content
stringlengths
1
15.9M
\section{Introduction}\label{intro} The inflationary scenario according to which an early exponential expansion of the Universe takes place, offers a compelling explanation for the initial conditions of a hot Big Bang (for reviews see \cite{Olive:1989nu, Lyth:1998xn,Martin:2013tda}). This inflationary description of ...
\section{Introduction} As a geometrical evolution equation, the Ricci flow \cite{Hamilton} has attracted the attention of the physical community since it behaves as a heat equation for the metric, homogenizing the metric on a given manifold. The most obvious applications of the Ricci flow in physics can be realized...
\section{Introduction} \label{sec:intro} Low-dimensional node embeddings are a primary tool in graph mining and machine learning. They are used for node classification, community detection, link prediction, and graph generative models. Classic approaches like spectral clustering \citep{shi2000normalized,ng2002spec...
\section{Error indicator for the adaptive collision operator} \label{sec:indicator} According to the discussion in the previous section, given $\mathbf{f}$ defined on any spatial grid cell, our purpose is to choose appropriate $M_0$ such that the right-hand side of \eqref{eq:semi_discrete_SSP} is a good approximation ...
\section{Introduction} 1D aperiodic crystals are similar to ordinary crystals by virtue of being translationally symmetric in two independent directions yet differ by being aperiodic in the third. Consequently, they cannot be described by just an underlying unit cell and lattice, suggesting the need to go beyond the u...
\section{Introduction} \vspace{-1mm} \emph{Reward poisoning} refers to an adversarial attack against reinforcement learning (RL) where the adversary manipulates the rewards in order to mislead the RL agent's learning process. It has been considered by many as a realistic threat against modern RL applications. Many rea...
\section{Introduction} \label{sec:intro} The James Webb Space Telescope (JWST) is expected to transform our understanding of high-redshift galaxies, and test our predictions for the epoch of reionization. Recently, galaxy simulations aimed at improving our understanding of the epoch of reionization have included stars...
\section*{Introduction} Quantum chaos is a certain type of complex quantum behavior that results in the exponential decay of out-of-time-order correlation functions (OTOC)\cite{kitaev2014hidden,roberts2017chaos,harrow2020separation} efficient operator spreading\cite{nahum2018operator,khemani2018spreading}, small fluct...
\section{Survey Questions}\label{app:SurveyQuestions} \section{Open Coding of Final Survey Responses}\label{sec:app-open-coding-results} Table~\ref{tab:s2Categories} shows the distribution of the categories by the questions. \begin{table*}[htbp] \centering \caption{The codes emerged during the open-coding of the...
\section{Introduction} \par For supervised learning, the gathering of precisely labelled data is crucial to the success of any model, although it is often the most labour-intensive part of any project that requires external resources\cite{Roh2018ASO}. For highly specialised tasks, Subject Matter Experts (SME) are ofte...
\section{Introduction} Markov Random Fields (MRFs) provide a useful framework to model high dimensional probability distributions via an associated dependency graph $\mathbf{G}$, which captures the conditional independence relationships between random variables. Here, the nodes correspond to the random variables; edges...
\section{Introduction} The non-linear sigma model (NLSM) \cite{GellMann:1960np,Coleman:1969sm,Callan:1969sn}, originally designed to describe light mesons in the chiral perturbation theory \cite{Weinberg:1978kz,Gasser:1983yg,Gasser:1984gg}, serves as an effective field theory (EFT) for Nambu-Goldstone bosons (NGB's), ...
\section{Introduction} \label{sec:intro} The current paradigm of hierarchical structure formation has been in place for decades \citep{Rees1977,Silk1977,White1978,White1991}. The general mechanism by which galaxies form starts with random density fluctuations in dark matter that collapse over cosmic time into massive ...
\section{Background}\label{sec:back} We now present an overview of object detection and sampling techniques used in video analytics systems (\autoref{sec:back:obj_det} and \autoref{sec:back:sample}). We later discuss the key techniques used in state-of-the-art systems (\autoref{sec:back:sys}). \subsection{Object ...
