content
stringlengths
1
15.9M
\section{Introduction} Expanding shells are ubiquitous in the interstellar medium. They are driven by energetic phenomena of massive stars, such as emission of ionizing photons, stellar winds, and supernova explosions. Recently, using 102 samples identified as shell, \citet{Detal10} found evidences of the star formati...
\section{Introduction} \parag{Natural extension and regular part.} Let $f:\overline{\mathbb{C}} \to \overline{\mathbb{C}} = \mathbb{C} \cup \{\infty\}$ be a rational function of degree $\ge 2$. It generates a non-invertible dynamical system $(f,\overline{\mathbb{C}})$ but it also generates an invertible dynamics in the...
\section{Introduction} \label{section:intro} Data centers spend a significant portion of their overall operational costs towards their electricity bills. As an example, one recent case study suggests that a large 15MW data center (on the more energy-efficient end) might spend about \$1M on its monthly el...
\section{Introduction} Massive stars have a profound effect on the evolution of their natal molecular clouds. Their strong stellar winds and ultraviolet (UV) radiation cause an important feedback of energy and momentum in the surrounding medium. Once massive stars form they begin to ionise the remaining parental m...
\section{Introduction} Many biological processes depend on efficient transport on the microscopic scale. Biological cells contain a large number of microscopic machines that are for example able to maintain the exchange of nutrients between the cell and the surrounding medium. Another important issue is the transport o...
\section{Introduction} There have been numerous studies of collections of driven particles interacting with periodic substrates in which directional or kinetic locking of the particle motion occurs \cite{Nori,Ahn,Korda,Spalding,Lacasta}. Here, some or all of the particles move along a symmetry direction of the substr...
\section{Introduction} \label{sec:Intro} Neural Network (NN) has been considerably utilized in High Energy Physics in the past decade. In most applications, The NN was used as a discriminator to separate signal from backgrounds. It is a powerful tool to extract the features of target categories in the multivariate pha...
\section{Introduction} The general framework we consider is that of a finite graph $G=(V,E)$, in which \textit{spanning subgraphs} are weighted according to their local aspect around each vertex as follows : \begin{eqnarray} \label{eq:productform} \mu(F) & = & \prod_{i\in V}\mu_i(F\cap E_i). \end{eqnarray} Here, a sp...
\section{In cautious praise of string theory} Practitioners of string theory aiming to present an overview of their subject, or to convey a flavor of it to non-specialists, have come up with some memorable expressions.\footnote{The remarks quoted in the first two paragraphs come from various sources. ``Theory of ever...
\section{Introduction} At the time of the beautiful conference in Corfu\footnote{ Corfu Summer Institute on Elementary Particles and Physics - Workshop on Non Commutative Field Theory and Gravity, September 8-12, 2010, Corfu Greece.}, an extensive review on these and related topics had already been completed, whic...
\section{Introduction} Although most of the excitement surrounding the discovery\cite{kamihara_iron-based_2008,rotter_superconductivity_2008} of superconductivity (SC) in the iron pnictide compounds has focused on the underlying mechanism, these compounds also provide us with a fascinating opportunity to study subtle, ...
\section{Introduction} Glueballs, the bound states of the gauge bosons of QCD, the gluons, are naturally expected in QCD due to the nonabelian nature of the theory: the gluons interact strongly with themselves and thus they can bind and form colorless states, analogously to what occurs in the quark sector. The e...
\section{Introduction} \IEEEPARstart{M}{ultilevel} modulation has attracted significant research interest with its ability to improve the spectral efficiency of communication systems. The enabling technology behind it is the coherent transmission and detection, which gives access to both the carrier amplitude and ph...
\section{Introduction} de Sitter spacetime is extensively investigated in the literature from different points of view. In fact, it is particularly relevant for inflation \cite{Guth1981} and hence the physics of the very early universe. Furthermore, there are many recent experimental evidences and astronomical obs...
\section{Introduction} In our recent research \cite{cccdh,ccmzkh} we employed \textit{projection methods }to solve some huge linear feasibility problems that arise in Intensity-Modulated Proton Therapy (IMPT) treatment planning. These huge Linear Programming (LP) problems present a challenge to every LP solver or solu...
