factor of the
accidental BIC and fully recover the merged BIC. By investigating the far-field
polarization patterns of the modified gratings, we show that the integer-charge
polarization vortices of the accidental BICs are restored by intersecting the
momentum-space trajectories of circularly polarized half-vortices
simultaneously in the upward and downward radiation directions. Our approach
can enable flexible design, feasible realization, and extended applications of
topologically robust BICs in various systems.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2024 12:21:33 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Nov 2024 08:14:26 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Bai",
"Huayu",
""
],
[
"Shevchenko",
"Andriy",
""
],
[
"Kolkowski",
"Radoslaw",
""
]
] |
2402.01677 | Keyu Wang | Keyu Wang, Guilin Qi, Jiaoyan Chen, Yi Huang, Tianxing Wu | Embedding Ontologies via Incorporating Extensional and Intensional
Knowledge | null | Data Intelligence, Vol. 7, Issue 4, 1222-1241, 2024 | 10.3724/2096-7004.di.2024.0088 | null | cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ontologies contain rich knowledge within domain, which can be divided into
two categories, namely extensional knowledge and intensional knowledge.
Extensional knowledge provides information about the concrete instances that
belong to specific concepts in the ontology, while intensional knowledge
details inherent properties, characteristics, and semantic associations among
concepts. However, existing ontology embedding approaches fail to take both
extensional knowledge and intensional knowledge into fine consideration
simultaneously. In this paper, we propose a novel ontology embedding approach
named EIKE (Extensional and Intensional Knowledge Embedding) by representing
ontologies in two spaces, called extensional space and intensional space. EIKE
presents a unified framework for embedding instances, concepts and their
relations in an ontology, applying a geometry-based method to model extensional
knowledge and a pretrained language model to model intensional knowledge, which
can capture both structure information and textual information. Experimental
results show that EIKE significantly outperforms state-of-the-art methods in
three datasets for both triple classification and link prediction, indicating
that EIKE provides a more comprehensive and representative perspective of the
domain.
| [
{
"version": "v1",
"created": "Sat, 20 Jan 2024 08:44:34 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Feb 2024 14:02:31 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Jun 2024 12:08:41 GMT"
},
{
"version": "v4",
"created": "Mon, 14 Apr 2025 16:08:09 GMT"
},
{
"version": "v5",
"created": "Mon, 21 Apr 2025 15:58:38 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Wang",
"Keyu",
""
],
[
"Qi",
"Guilin",
""
],
[
"Chen",
"Jiaoyan",
""
],
[
"Huang",
"Yi",
""
],
[
"Wu",
"Tianxing",
""
]
] |
2402.02085 | Long Ma | Long Ma, Zhiyuan Yan, Qinglang Guo, Yong Liao, Haiyang Yu, Pengyuan
Zhou | Detecting AI-Generated Video via Frame Consistency | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | The escalating quality of video generated by advanced video generation
methods results in new security challenges, while there have been few relevant
research efforts: 1) There is no open-source dataset for generated video
detection, 2) No generated video detection method has been proposed so far. To
this end, we propose an open-source dataset and a detection method for
generated video for the first time. First, we propose a scalable dataset
consisting of 964 prompts, covering various forgery targets, scenes, behaviors,
and actions, as well as various generation models with different architectures
and generation methods, including the most popular commercial models like
OpenAI's Sora and Google's Veo. Second, we found via probing experiments that
spatial artifact-based detectors lack generalizability. Hence, we propose a
simple yet effective \textbf{de}tection model based on \textbf{f}rame
\textbf{co}nsistency (\textbf{DeCoF}), which focuses on temporal artifacts by
eliminating the impact of spatial artifacts during feature learning. Extensive
experiments demonstrate the efficacy of DeCoF in detecting videos generated by
unseen video generation models and confirm its powerful generalizability across
several commercially proprietary models.