\section{Introduction} \label{intro} Processing on end user devices (on-device processing) as opposed to server-based processing is a valued approach in enabling end user privacy. This strategy extends to many of our machine learned (ML) solutions, such as our predictive keyboard or on-device dictation. Personalizatio...
\section{Introduction} \input{sections/introduction.tex} \input{sections/relatedwork.tex} \input{sections/background.tex} \input{sections/methodology.tex} \input{sections/results.tex} \input{sections/conclusion.tex} \section{Background} \label{sec:background} When we work with data that are uniformly sampled in o...
\section{Introduction} When observed by telescope, the solar surface appears covered in a granular pattern. These granules are the tops of convective cells transporting hot plasma from the solar interior to the solar surface, thus heating the photospheric layer of the solar atmosphere. \citet{Hale:1908} discovered tha...
\section{Introduction} Lithium superionic conductors (LSCs) are the critical enabling solid electrolyte (SE) component in next-generation all-solid-state rechargeable lithium-ion batteries \cite{tarasconIssuesChallengesFacing2001a, armandBuildingBetterBatteries2008, xuElectrolytesInterphasesLiIon2014, wangDesignPrinci...
\section{Introduction}\label{sec1} Real numbers form a field $\mathbf{R}$, i.e., they have arithmetics of addition, subtraction, multiplication, and division, and the multiplication of two real numbers is commutative. This leads to the convenience in solving systems of linear equations of real coefficients, which h...
\section{Introduction} The standard model (SM) of particle physics predicts with great accuracy a tremendous number of experimental results covering a wide energy range up to the TeV scale accessible at the CERN LHC~\cite{LHC}. Still, it does not provide explanations for several key observations such as the existence ...
\section{Introduction} \label{sec:intro} Lensed quasars can be used to study the quasars themselves, the lensing galaxies, and the intervening and associated intergalactic medium \citep{zahedy}. The best-known use of strongly lensed quasars is measuring the Hubble parameter $H_0$ \citep{refsdal,treumarshall}. While ...
\section{Introduction} \label{Section 1: Introduction} \subsection{Thermoacoustic instability in can-annular combustors} \zw{Thermoacoustic instabilities} are caused by the constructive interaction of unsteady combustion and the acoustics of the chamber. This dynamic phenomenon is highly undesirable because it cruciall...
\section{Conclusion} This paper utilize a two-stage framework for ASTE tasks. We first extract the target and opinion words by sequence labeling. Then, we use the perceivable pairs at the second stage to make target/opinion words aware the target-opnion-tuples they are currently in, which enhance the target-opinion co...
\section{Introduction} \label{sec:intro} The past few years have witnessed the detection of two interstellar bodies passing through the solar system on hyperbolic orbits. The discoveries of the irregular body ‘Oumuamua \citep{meech2017} and the comet Borisov \citep{jewitt2019} sparked immediate interest in character...
\section{Introduction} Alignment of mental models among the members of a team is critical to achieving effective teamwork. In absence of shared understanding \cite{converse1993shared} about the goals, plans and context of the team, teamwork often results in preventable errors \cite{baker2005medical, kolander2019flight...
\section{Introduction} \label{Introsec} As a rule of thumb, interacting many-body systems in more than one dimension are difficult to analyze, and controllable routes to the inclusion of interactions are rare. One such approach is to consider a non-interacting ``majority" system, couple it to a small number of quantu...
\section{Background \& Motivation} \subsection{Prior Work} \label{related_work} While there has been a substantial amount of effort aimed towards finding new forms of approximation \cite{Omer,Patterns2010,ICSE2010,Hoffmann2009,LoopPerforation,Hoffmann2011,Flikker,Memoization,Relax,Axilog,Parrot,Palem2,Sampson2011}, ...
\section{Introduction} \footnote{\DIFaddbegin \DIFadd{TODO }\DIFaddend Scientific thoughts and contributions welcome \DIFaddbegin \DIFadd{from the GZ Team}} \DIFadd{Morphology is a key driver of galaxy evolution}\DIFaddend . For example, bars are thought to move gas inwards \citep{Sakamoto1999} driving star formation...