\section{Introduction} \label{sec:intro} In this paper we study bilocal sums of spin spherical harmonics \cite{bie85a,var88} (see sect.\ \ref{sec:ssh} below for more details). Such expressions occur in the computation of physical observables in systems undergoing dynamical transitions induced by rotationally invarian...
\section{Introduction} In \cite{biggs2}(or see also \cite{biggs}), Biggs laid the foundation for studying electric resistance on distance-regular graphs. Such graphs were shown to be very natural objects in the study of potential theory, due to the ease of making explicit calculations. In the same paper, Biggs made ...
\section{Introduction} The first examples of the low-temperature L- and T-spectral classes were discovered as companions to stars \citep{Becklin:1988,Nakajima:1995}. The upper temperature limit for a Y-type object is not known; though it is expected to be $<500$~K, when water vapor is predicted to condense (see Figur...
\section{#1}} \def\ssect#1{\subsection{#1}} \def\sssect#1{\subsubsection{#1}} \def\lt#1{\left#1} \def\rt#1{\right#1} \def\t#1{\tilde{#1}} \def\h#1{\hat{#1}} \def\b#1{\bar{#1}} \def\frc#1#2{\frac{#1}{#2}} \newcommand{\underline{\mathrm{P}}}{\underline{\mathrm{P}}} \newcommand{\Gamma}{\Gamma} \newcommand{\partial}{\par...
\section{Introduction} \label{sec:intro} Semantic interoperability refers to an agreement between multiple software or data infrastructures on the terms by which a scenario, \textit{i.e.}, the circumstances relevant to a particular application, can be described. In the presence of such an agreement, different platform...
\section{Introduction} \label{sec:intro} Network coding has been attracting increasing attention since the seminal papers~\cite{ACLY00,LiYeuCai03} as it increases the communication throughput compared to routing. An algebraic formulation for the network coding problem can be found in~\cite{KM03}. A detailed survey on m...
\section{Introduction} The last 10 years have seen a dramatic drop in the cost of electricity generated from solar photovoltaic (PV) systems \cite{fu2018us}. This drop in costs directly leads to an increased rate of deployment of PV systems, and therefore a reduction in future emissions of GHGs from fossil fuels. Once...
\section{Introduction and notation} The digraphs in this note may have antiparallel arcs, but do not have loops. Let $D$ be a digraph. We denote by $V(D)$ and $A(D)$ the vertex set and the arc set of $D$, respectively. We say $D$ is {\it weakly connected} if the underlying graph of $D$ is connected. Let $x\in V(D...
\section{Introduction} \begin{figure} \begin{center} \begin{minipage}{0.45\linewidth} \includegraphics[width=0.9\linewidth, angle=0]{EagleAlulaLabeled_lowQ.png}\\ \end{minipage} \end{center} \vspace{-10pt} \caption{\footnotesize Eagle landing with deflected alular feathers (or alula) as marked. } \label{fi...
\section{Introduction} Sensitive measurements of temperature are essential throughout natural science and modern technology. Increasingly detailed studies of biological, chemical, and physical processes, the miniaturisation of electronics, and emerging quantum technology drive a need for new thermometry techniques appl...
\section{WENO method} For the sake of completeness, we give the formula of WENO interpolation for a hyperbolic system and WENO approximation for a H-J equation. Here, we only show the 1D case with fifth order accuracy. For 2D case, it can be obtained in a dimension-by-dimension fashion, in which we fix one index and do...
\section{Introduction} The GKS game is a three-player game where two players, Alice and Bob, play as a team against their opponent Merlin. The game has two natural parameters $n,k$. In the first phase of the game Merlin and Alice fill an initially empty string $x$ of length $n$ with bits in the following fashion: Fir...
\section{Introduction} Hermitian modular forms of degree $n \in \mathbb{N}$ are modular forms that transform under an action of the split-unitary group $\mathrm{SU}(n,n;\mathcal{O})$ with entries in some order $\mathcal{O}$ in an imaginary-quadratic number field. Through the natural embedding of $\mathrm{SU}(n,n;\ma...
\section{Introduction} \label{sec:introduction} Game playing has long been a core area of traditional AI research. While classical board games such as Chess and Go are computationally very hard, they are also somewhat simple in their actual game play mechanics and representations. Modern board games, such as Settlers ...