| [
{
"version": "v1",
"created": "Sat, 3 Feb 2024 08:52:06 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Feb 2024 02:51:00 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Jun 2024 11:00:25 GMT"
},
{
"version": "v4",
"created": "Wed, 26 Jun 2024 03:32:50 GMT"
},
{
"version": "v5",
"created": "Sat, 13 Jul 2024 18:20:32 GMT"
},
{
"version": "v6",
"created": "Tue, 20 Aug 2024 07:17:31 GMT"
},
{
"version": "v7",
"created": "Mon, 7 Apr 2025 02:01:27 GMT"
},
{
"version": "v8",
"created": "Sun, 20 Apr 2025 11:47:02 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Ma",
"Long",
""
],
[
"Yan",
"Zhiyuan",
""
],
[
"Guo",
"Qinglang",
""
],
[
"Liao",
"Yong",
""
],
[
"Yu",
"Haiyang",
""
],
[
"Zhou",
"Pengyuan",
""
]
] |
2402.03560 | Paul Kuberry | Pavel Bochev and Justin Owen and Paul Kuberry | Dynamic flux surrogate-based partitioned methods for interface problems | null | null | 10.1016/j.cma.2024.117115 | null | cs.CE math.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Partitioned methods for coupled problems rely on data transfers between
subdomains to synchronize the subdomain equations and enable their independent
solution. By treating each subproblem as a separate entity, these methods
enable code reuse, increase concurrency and provide a convenient framework for
plug-and-play multiphysics simulations. However, accuracy and stability of
partitioned methods depends critically on the type of information exchanged
between the subproblems. The exchange mechanisms can vary from minimally
intrusive remap across interfaces to more accurate but also more intrusive and
expensive estimates of the necessary information based on monolithic
formulations of the coupled system. These transfer mechanisms are separated by
accuracy, performance and intrusiveness gaps that tend to limit the scope of
the resulting partitioned methods to specific simulation scenarios. Data-driven
system identification techniques provide an opportunity to close these gaps by
enabling the construction of accurate, computationally efficient and minimally
intrusive data transfer surrogates. This approach shifts the principal
computational burden to an offline phase, leaving the application of the
surrogate as the sole additional cost during the online simulation phase. In
this paper we formulate and demonstrate such a \emph{dynamic flux
surrogate-based} partitioned method for a model advection-diffusion
transmission problem by using Dynamic Mode Decomposition (DMD) to learn the
dynamics of the interface flux from data. The accuracy of the resulting DMD
flux surrogate is comparable to that of a dual Schur complement reconstruction,
yet its application cost is significantly lower. Numerical results confirm the
attractive properties of the new partitioned approach.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2024 22:18:18 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Bochev",
"Pavel",
""
],
[
"Owen",
"Justin",
""
],
[
"Kuberry",
"Paul",
""
]
] |
2402.04178 | Yingxing Lai | Yichen Shi, Yuhao Gao, Yingxin Lai, Hongyang Wang, Jun Feng, Lei He,
Jun Wan, Changsheng Chen, Zitong Yu, Xiaochun Cao | SHIELD : An Evaluation Benchmark for Face Spoofing and Forgery Detection
with Multimodal Large Language Models | Accepted by Visual Intelligence | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multimodal large language models (MLLMs) have demonstrated strong
capabilities in vision-related tasks, capitalizing on their visual semantic
comprehension and reasoning capabilities. However, their ability to detect
subtle visual spoofing and forgery clues in face attack detection tasks remains
underexplored. In this paper, we introduce a benchmark, SHIELD, to evaluate
MLLMs for face spoofing and forgery detection. Specifically, we design
true/false and multiple-choice questions to assess MLLM performance on
multimodal face data across two tasks. For the face anti-spoofing task, we
evaluate three modalities (i.e., RGB, infrared, and depth) under six attack
types. For the face forgery detection task, we evaluate GAN-based and
diffusion-based data, incorporating visual and acoustic modalities. We conduct
zero-shot and few-shot evaluations in standard and chain of thought (COT)
settings. Additionally, we propose a novel multi-attribute chain of thought
(MA-COT) paradigm for describing and judging various task-specific and
task-irrelevant attributes of face images. The findings of this study
demonstrate that MLLMs exhibit strong potential for addressing the challenges
associated with the security of facial recognition technology applications.