\section{Introduction} As a reliability requirement, modern power grids must have the ability to withstand $N-1$ contingencies. However, $N-1$ analysis fails to capture high-impact scenarios due to increasing threats from cyber and physical domains that can cause multiple elements to disfunction or malfunction concur...
\section{Introduction} A contractive representation of a semigroup $P$ on a Hilbert space $\mathcal{H}$ is a semigroup homomorphism $T:P\to\bh{H}$ such that $\|T_p\| \leq 1$ for every $p\in P$. If $p$ is not invertible in $P$ the operator $T_p$ does not have to be isometric. For example, any contractive operator $A\in\...
\section{Introduction} \begin{comment} [Some of this material will probably be moved to the introduction.] There is now broad consensus that the $\Lambda$CDM\ model provides the best current fit to all the available cosmological data [cite]. Some groups [\cite{Ryan_1, Ryan_2, Cao_Ryan_Ratra, Cao_Ryan_Khadka_Ratra} oth...
\section{Introduction} \label{sec:intro} It is now well accepted that supermassive black holes (SMBHs) lie at the center of most massive galaxies. Strong correlations have supported the idea that they evolve with their host galaxies and feedback from the AGN has been shown to regulate star formation \citep[for a revie...
\section{Proofs From Section \ref{sec:model}} \label{app:clm} \convexity* \begin{proof}[Proof of Claim~\ref{clm:convexity}] Fix any $\vec{\epsilon}$ such that $\epsilon_j$ is a concave mapping of $\mathcal{H}$. We use induction on $j$ to prove this claim. The base case $j=0$ follows from the assumption that $\mathca...
\section{Abstract} As we rapidly approach the frontiers of ultra large computing resources, software optimization is becoming of paramount interest to scientific application developers interested in efficiently leveraging all available on-Node computing capabilities and thereby improving a requisite science per watt ...
\section{Introduction} Quantum photonics is the art of using low-light optical signals to exchange and process information in the quantum regime~\cite{flamini_photonic_2018, slussarenko_photonic_2019}. Today, photonic systems represent one of the most promising platforms to implement quantum technology, with already se...
\section{Introduction} In this paper we study a family of random walks defined on the finite ordinals using their order reversing involutions: starting at $x \in \{0,1,\ldots,n-1\}$, an element $y \le x$ is chosen according to a prescribed probability distribution, and the walk then steps to $n-1-y$. Under very mild a...
\section{Introduction} \IEEEPARstart{T}{he} Internet of Things (IoT) has become an important networking paradigm which enables massive connections among ubiquitous physical objects. To address the spectrum scarcity caused by large-scale IoT device access and low spectrum efficiency of static spectrum allocation, a prom...
\section{0pt}{2pt plus 1pt minus 0pt}{0pt plus 1pt minus 0pt} \newtheorem{lemma}{Lemma} \newtheorem{prop}{Proposition} \newtheorem{theorem}{Theorem} \newtheorem{cor}{Corollary} \newtheorem{rem}{Remark} \newtheorem{ex}{Example} \tikzstyle{startstop} = [rectangle, rounded corners, minimum width=4cm, minimum height=1cm,...
\section{Introduction} \subparagraph{Problem Description.} We consider the $\mc$ and $\uc$ problems in the data stream model. The input to both problems are $m$ subsets of a universe of size $n$ and a value $k\in [m]$. In $\mc$, the problem is to find a collection of at most $k$ sets such that the number of elements c...
\section{Introduction and motivation}\label{sec:introduction}} \input{sect_1_introduction} \section{Background: Issue trackers} \label{section:background} \input{sect_2_background} \section{Research approach: Design Science} \label{section:researchMethod} \input{sect_3_researchMethod} \section{RQ1: Drawbacks in iss...