\section*{} \vspace{-1cm} \footnotetext{\textit{$^{a}$~School of Mathematics, University of Bristol - Bristol BS8 1UG, UK.}} \footnotetext{$^{\ast}$~E-mail: aurore.loisy@bristol.ac.uk.} \footnotetext{$^{\ddag}$~E-mail: t.liverpool@bristol.ac.uk.} \section{Introduction} To perform essential biological functio...
\section{Introduction}\label{Star-sec1} Let $\varOmega$ be a bounded domain in $\mathbb{R}^n$, $n\ge 2$, with a Lipschitz boundary $\partial\varOmega$. In the space-time cylinder $\varOmega_T=\varOmega\times (0,T)$, $T\in(0,\infty)$, we consider the following differential equation: \begin{equation}\label{Star-1.1} \par...
\section{Introduction} The distance of an error-correcting code is of central importance in coding theory, because it quantifies the number of adversarial errors that can be corrected. For codes of fixed length and rate, upper and lower bounds on their distance can be determined. The best lower bounds can be obtained ...
\section{Introduction}} Quantum information theory is an advanced approach and is basically an amalgam of computer science, physics, and mathematics. It uses the principles of quantum mechanics. In quantum mechanics, the state of the system is expressed by a wave function. The fundamental laws of quantum mechanics are...
\section{Introduction} Multiple particle production at high-energy hadron colliders, such as at the LHC, is dominated by simultaneous multiple interactions between partons from the initial hadrons. Such multiple-parton interactions (MPIs) are indispensable in scrutinizing many event activities and hadron multiplicitie...
\section{Introduction} \label{sec:introduction}} \input{sections/introduction} \section{Background and related work} \label{sec:background} \input{sections/background} \section{Class integration testing} \label{sec:approach} \input{sections/approach} \section{Empirical evaluation} \label{sec:evaluation} \input{sec...
\section{Introduction} One of the key new application scenarios of future wireless networks is known as the Internet-of-Things (IoT), where it is envisioned that a very large number of devices (referred to as users) is sending data to a common access point. Typical examples thereof include sensors for monitoring smar...
\section{Introduction}\label{sec:intro}} \blue{\IEEEPARstart{P}{erson} re-identification (Re-ID) has been widely studied as a specific person retrieval problem across non-overlapping cameras \cite{pami17craft,survey16}. Given a query person-of-interest, the goal of Re-ID is to determine whether this person has appeare...
\section{Joint detection receiver to achieve superadditive capacity with entanglement assistance} \begin{figure} \centering \includegraphics[width=\columnwidth]{JDR.png} \caption{A schematic of our joint detection receiver, which acts on $Mn$ signal modes modulated by Alice, which are received by Bob after transmissio...
\section{Introduction} Absolutely summing multilinear operators between Banach spaces, as well as closely related classes of multilinear operators, have been studied since the 1983 seminal paper \cite{pietsch1983ideals} by A. Pietsch. A huge amount of research has been done in the subject since then; to avoid a long l...
\section{Introduction} Due to their flexible geometric shapes and deformable materials, soft continuum robots have great potentials in performing tasks under dangerous and cluttered environments \cite{majidi2014soft}. However, planning and control of such type of robots remains a challenging problem, as these robots ...
\section{Introduction} The calculations of molecular properties like rovibrational energies and various relativistic effects are routinely performed at small internuclear distances $R$. Numerical results with standard available quantum mechanical codes are not guaranteed to be accurate for large $R$, especially for exp...
\section{Introduction}\label{intr} Let $n\neq0$ be an integer. A set of $m$ positive integers $\{a_1,a_2,\ldots,a_m\}$ is called a $D(n)$-$m$-tuple (or a Diophantine $m$-tuple with the property $D(n)$), if $a_ia_j + n$ is a perfect square for all $1\leq i < j \leq m$. A natural question regarding such sets is abou...
\section{Introduction} In this paper, we study Markov chains through its embedding on a discrete random dynamical system with white noise. This approach goes back to Furstenberg in his pioneer work on random products, see \cite{Fur}. Namely, let $X=\{X_{n}\}$ be an independent and identically distributed (i.i.d.) sequ...