| [
{
"version": "v1",
"created": "Tue, 6 Feb 2024 17:31:36 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2025 05:46:00 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Shi",
"Yichen",
""
],
[
"Gao",
"Yuhao",
""
],
[
"Lai",
"Yingxin",
""
],
[
"Wang",
"Hongyang",
""
],
[
"Feng",
"Jun",
""
],
[
"He",
"Lei",
""
],
[
"Wan",
"Jun",
""
],
[
"Chen",
"Changsheng",
""
],
[
"Yu",
"Zitong",
""
],
[
"Cao",
"Xiaochun",
""
]
] |
2402.05967 | Orson Mengara | Orson Mengara | The last Dance : Robust backdoor attack via diffusion models and
bayesian approach | Preprint (Last update, will never be modified again( correction of a
sketch)): audio backdoor attack on Hugging Face's Transformer pre-trained
models. This attack incorporates state-of-the-art Bayesian techniques, a
modified Fokker-Planck equation (via Yang-Mills), and a diffusion model
approach | null | null | null | cs.LG cs.AI cs.CR eess.SP | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Diffusion models are state-of-the-art deep learning generative models that
are trained on the principle of learning forward and backward diffusion
processes via the progressive addition of noise and denoising. In this paper,
we aim to fool audio-based DNN models, such as those from the Hugging Face
framework, primarily those that focus on audio, in particular transformer-based
artificial intelligence models, which are powerful machine learning models that
save time and achieve results faster and more efficiently. We demonstrate the
feasibility of backdoor attacks (called `BacKBayDiffMod`) on audio transformers
derived from Hugging Face, a popular framework in the world of artificial
intelligence research. The backdoor attack developed in this paper is based on
poisoning model training data uniquely by incorporating backdoor diffusion
sampling and a Bayesian approach to the distribution of poisoned data.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2024 18:00:07 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Mar 2024 11:39:55 GMT"
},
{
"version": "v3",
"created": "Sun, 14 Apr 2024 07:58:40 GMT"
},
{
"version": "v4",
"created": "Thu, 23 May 2024 18:27:39 GMT"
},
{
"version": "v5",
"created": "Mon, 27 May 2024 18:23:01 GMT"
},
{
"version": "v6",
"created": "Mon, 23 Sep 2024 05:19:58 GMT"
},
{
"version": "v7",
"created": "Sun, 20 Apr 2025 19:42:23 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Mengara",
"Orson",
""
]
] |
2402.07582 | Sagar Silva Pratapsi | Sagar Silva Pratapsi, Sebastian Deffner, Stefano Gherardini | Quantum speed limit for Kirkwood-Dirac quasiprobabilities | 23 pages, 5 figures. Comments are welcome | null | null | null | quant-ph cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | What is the minimal time until a quantum system can exhibit genuine quantum
features? To answer this question we derive quantum speed limits for two-time
correlation functions arising from statistics of measurements. Generally, these
two-time correlators are described by quasiprobabilities, if the initial
quantum state of the system does not commute with the measurement observables.
Our quantum speed limits are derived from the Heisenberg-Robertson uncertainty
relation, and set the minimal time at which a quasiprobability can become
non-positive, which is evidence for the onset of non-classical traits in the
system dynamics. As an illustrative example, we apply these results to a
conditional quantum gate, by determining the optimal condition giving rise to
non-classicality at maximum speed. Our analysis also hints at boosted power
extraction in genuinely non-classical dynamics.
| [
{
"version": "v1",
"created": "Mon, 12 Feb 2024 11:28:56 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 14:33:49 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Pratapsi",
"Sagar Silva",
""
],
[
"Deffner",
"Sebastian",
""
],
[
"Gherardini",
"Stefano",
""
]
] |
2402.07988 | Brandon Buncher | Brandon Buncher, Gilbert Holder, Selim Hotinli | Gravitational Lensing of Galaxy Clustering | 11 pages, 4 figures; accepted to OJA | null | 10.33232/001c.132332 | null | astro-ph.CO astro-ph.IM gr-qc | http://creativecommons.org/licenses/by/4.0/ | We investigate lensing reconstruction using the clustered galaxy distribution
as a source field, using both the traditional cosmic microwave background
quadratic estimator and a shear-only estimator. We calculate the expected
signal-to-noise ratio of the cross power spectrum of such reconstructions with
cosmic shear measurements for an LSST-like galaxy survey. Modeling the galaxy
field as a Gaussian random field, we find that there is substantial clustering
signal in the source field at angular scales substantially smaller than those
typically used by CMB reconstructions. The expected signal-to-noise for
cross-correlations in LSST from cosmic shear is $\sim$60 in the presence of
shape noise, while cross correlating with a sample-variance limited mass map
would have signal-to-noise in the hundreds. This type of cross-correlation
could be used as a way to identify systematic errors in lensing studies and is
just one example of many possible higher order correlations in galaxy surveys
that may contain substantial cosmological information.
| [
{
"version": "v1",
"created": "Mon, 12 Feb 2024 19:00:12 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Mar 2025 19:20:38 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Buncher",
"Brandon",
""
],
[
"Holder",
"Gilbert",
""
],
[
"Hotinli",
"Selim",
""
]
] |
2402.09984 | Ravi Hammond | Ravi Hammond, Dustin Craggs, Mingyu Guo, Jakob Foerster, Ian Reid | Symmetry-Breaking Augmentations for Ad Hoc Teamwork | 21 pages, 12 figures, Bidirectional Human-AI Alignment workshop, ICLR
2025 | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | In dynamic collaborative settings, for artificial intelligence (AI) agents to
better align with humans, they must adapt to novel teammates who utilise
unforeseen strategies. While adaptation is often simple for humans, it can be
challenging for AI agents. Our work introduces symmetry-breaking augmentations
(SBA) as a novel approach to this challenge. By applying a symmetry-flipping
operation to increase behavioural diversity among training teammates, SBA
encourages agents to learn robust responses to unknown strategies, highlighting
how social conventions impact human-AI alignment. We demonstrate this
experimentally in two settings, showing that our approach outperforms previous
ad hoc teamwork results in the challenging card game Hanabi. In addition, we
propose a general metric for estimating symmetry dependency amongst a given set
of policies. Our findings provide insights into how AI systems can better adapt
to diverse human conventions and the core mechanics of alignment.