\section{Introduction} \lettrine{T}{he} backbone of smart healthcare is the \ac{IoMT}, which is an amalgamation of medical devices and applications that connect through the internet to healthcare \ac{IT}~\cite{Dimitrov2016} to overcome the shortcomings of traditional healthcare. The \ac{IoMT} has the potential to give ...
\section{Introduction} While modern Deep Learning classifiers can achieve exceptional accuracy in many domains, deploying such models in an open-world setting is not trivial. This requires algorithms to detect anomalous test samples that do not belong to the data distribution on which the model was trained on. In fact,...
\section*{Introduction} Differential equations underpin essentially all of science, engineering, and finance. They describe how the behavior of dynamical systems unfolds over time. Most differential equations cannot be solved symbolically, i.e., a closed form solution does not exist. Almost all systems that are of in...
\section{Introduction} Let $X$ be a toric variety, constructed as a GIT quotient of a vector space $V$ by a torus $T$. There is a well-established theory \cite{Kaw, Seg, BFK, HL} that tells us how to produce semi-orthogonal decompositions of the derived category $D^b(X)$. We do it by considering other birational model...
\section{Proposed Approach} \label{sec:approach} \vspace{-0.4cm} Face detection is the process of identifying image areas containing faces. Face recognition refers to matching the detected face to the reference. Thus face detection is the initial stage of recognition. The first limitation for a good face detection is t...
\section*{Introduction} According to the National Cancer Institute, distress is an emotional, social, spiritual, or physical pain or suffering that may cause a person to feel sad, afraid, depressed, anxious, or lonely. Distress is highly prevalent in cancer patients regardless of disease-stage or modality.~\cite{albre...
\section{Signal and radioactivity background} \label{sec:bkg-sources} \subsection{Anti-neutrino signal and selection cuts} \label{sec:nu-cuts} JUNO detects electron anti-neutrinos via the IBD reaction, $\overline{\nu}_{e}+p\rightarrow e^{+}+n$. Here the positron quickly deposits its kinetic energy and annihilates i...
\section*{Introduction} Let $A$ be a ring, $P$ be a progenerator (that is, a finitely generated projective generator) of Mod-$A$, and $\{ e_1, \cdots, e_s \}$ be a set of central complete orthogonal idempotents of $A$. For any integers $s > 0$ and $n_1 > \cdots > n_s$, it is clear that $T:=\bigoplus\limits_{i=1}^{s}Pe...
\section{Introduction} In this study, we propose a case-based similar image retrieval (SIR) method for histopathological whole slide images (WSIs) in digital pathology of malignant lymphoma. Malignant lymphoma is a group of blood malignancies with more than 70 subtypes~\cite{BB24571652}. Because each subtype has a diff...
\section{Introduction } It was realized long time ago that classical mechanics can be stated in the same mathematical formalism of quantum mechanics, i.e., as a theory of operators acting on a Hilbert space \cite{KvN1,KvN2}. This operational formalism is known as the Koopman-von Neumann (KvN) theory. Inspired...
\section{Introduction} Let $(M,g)$ be a smooth Riemannian $n$-manifold, and let $\Omega $ be an open bounded subset of $M$. The first Dirichlet eigenvalue, or principal frequency, of $\Omega$ is defined by \begin{equation}\label{eqn: lambda 1a} \lambda_1(\Omega) = \inf \left\{ \frac{\int_\Omega |{\nabla} u|^2 }{\int_\O...
\section{Introduction} Meshless methods are becoming a strong alternative to mesh based methods, when numerical treatment of partial differential equations is required. A strong advantage of meshless methods is that they can operate on scattered nodes, contrary to mesh-based methods, that need a computationally expensi...
\section{Introduction}\label{sec.introduction} In this paper, we consider the design, analysis, and implementation of a stochastic inexact sequential quadratic optimization (SISQO) algorithm for minimizing a stochastic objective function subject to deterministic equality constraints. Specifically, we consider proble...
\section{Introduction} The first part of this paper arose from attempts to produce a general means of extending triangle-free linear Ramsey graphs by including one or more additional colours, in a way that reliably produced superior lower bounds for the relevant Ramsey numbers and Schur numbers. At this point, we n...