\section{Introduction} Sequence modeling and time series modeling have been critical in real life applications. Their vast applications range from market demand forecast, missile defense, weather forecast, logistics calculation, shipping routes and cost prediction to even the spreading speed of contagions. However, th...
\section{Introduction} Although deep network architectures continue to be successful in a wide range of applications, the problem of learning \emph{robust} deep networks remains an active area of research. In particular, safety and security focused applications are concerned about robustness to adversarial examples, da...
\section{Introduction}\label{intro} When trends of charts of indices or stocks are investigated then it is common to use so called trend indicators to decide whether to buy, hold or sell. But how are these indicators calculated? The first idea is, to smooth the curve of points given by the closes and extract informa...
\section{Introduction} Plasma-facing components (PFCs) in magnetic confinement fusion devices are designed to withstand high heat loads of bombardments from energetic particles. Meanwhile, hydrogen (H) isotopes such as deuterium (D) and tritium (T) are utilized as fuels and their interactions with PFCs need to be t...
\subsection{\lstinline[basicstyle=\ttfamily\large]{#1}}\lstinputlisting{#2}} \title{Emission tomography with a multi-bang assumption on attenuation} \author{Sean Holman and Philip Richardson} \begin{document} \maketitle \abstract{We consider the problem of joint reconstruction of both attenuation $a$ and source de...
\section{Introduction}\label{intro} We consider the abelian stochastic sandpile model on the integer line and obtain a uniform lower bound on the critical density threshold for its absorbing state phase transition. The stochastic sandpile model is a continuous time particle system on a finite or infinite graph, where ...
\section{Introduction} The ordinary supervised classification problems require that each training sample should be equipped with an exact label that denotes the class the sample belongs to. However, the preparation of massive exactly labeled data is usually laborious and unrealistic in practical. Therefore, a lot of st...
\section{Introduction} Les recherches récentes en traitement automatique du langage ont permis d'atteindre des performances proches des capacités humaines, notamment en ce qui concerne la détection de paraphrase ou l'évaluation de la similarité sémantique entre deux phrases\footnote{Voir les résultats obtenus s...
\section{Introduction} During the last 10-15 years both spectroscopic and photometric observations have definitely established that individual Galactic globular clusters (GCs) host multiple populations (MPs) of stars, characterised by C-N, O-Na (and also, but not always, Mg-Al) anticorrelations and He abundance spread...
\section{Introduction} \label{sec:introduction} Let $K$ be a field of characteristic $0$. Let $P=K[X_1,X_2,\dotsc]$, a ring of polynomials in infinitely many variables. Regard $P$ as a graded algebra where the variable $X_i$ has degree $i$. In this grading, the monomial $X_1^{a_1}X_2^{a_2}\dotsb $ has degree $\sum_i i ...
\section{Introduction} \label{sec:1} \label{intro} In modern age, public opinion has long been playing an important role in domestic politics, international relations and the associated policy making. An illustrative case is the U.S. withdrawal from Vietnam in 1970s, which could be partially attributed to the massive d...
\section{Introduction} The advent of modern mobile traffic, e.g., online gaming, mobile virtual reality (VR)/augmented reality (AR) delivery and etc., incurs ultra-high requirements on the wireless bandwidth \cite{nature}. For example, the mobile VR delivery requires the transmission rate on the order of G bit/s \cite...
\section{Background} \label{s:background} \subsection{Language Model} A language model is a probability distribution over sequences of words. It is essential for natural language processing (NLP) tasks, such as speech recognition, machine translation, and text generation. Traditionally, language models estimate the...
\section{Introduction} Deuterated molecules are very useful tracers of dense molecular cloud cores, which are direct progenitors of new stars. This is because at the high gas densities ($\sim10^5-10^6$~cm$^{-3}$) and low temperatures ($\sim10$~K) of the interiors of such cloud cores, many observable molecules (e.g. C...
\section{Introduction} A new era of multi-messenger astronomy has started with the detection of gravitational waves (GW) from a binary neutron star merger (GW170817) by advanced LIGO/advanced Virgo~\cite{abbott17a,abbott17b}, followed by broadband electromagnetic (EM) observations \cite{abbott17c}. Binary systems in...