| [
{
"version": "v1",
"created": "Thu, 15 Feb 2024 14:49:28 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2025 14:12:05 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Hammond",
"Ravi",
""
],
[
"Craggs",
"Dustin",
""
],
[
"Guo",
"Mingyu",
""
],
[
"Foerster",
"Jakob",
""
],
[
"Reid",
"Ian",
""
]
] |
2402.10596 | Yasuo Sasaki | Yasuo Sasaki, Keigo Yamada, Takayuki Nagata, Yuji Saito, Taku Nonomura | Fast Data-driven Greedy Sensor Selection for Ridge Regression | null | in IEEE Sensors Journal, vol. 25, no. 6, pp. 10030-10045, 2025 | 10.1109/JSEN.2025.3537702 | null | eess.SP | http://creativecommons.org/licenses/by/4.0/ | We propose a data-driven sensor-selection algorithm for accurate estimation
of the target variables from the selected measurements. The target variables
are assumed to be estimated by a ridge-regression estimator which is trained
based on the data. The proposed algorithm greedily selects sensors for
minimizing the cost function of the estimator. Sensor selection which prevents
overfitting of the resulting estimator can be realized by setting a positive
regularization parameter. The greedy solution is computed in quite a short time
by using some recurrent relations that we derive. The effectiveness of the
proposed algorithm is verified for artificial datasets which are generated from
linear systems and a real-wold dataset which are aimed for selection of
pressure-sensor locations for estimating yaw angle of a ground vehicle. The
demonstration for the datasets reveal that the proposed algorithm computes a
sensor set resulting in more accurate estimation than existing data-drive
selection algorithms in some conditions. Furthermore, it is confirmed that
setting a positive regularization parameter in the proposed algorithm leads to
accurate estimation when overfitting is problematic.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2024 11:29:51 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 04:05:46 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Sasaki",
"Yasuo",
""
],
[
"Yamada",
"Keigo",
""
],
[
"Nagata",
"Takayuki",
""
],
[
"Saito",
"Yuji",
""
],
[
"Nonomura",
"Taku",
""
]
] |
2402.10818 | Enrique Nueve | Enrique Nueve, Bo Waggoner, Dhamma Kimpara, Jessie Finocchiaro | Trading off Consistency and Dimensionality of Convex Surrogates for the
Mode | null | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by/4.0/ | In multiclass classification over $n$ outcomes, the outcomes must be embedded
into the reals with dimension at least $n-1$ in order to design a consistent
surrogate loss that leads to the "correct" classification, regardless of the
data distribution. For large $n$, such as in information retrieval and
structured prediction tasks, optimizing a surrogate in $n-1$ dimensions is
often intractable. We investigate ways to trade off surrogate loss dimension,
the number of problem instances, and restricting the region of consistency in
the simplex for multiclass classification. Following past work, we examine an
intuitive embedding procedure that maps outcomes into the vertices of convex
polytopes in a low-dimensional surrogate space. We show that full-dimensional
subsets of the simplex exist around each point mass distribution for which
consistency holds, but also, with less than $n-1$ dimensions, there exist
distributions for which a phenomenon called hallucination occurs, which is when
the optimal report under the surrogate loss is an outcome with zero
probability. Looking towards application, we derive a result to check if
consistency holds under a given polytope embedding and low-noise assumption,
providing insight into when to use a particular embedding. We provide examples
of embedding $n = 2^{d}$ outcomes into the $d$-dimensional unit cube and $n =
d!$ outcomes into the $d$-dimensional permutahedron under low-noise
assumptions. Finally, we demonstrate that with multiple problem instances, we
can learn the mode with $\frac{n}{2}$ dimensions over the whole simplex.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2024 16:42:09 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 15:12:16 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Nueve",
"Enrique",
""
],
[
"Waggoner",
"Bo",
""
],
[
"Kimpara",
"Dhamma",
""
],
[
"Finocchiaro",
"Jessie",
""
]
] |
2402.16307 | Miyeon Lee | Miyeon Lee, Sucheol Kim, Minje Kim, Dong-Hyun Jung, and Junil Choi | Analyzing Downlink Coverage in Clustered Low Earth Orbit Satellite
Constellations: A Stochastic Geometry Approach | This article has been accepted for publication in IEEE Transactions
on Communications | null | null | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Satellite networks are emerging as vital solutions for global connectivity
beyond 5G. As companies such as SpaceX, OneWeb, and Amazon are poised to launch
a large number of satellites in low Earth orbit, the heightened inter-satellite
interference caused by mega-constellations has become a significant concern. To
address this challenge, recent works have introduced the concept of satellite
cluster networks where multiple satellites in a cluster collaborate to enhance
the network performance. In order to investigate the performance of these
networks, we propose mathematical analyses by modeling the locations of
satellites and users using Poisson point processes, building on the success of
stochastic geometry-based analyses for satellite networks. In particular, we
suggest the lower and upper bounds of the coverage probability as functions of
the system parameters, including satellite density, satellite altitude,
satellite cluster area, path loss exponent, and Nakagami parameter $m$. We
validate the analytical expressions by comparing them with simulation results.