\section*{References}} \DeclareMathOperator{\sech}{sech} \begin{document} \title{Hopfield Neuronal Network of Fractional Order: A note on its numerical integration} \author{Marius-F. Danca{\footnote{Corresponding author}}\\ Romanian Institute of Science and Technology, \\ 400487 Cluj-Napoca, Romania\\ Email: dan...
\section{Results} \textbf{Variational quantum disentangler assisted by deep Q-learning.} The disentangling circuit design is a challenging problem, consisting of designing a special unitary transformation as a finite sequence of unitary operators $A_t$ is chosen from a universal set of gates $\math...
\section{Introduction} The task of generative modeling in machine learning is as follows: Given $n$ sample points of an unknown probability distribution $P_*$, we would like to approximate $P_*$ well enough to be able to generate new samples. The generative adversarial network (GAN) \cite{goodfellow2014generative} is ...
\section{Introduction} Supersymmetric quantum field theories (SQFT) with a least eight supercharges are particularly amenable to exact, non-perturbative methods. The infrared (IR) physics on the Coulomb branch (CB) of 4d $\mathcal{N}=2$ supersymmetric field theories, in particular, is famously encoded in a Seiberg-Wi...
\section{Preliminaries} We start at notations and definitions, then list some basic results. They will be used throughout this paper. A point in $\R^{n}$ is written as $$ x=(x_1,\cdots,x_{n-1}, x_n)=(x',x_n)$$ and as $x=(x_1,x'',x_n) $ if $n\geq 3$. Let $\R_+^n= \{x\in \R^n|\, x_n>0\} $ be the upper hal...
\section{Motivation} \begin{comment} Understanding the structure and interactions of nuclei from fundamental interactions is a key problem in theoretical physics. With the help of high performance supercomputers, many ab initio approaches have been developed for solid nuclear structure and reaction studies based on fun...
\section{Conclusion} In this work we have taken a fine-grained view of the complexity of popular notions of dynamic data races. We have established a range of lower bounds on the complexity of detecting $\operatorname{\acr{HB}}$ races, sync-preserving races, as well as races based on the locking discipline (lock-c...
\section{Introduction} Consider a physical object consisting of two different materials. It might be a machine part manufactured as a metal-plastic composite, or a fragile cultural heritage object unearthed at an archaeological site, or a two-phase fluid flow inside a process industry pipeline at a given time instant....
\section{Introduction} The efficient and fast generation of body-fitted meshes for complex geometries remains one of the most time-consuming preprocessing steps in numerical simulations involving finite volume (FV) and discontinuous Galerkin (DG) schemes. As a result, the usage of Cartesian embedded boundary meshes be...
\section{Background on Submodularity and Contention Resolution Schemes}\label{app:background} \subsection{Useful Lemmas}\label{app:background1} Below we state several relevant lemmas regarding sampling and submodular functions that we need. \begin{lemma}[Lemma 2.2 from \cite{buchbinder}]\label{lem:buchbinder} Let ...
\section{Introduction} With the development of convolutional neural networks (CNNs), many computer vision tasks have achieved great progress in recent years. Even though supervised learning shows promising results, training CNNs needs large labeled datasets like ImageNet \cite{deng2009imagenet} and Kinetics \cite{kay20...
\section{Abstract} A Bayesian approach to predicting traffic flows at signalised intersections is considered using the the INLA framework. INLA is a deterministic, computationally efficient alternative to MCMC for estimating a posterior distribution. It is designed for latent Gaussian models where the parameters follo...
\section*{Acknowledgement} \bibliographystyle{ieeetr} \input{root.bbl} \end{document} \section{Conclusions} In this paper, we proposed a RL-based negotiation-aware adaptive motion planning framework to deal with the sidewalk problem by alleviating social dilemmas that exist in autonomous driving. We empl...