\section{Preliminaries} In this section, we recall some definitions and basic facts about the $n$-dimensional complex hyperbolic space, we refer to \cite{Goldman, Kapovich} for details. Consider the $n$-dimensional complex vector space $\mathbb C^{n+1}$ equipped with the pseudo-hermitian bilinear form \begin{equation...
\section{Introduction} The minimal genus problem for smooth $4$-manifolds asks to find the minimal genus of an embedded oriented surface representing a given $2$-dimensional homology class in $4$-manifold. Seiberg-Witten theory has generated vast progress on the minimal genus problem \cite{km,mst,os}, see also the sur...
\section{Introduction}\label{sec:bsu-intro} This article considers the spatial interaction of triangle-mesh surfaces with a block model as defined by Poniewierski \cite{poniewierski-19}. For this study, a block model may be conceptualised as a collection of rectangular prisms that span a modelled region in 3D space. Us...
\section{Introduction} This work is concerned with estimating the mixing time of a particular Markov chain on the set of all possible (rooted) planar maps with $n$ edges. Many different Markov chains with a geometric flavour have been considered on a variety of interesting state spaces given by the sets of all possib...
\section{Introduction} Let $G$ be a topological group. Principal $G$-bundles with a commutativity structure on their transition functions are introduced in \cite{AG15}. The classifying space \revtwo{$B(\ZZ,G)$} for such bundles, first introduced in \cite{ACT12}, is a variant of the ordinary classifying space $BG$, wh...
\section{Introduction} \label{Introduction} \en{ Synaptic plasticity in neural networks is a substrate of learning and memory, which includes both positive and negative components, i.e., both long-lasting enhancements and declines in the weight of synaptic transmission (long-term potentiation (LTP) and long-term depre...
\section{Introduction} University courses have traditionally been assessed by written examinations: pen and paper at the ready, separated desks, a clock counting down, and invigilators pacing the room~\cite{Sheard-et_al13a}. This format has survived the test of time because it is simple for instructors to administer, h...
\section{Introduction} Throughout this article $X$ denotes a complex Banach space and $BL(X)$ is the Banach algebra of all bounded linear operators on $X$. Define $\mathcal{I}:= \{zI: z\in \mathbb{C}\}$, where $I$ is the identity operator in $BL(X)$. \begin{definition} Let $A\in BL(X)$. The spectrum of $A$ is denoted ...
\section{Introduction} Graph theory is a rich source of interesting computational problems. Consider the following classical decision problems regarding a graph $G$ with weighted edges: \begin{itemize} \item determine if $G$ has a spanning tree with cost $\leq k$, \item determine if $G$ has a path from $u$ to $v$ in...
\section{Introduction} \label{sec:intro} Almost 25 years after the first discovery of a planet orbiting a main sequence star \cite{Mayor:1995eh}, there are nowadays more than 4000 known planets in more than 3000 known planetary systems\footnote{See, e.g., \url{http://www.exoplanet.eu/catalog/} on the Internet.}. Diff...
\section{Introduction} Given a Hamiltonian $L$ with $N$-degrees of freedom, the procedure of extension allows the construction of Hamiltonians $H$ with $(N+1)$ degrees of freedom admitting as first integrals $L$ itself, with all its possible constants of motion, and a characteristic first integral dependent on a ration...
\section{Introduction} As autonomous agents become commonplace, the challenging task of developing control policies for communication between agents must be addressed. For a stationary point-to-point transmitter-receiver pair under an average power constraint, the total transmittable data is unbounded as time tends to ...
\section*{Introduction} The Galois group of a univariate polynomial exposes its internal symmetry and controls its solvability by radicals. More generally, families of polynomial systems (and of geometric problems) have Galois groups~\cite{Harris} which expose their internal symmetry. We describe how to solve a polyn...
\section{Introduction} \medskip Let $A=(a_1,\ldots,a_n)$ be an arbitrary sequence of real numbers. Let $A_\uparrow=(a_{(1)},\ldots,a_{(n)})$ denote the sequence obtained from $A$ by arranging its elements in the non-decreasing order: $a_{(1)}\le a_{(2)}\le\ldots\le a_{(n)}.$ Given two sequences $A=(a_1,\ldots,a_n)$ ...
\section{Introduction} \label{section: Introduction} \input{Text/Introduction/Introduction} \section{Basics of the program} \label{section: Basics of the program} \input{Text/Basics_of_the_program/Basics_of_the_program} \subsection{Package of the program} \label{subsection: Package of the program} \input{Text/Basi...