Our analyses can be used to design reliable satellite cluster networks by
effectively estimating the impact of system parameters on the coverage
performance.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2024 05:13:02 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Mar 2024 05:33:48 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 07:21:06 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Lee",
"Miyeon",
""
],
[
"Kim",
"Sucheol",
""
],
[
"Kim",
"Minje",
""
],
[
"Jung",
"Dong-Hyun",
""
],
[
"Choi",
"Junil",
""
]
] |
2402.16622 | Esm\'ee Theewis | Esm\'ee Theewis and Mark Veraar | Large Deviations for Stochastic Evolution Equations in the Critical
Variational Setting | Application section added | null | null | null | math.PR math.AP | http://creativecommons.org/licenses/by/4.0/ | Using the weak convergence approach, we prove the large deviation principle
(LDP) for solutions to quasilinear stochastic evolution equations with small
Gaussian noise in the critical variational setting, a recently developed
general variational framework. No additional assumptions are made apart from
those required for well-posedness. In particular, no monotonicity is required,
nor a compact embedding in the Gelfand triple. Moreover, we allow for flexible
growth of the diffusion coefficient, including gradient noise. This leads to
numerous applications for which the LDP was not established yet, in particular
equations on unbounded domains with gradient noise. Since our framework
includes the 2D Navier-Stokes and Boussinesq equations with gradient noise and
unbounded domains, our results resolve an open problem that has remained
unsolved for over 15 years.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2024 14:52:48 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Mar 2024 08:20:22 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Apr 2025 18:36:13 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Theewis",
"Esmée",
""
],
[
"Veraar",
"Mark",
""
]
] |
2402.17329 | L\'eo Mangeolle | L\'eo Mangeolle, Lucile Savary, Leon Balents | Quantum kinetic equation and thermal conductivity tensor for bosons | 10 + 9 pages (main text + appendices), 1 figure, 1 table | null | 10.1103/PhysRevB.109.235137 | null | cond-mat.str-el cond-mat.stat-mech | http://creativecommons.org/licenses/by-sa/4.0/ | We systematically derive the quantum kinetic equation in full phase space for
any quadratic hamiltonian of bosonic fields, including in the absence of
translational invariance. This enables the treatment of boundaries,
inhomogeneous systems and states with non-trivial textures, such as skyrmions
in the context of magnetic bosons. We relate the evolution of the distribution
of bosons in phase space to single-electron, band-diagonal, physical quantities
such as Berry curvature and energy magnetization, by providing a procedure to
"diagonalize" the Hamiltonian in phase space, using the formalism of the Moyal
product. We obtain exact equations, which can be expanded order by order, for
example in the "smallness" of the spatial gradients, providing a
"semiclassical" approximation. In turn, at first order, we recover the usual
full Boltzmann equation and give a self-contained and exact derivation of the
intrinsic thermal Hall effect of bosons. The formulation clarifies the
contribution from "energy magnetization" in natural manner, and does not
require the inclusion of Luttinger's pseudo-gravitational field to obtain
thermal transport quantities.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2024 09:06:09 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Mangeolle",
"Léo",
""
],
[
"Savary",
"Lucile",
""
],
[
"Balents",
"Leon",
""
]
] |
2402.17877 | Chong Chen | Preethi Chandrasekaran, Chong Chen, Yingmin Liu, Syed Murtaza Arshad,
Christopher Crabtree, Matthew Tong, Yuchi Han, Rizwan Ahmad | Accelerated Real-time Cine and Flow under In-magnet Staged Exercise | null | null | null | null | eess.SP eess.IV | http://creativecommons.org/licenses/by/4.0/ | Background: Cardiovascular magnetic resonance imaging (CMR) is a well
established imaging tool for diagnosing and managing cardiac conditions. The
integration of exercise stress with CMR (ExCMR) can enhance its diagnostic
capacity. Despite recent advances in CMR technology, quantitative ExCMR during
exercise remains technically challenging due to motion artifacts and limited
spatial and temporal resolution. Methods: This study investigated the
feasibility of biventricular functional and hemodynamic assessment using
real-time (RT) ExCMR during a staged exercise protocol in 24 healthy
volunteers. We employed high acceleration rates and applied a coil reweighting
technique to minimize motion blurring and artifacts. We further applied a
beat-selection technique that identified beats from the endexpiratory phase to
minimize the impact of respiration-induced through-plane motion on cardiac
function quantification. Additionally, results from six patients were presented
to demonstrate clinical feasibility. Results: Our findings indicated a
consistent decrease in end-systolic volume and stable end-diastolic volume
across exercise intensities, leading to increased stroke volume and ejection
fraction. The selection of end-expiratory beats modestly enhanced the
repeatability of cardiac function parameters, as shown by scan-rescan tests in
nine volunteers. High scores from a blinded image quality assessment indicated
that coil reweighting effectively minimized motion artifacts. Conclusions: This
study demonstrated the feasibility of RT ExCMR with inmagnet exercise in
healthy subjects and patients. Our results indicate that high acceleration
rates, coil reweighting, and selection of respiratory phase-specific heartbeats
enhance image quality and repeatability of quantitative RT ExCMR.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2024 20:31:44 GMT"
},
{
"version": "v2",
"created": "Tue, 21 May 2024 23:38:55 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Apr 2025 19:56:04 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Chandrasekaran",
"Preethi",
""
],
[
"Chen",
"Chong",
""
],
[
"Liu",
"Yingmin",
""
],
[
"Arshad",
"Syed Murtaza",
""
],
[
"Crabtree",
"Christopher",
""
],
[
"Tong",
"Matthew",
""
],
[
"Han",
"Yuchi",
""
],
[
"Ahmad",
"Rizwan",
""
]
] |
2402.19252 | Zewei Xiong | Zewei Xiong, Meng-Ru Wu, Manu George, Chun-Yu Lin, Noshad Khosravi
Largani, Tobias Fischer, Gabriel Mart\'inez-Pinedo | Fast neutrino flavor conversions in a supernova: Emergence, evolution,
and effects | 32 pages, 22 figures, published in PRD. Including a minor correction
of reference | null | 10.1103/PhysRevD.109.123008 | null | astro-ph.HE hep-ph | http://creativecommons.org/licenses/by/4.0/ | Fast flavor conversions (FFCs) of neutrinos, which can occur in core-collapse
supernovae (CCSNe), are multiangle effects. They depend on the angular
distribution of the neutrino's electron lepton number (ELN). In this work, we
present a comprehensive study of the FFCs by solving the multienergy and
multiangle quantum kinetic equations with an extended set of collisional weak
processes based on a static and spherically symmetric CCSN matter background
profile. We investigate the emergence and evolution of FFCs in models featuring
different ELN angular distributions, considering scenarios with two and three
neutrino flavors. The spectrogram method is utilized to illustrate the
small-scale spatial structure, and we show that this structure of neutrino
flavor coherence and number densities in the nonlinear regime is qualitatively
consistent with the dispersion relation analysis. On the coarse-grained level,
we find that different asymptotic states can be achieved following the FFCs
depending on the locations and shapes of the ELN distributions, despite sharing
a common feature of the elimination of the ELN angular crossing. While
equilibration among different neutrino flavors may be achieved immediately
after the prompt FFCs, it is not a general outcome of the asymptotic state, as
subsequent feedback effects from collisional neutrino-matter interactions come
into play, particularly for cases where FFCs occur inside the neutrinosphere.