\section{Introduction} Individual single photon avalanche diodes (SPADs) have long been the workhorse of many quantum optics experiments~\cite{Migdall_book,Hadfield2009}. This is due largely to their single photon level sensitivity, and also to the Geiger mode operation which allows for straightforward methods of s...
\section{Introduction} \lettrine[]{M}{ACHINE} type communication (MTC) is one of the disruptive technologies promised by 5G and beyond networks. MTC transmissions are uplink-dominant and usually have low data rates. Envisioning future internet of things (IoT) networks where a massive number of sensors haphazardly deplo...
\section{Introduction} Secure distributed storage schemes, e.g.,~\cite{garay2000secure,rawat2016centralized,bitar2018staircase,yu2018lagrange,huang2016communication}, often rely on the idea of secret sharing as introduced in~\cite{shamir1979share,blakley1979safeguarding}. Hence, there is a fundamental lower bound on th...
\section{Introduction}\label{sec:introduction} Epistemic logic programs (ELPs) \cite{lpnmr:GelfondP91}, also referred to as the language of Epistemic Specifications \cite{aaai:Gelfond91}, have received renewed attention in the research community as of late. ELPs are an extension of the language of Answer Set Programmi...
\section*{Supplement}% \setcounter{table}{0} \renewcommand{\thetable}{S\arabic{table}}% \setcounter{figure}{0} \renewcommand{\thefigure}{S\arabic{figure}}% } \usepackage{setspace}% \journal{\textbf{ }} \begin{document} \begin{frontmatter} \title{Towards the Next Generation of Retinal Neuroprosthesis: Visu...
\section{Introduction} The Rashba spin-orbit interaction\cite{rashba1960ei,bychkov1984oscillatory,bychkov1984properties} due to the broken inversion symmetry and the atomic spin-orbit coupling (SOC) can result in the momentum-dependent spin splitting of the electron states, which can be used as an effective way for...
\section{Mitigation ROC Plots}\label{sec:mitigation_roc} This appendix contains plots of the results as discussed in Section \ref{sec:mitigation}. Figure~\ref{fig:individual_ar-fpr_def} contains per-user scatter plots of AR and FPR for all biometric modalities and algorithms. For the same classifiers, Figure~\ref{fig...
\section{Introduction}\label{intro} Active matter is composed of non-equilibrium entities capable of converting autonomously the energy of their surroundings into directed motion or into mechanical work~\cite{bechinger2016}. This definition encompasses a broad variety of systems such as locomotive animals, motile mic...
\section{Introduction} The Schwinger process signals the instability of the vacuum against particle (pair) creation in an external field. The pair ($e^+ e^-$) production rate $\propto \exp\{- a E_{crit} / E \}$, $a = \pi$ \cite{Sauter:1931zz,Heisenberg:1935qt,Schwinger:1951nm}, in a spatio-temporally homogeneous elect...
\section{Introduction} In the game of Sim, two players, P1 and P2, compete on a complete graph of six vertices ($K_6$). Each of the players has a colour, say red for P1 and blue for P2. The players alternate turns, starting with P1, claiming one of the previously uncoloured edges of the $K_6$ and colouring it in their ...
\section{Acknowledgments} We thank Xi Kong for the helpful discussion. \textbf{Funding:} This work was supported by the National Key R$\&$D Program of China (Grants Nos. 2018YFA0306600, 2016YFB0501603 and 2017YFA0305000), the NNSFC (Nos. 11761131011 and 11775209), the Chinese Academy of Sciences (Grants Nos. GJJSTD2017...
\section{Introduction} With the rapid development of the Internet of Things (IoT) applications, timely status updates have become increasingly critical in many areas, such as telesurgery and self-driving cars \cite{b1}. However, the conventional performance metrics, e.g., throughput and delay, cannot properly character...
\section{Introduction} Controllability of a dynamic system is a fundamental notion in control theory~\cite{kalman1963mathematical}. For multi-agent networks, controllability is closely related to the graph-theoretic properties of the underlying network~\cite{tanner2004controllability,rahmani2009controllability,liu201...