The impacts of FFCs and the feedback effect on the net neutrino heating rates,
the equilibrium electron fraction of CCSN matter, and the free-streaming
neutrino energy spectra are quantitatively assessed. Other aspects including
the impact of the vacuum term and the coexistence with other type of flavor
instabilities are also discussed.
| [
{
"version": "v1",
"created": "Thu, 29 Feb 2024 15:23:06 GMT"
},
{
"version": "v2",
"created": "Sat, 8 Jun 2024 15:40:57 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2025 20:50:23 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Xiong",
"Zewei",
""
],
[
"Wu",
"Meng-Ru",
""
],
[
"George",
"Manu",
""
],
[
"Lin",
"Chun-Yu",
""
],
[
"Largani",
"Noshad Khosravi",
""
],
[
"Fischer",
"Tobias",
""
],
[
"Martínez-Pinedo",
"Gabriel",
""
]
] |
2403.01239 | Xuewei Liu | Xuewei Liu, Wei Dou, Benda Xu, Hanwen Wang, Guofu Cao | First-principle event reconstruction by time-charge readouts for the
Taishan Antineutrino Observatory | null | Eur.Phys.J.C 85,438(2025) | 10.1140/epjc/s10052-025-14161-6 | null | hep-ex astro-ph.IM physics.ins-det | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The Taishan Antineutrino Observatory (TAO) is a liquid-scintillator satellite
experiment of the Jiangmen Underground Neutrino Observatory (JUNO) to measure
the reference reactor neutrino spectrum with unprecented energy resolution. We
use inhomogeous Poisson process and Tweedie generalized linear model (GLM) to
characterize the detector response and the charge distribution of a SiPM. We
develop a pure probabilistic model for time and charge of SiPMs from first
principles to reconstruct point-like events in the TAO central detector. Thanks
to our precise model and the high photo-coverage and quantum efficiency of the
SiPM tiles at TAO, we achieve vertex position resolution better than 20mm,
energy resolution of about 2% at 1MeV and <0.5% non-uniformity, marking the
world's best performance of liquid scintillator detectors. With such
resolution, we perceive MeV events to exhibit track effects. It opens up an
exciting possibility of computed tracking calorimeter for unsegmented liquid
scintillator detector like TAO. Our methodology is applicable to other
experiments that utilize PMTs for time and charge readouts.
| [
{
"version": "v1",
"created": "Sat, 2 Mar 2024 15:52:57 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Mar 2024 11:17:48 GMT"
},
{
"version": "v3",
"created": "Wed, 8 Jan 2025 15:15:05 GMT"
},
{
"version": "v4",
"created": "Sat, 19 Apr 2025 07:10:31 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Liu",
"Xuewei",
""
],
[
"Dou",
"Wei",
""
],
[
"Xu",
"Benda",
""
],
[
"Wang",
"Hanwen",
""
],
[
"Cao",
"Guofu",
""
]
] |
2403.02535 | Alexander Eaton | Z. Wu, T. I. Weinberger, A. J. Hickey, D. V. Chichinadze, D. Shaffer,
A. Cabala, H. Chen, M. Long, T. J. Brumm, W. Xie, Y. Lin, Y. Skourski, Z.
Zhu, D. E. Graf, V. Sechovsky, G. G. Lonzarich, M. Valiska, F. M. Grosche, A.
G. Eaton | A quantum critical line bounds the high field metamagnetic transition
surface in UTe$_2$ | null | Phys. Rev. X 15, 021019 (2025) | 10.1103/PhysRevX.15.021019 | null | cond-mat.supr-con cond-mat.str-el | http://creativecommons.org/licenses/by/4.0/ | Quantum critical phenomena are widely studied across various materials
families, from high temperature superconductors to magnetic insulators. They
occur when a thermodynamic phase transition is suppressed to zero temperature
as a function of some tuning parameter such as pressure or magnetic field. This
generally yields a point of instability - a so-called quantum critical point -
at which the phase transition is driven exclusively by quantum fluctuations.
Here we show that the heavy fermion metamagnet UTe$_2$ possesses a quantum
phase transition at extreme magnetic field strengths of over 70 T. Rather than
terminating at one singular point, we find that the phase boundary is sensitive
to magnetic field components in each of the three Cartesian axes of magnetic
field space. This results in the three-dimensional transition surface being
bounded by a continuous ring of quantum critical points, the locus of which
forms an extended line of quantum criticality - a novel form of quantum
critical phase boundary. Within this quantum critical line sits a magnetic
field-induced superconducting state in a toroidal shape, which persists to
fields over 70~T. We model our data by a phenomenological free energy
expansion, and show how a three-dimensional quantum critical phase boundary -
rather than a more conventional singular point of instability - anchors the
remarkable high magnetic field phase landscape of UTe$_2$.
| [
{
"version": "v1",
"created": "Mon, 4 Mar 2024 23:08:43 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Oct 2024 15:02:34 GMT"
},
{
"version": "v3",
"created": "Fri, 14 Mar 2025 10:54:34 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Wu",
"Z.",
""
],
[
"Weinberger",
"T. I.",
""
],
[
"Hickey",
"A. J.",
""
],
[
"Chichinadze",
"D. V.",
""
],
[
"Shaffer",
"D.",
""
],
[
"Cabala",
"A.",
""
],
[
"Chen",
"H.",
""
],
[
"Long",
"M.",
""
],
[
"Brumm",
"T. J.",
""
],
[
"Xie",
"W.",
""
],
[
"Lin",
"Y.",
""
],
[
"Skourski",
"Y.",
""
],
[
"Zhu",
"Z.",
""
],
[
"Graf",
"D. E.",
""
],
[
"Sechovsky",
"V.",
""
],
[
"Lonzarich",
"G. G.",
""
],
[
"Valiska",
"M.",
""
],
[
"Grosche",
"F. M.",
""
],
[
"Eaton",
"A. G.",
""
]
] |
2403.02749 | Zixuan Liu | Zixuan Liu and Giulio Chiribella | Tsirelson bounds for quantum correlations with indefinite causal order | 8+11 pages, 3 figures | Nat. Commun. 16, 3314 (2025) | 10.1038/s41467-025-58508-9 | null | quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum theory is in principle compatible with processes that violate causal
inequalities, an analogue of Bell inequalities that constrain the correlations
observed by sets of parties operating in a definite causal order. Since the
introduction of causal inequalities, determining their maximum quantum
violation, analogue to Tsirelson's bound for Bell inequalities, has remained an
open problem. Here we provide a general method for bounding the violation of
arbitrary causal inequalities, establishing limits to the correlations
achievable by arbitrary local experiments and by arbitrary quantum processes
with indefinite causal order. We prove that the maximum violation is generally
smaller than the algebraic maximum of the corresponding correlation, and
determine Tsirelson-like bounds for a class of causal inequalities including
some of the most paradigmatic examples. Our results motivate a search for
physical principles characterizing the boundary of the set of quantum
correlations with indefinite causal order.
| [
{
"version": "v1",
"created": "Tue, 5 Mar 2024 08:07:10 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Mar 2024 10:58:20 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Mar 2025 15:34:32 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Liu",
"Zixuan",
""
],
[
"Chiribella",
"Giulio",
""
]
] |
2403.02832 | Michael Samet | Christian Bayer, Chiheb Ben Hammouda, Antonis Papapantoleon, Michael
Samet and Ra\'ul Tempone | Quasi-Monte Carlo with Domain Transformation for Efficient Fourier
Pricing of Multi-Asset Options | null | null | null | null | q-fin.CP cs.NA math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Efficiently pricing multi-asset options poses a significant challenge in
quantitative finance. Fourier methods leverage the regularity properties of the
integrand in the Fourier domain to accurately and rapidly value options that
typically lack regularity in the physical domain. However, most of the existing
Fourier approaches face hurdles in high-dimensional settings due to the tensor
product (TP) structure of the commonly employed numerical quadrature
techniques. To overcome this difficulty, this work advocates using the
randomized quasi-MC (RQMC) quadrature to improve the scalability of Fourier
methods with high dimensions. The RQMC technique benefits from the smoothness
of the integrand and alleviates the curse of dimensionality while providing
practical error estimates. Nonetheless, the applicability of RQMC on the
unbounded domain, $\mathbb{R}^d$, requires a domain transformation to
$[0,1]^d$, which may result in singularities of the transformed integrand at
the corners of the hypercube, and hence deteriorate the performance of RQMC. To
circumvent this difficulty, we design an efficient domain transformation
procedure based on boundary growth conditions on the transformed integrand. The
proposed transformation preserves sufficient regularity of the original
integrand for fast convergence of the RQMC method. To validate our analysis, we
demonstrate the efficiency of employing RQMC with an appropriate transformation
to evaluate options in the Fourier space for various pricing models, payoffs,
and dimensions. Finally, we highlight the computational advantage of applying
RQMC over MC or TP in the Fourier domain, and over MC in the physical domain
for options with up to 15 assets.
| [
{
"version": "v1",
"created": "Tue, 5 Mar 2024 10:06:09 GMT"
},
{
"version": "v2",
"created": "Sun, 19 Jan 2025 15:31:24 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Apr 2025 10:03:54 GMT"
},
{
"version": "v4",
"created": "Mon, 21 Apr 2025 06:27:49 GMT"
}
] | 2025-04-22T00:00:00 | [
[
"Bayer",
"Christian",
""
],
[
"Hammouda",
"Chiheb Ben",
""
],
[
"Papapantoleon",
"Antonis",
""
],
[
"Samet",
"Michael",
""
],
[
"Tempone",
"Raúl",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.