\section{Introduction} In 2003, Rodriguez-Villegas \cite{rv-b-2003} conjectured the following four supercongruences associated to certain elliptic curves: \begin{align*} \sum_{k=0}^{p-1}\frac{{2k\choose k}^2}{16^k}\equiv \left(\frac{-1}{p}\right) \pmod{p^2},\quad \sum_{k=0}^{p-1}\frac{{2k\choose k}{3k\choose k}}{27...
\section{Introduction}\label{Introduction} Molecular chirality has played a crucial role in the enantio-selective biological and chemical processes~\cite{Book_UMeierhenrich}, homo-chirality of life~\cite{Satio_Chiral_Review_RevModPhys.85.603}, and even fundamental physics~\cite{MQuck_PVED_Angew1989}. It has attrac...
\section{Introduction} The natural image matting is one of the important tasks in computer vision. It has a variety of applications in image or video editing, compositing and film post-production \cite{wang2008image,aksoy2017designing,lutz2018alphagan,xu2017deep,samplenet}. Matting has received significant interest f...
\section{Introduction} The use of millimeter wave (mmWave) frequencies in access points (APs) becomes a trend in the emerging fifth generation network \cite{andrews2014will,di2015stochastic,jia2016impact,andrews2017modeling,bai2015coverage,rappaport2013millimeter}. Despite the large available bandwidth in mmWave frequ...
\section{Introduction} Many scientific questions aim to find the causal relationships between variables rather than only find the correlations. While the most effective measure for identifying the causal relationships is controlled experimentation, such experiments are often too costly, unethical, or technically imposs...
\section{Introduction} \label{sec:introduction} Supervised learning is the most considered approach for dealing with classification tasks. This paradigm is based on a \emph{sufficiently representative} training set to learn a classification model. This level of representativeness is usually defined by two criteria: on ...
\section{Tight-Binding Band Calculations} To simulate the band structure of K12442 system, we adopted the bilayer five-orbital tight-binding model with the interlayer hopping term \begin{equation} \begin{split} H_{interlayer}=&2t_2^{xz,yz}\sin{kx}\sin{ky}(c^{+}_{1,xz}c_{2,yz}+c^{+}_{1,yz}c_{2,xz}+c^{+}_{2,xz}c_{1,...
\section{Introduction} \label{sect.z21} For many decades graphs have been used as a tool to study a large class of $C^*$-algebras. In \cite{KPRR}, Kumjian, Pask, Raeburn and Renault defined the graph groupoid of a countable row--finite directed graph with no sinks, and showed that the $C^*$-algebra of this groupoid c...
\section{Introduction} \label{Introduction} The last 10 years have seen the ever increasing use of social media platforms and e-commerce systems, such as Tiktok, Amazon or Netflix. Massive amounts of clicking \& purchase interactions, and other user feedback are created explicitly or implicitly in such systems. For e...
\section{Introduction} Two-layer shallow-water equations (SWE) are widely used to simulate geophysical flows in stratified conditions. Some examples of a two-layer configuration include exchange flows in sea straits \citep{castro2001q,castro2004numerical}, highly stratified estuaries \citep{krvavica2017numerical,krvav...
\section{Introduction and Main Results} An important physical problem in fluid mechanics is to study the flows in nozzles. Given an infinitely long nozzle $\tilde{\Omega}$, a natural problem is to investigate the well-posedness theory for the steady Navier-Stokes system \be \label{NS1} \left\{ \ba & ( \Bu \cdot \n...
\section{Introduction} Designing electronic components that can sustain harsh environmental conditions in space and military applications has been an important field of research for many decades \cite{Gouker13,Wong11}. Prolonged bombardment of heavy-ions, protons, neutrons and other particles on electronic equipment ...
\section{Introduction} Nowadays it is hard to imagine a life without e-mail communication, particularly in business area. The growth of e-mail's popularity is accounted for low cost and high effectiveness of exchanging messages. The same factors contribute to the increasing amount of spam. According to a report by Kas...
\section{Introduction}\label{sintro} The present paper is the third in our series of papers on representation theory of simple Lie pseudoalgebras, the first two of which are \cite{BDK1} and \cite{BDK2}. As in these papers, we will work over an algebraically closed field $\kk$ of characteristic $0$. Unless otherwise sp...