\section{Introduction} Learning online has become the new norm after the COVID-19 pandemic. Increasing demand for online language learning has made Computer-Aided Pronunciation Training (CAPT) even more popular than before. Automatic speech evaluation, a key component in CAPT, aims to score speaking proficiency accordi...
\section{Autonomous Navigation and Control}\label{sec:autonomous_navigation} The ROS navigation stack move\textunderscore base\footnote{\url{http://wiki.ros.org/move_base}} is employed for navigating the Jackal UGV. The {\it move\textunderscore base} package utilizes costmap\textunderscore 2d\footnote{\url{http://wik...
\section{Introduction}{\label{sec:intro}} Real-Time Applications (RTA) are steadily becoming an inherent part of our lives. RTA are present in such scenarios, as cloud gaming, video streaming, virtual and augmented reality, distance learning, and industrial automation. Devices that support RTA become more and more avai...
\section{Introduction} \label{sec:intro} Our understanding of vertical structure in the Milky Way has drastically evolved over the past decade. Discussions of the disk have traditionally been centered around equilibrium axisymmetric models --- planar and fully phase-mixed vertically and with simple periodic perturbat...
\section{Introduction} \label{intro} Two important examples of $\mathcal{NP}$-Hard Combinatorial Optimisation Problems (COP) are the Travelling Salesman Problem (TSP) and Quadratic Assignment Problem (QAP). The TSP requires finding the shortest route to visit all enlisted locations \cite{TSPformulation}, while the QA...
\section{Introduction} Human motion prediction aims to generate future skeleton sequences according to past observed ones. This technique can help machines anticipate human motion in the future and conjecture the intention of human action. Therefore, human motion prediction is essential to facilitate tasks such as hu...
\section{Introduction.}\label{intro} \section{Introduction} In this paper, we introduce a new Boosting Method to approximately solve a class of linear programs (LPs) or their corresponding integer LPs (ILPs) with linear time complexity. Specifically, we consider LPs with the following form \begin{align} \tag{LP} \m...
\section{Introduction } {\bf 1. INTRODUCTION \vspace{0.2cm}} \\ The Berry's seminal discovery \cite{ber} to the appearance of an additional phase evolution in eigenstates of the Hamiltonian during a slow variation of a quantum system in the parameter space had triggered extensive research for such extra phases in both ...
\section{ Introduction} Cavity optomechanics has sparked extensive theoretical and experimental research interest in the last decade due to its various applications~\cite{RevModPhys.86.1391,Kippenberg1172,Naik2006,Sankey2010,Park2009,Rodgers2010,PhysRevX.1.021011,PhysRevX.8.011031,PhysRevX.5.041024,PhysRevLett.119.0536...
\section{Introduction} A categorification of the cluster algebra structure on the homogeneous coordinate ring $\mathbb C[{\rm Gr}(k, n)]$ of the Grassmannian variety of $k$-dimensional subspaces in $\mathbb C^n$ has been given by Geiss, Leclerc, and Schroer \cite{GLS06, GLS08} in terms of a subcategory of the categor...
\section{Introduction} Let ${\mathbf{k}}$ be an algebraically closed field. In this paper, most of the time (from Section 2 to Section 4), we are mainly interested in the case ${\rm char}\, {\mathbf{k}}>0$. Many problems in arithmetic dynamics, such as Dynamical Mordell-Lang conjecture, Zariski dense orbit conjectur...
\section{Introduction} \label{sec:I} The emerging Internet-of-Things (IoT) leads to the unprecedented growth of the connected IoT devices in the wireless networks and significant rise of several computation demanding applications, such as interactive gaming, virtual/augmented reality, image/video processing. Cloud co...
\section{Introduction} Isolated systems when left to themselves approach a state of thermodynamic equilibrium spontaneously. This state of equilibrium can be uniquely characterized by a set of thermodynamic variables also known as state variables. A driven macroscopic system that can self-organize itself tends to resis...
\section{Introduction}\label{sec.intro} \begin{notan} Let $X$ be a topological space, $V,W$ be normed vector spaces, and $H$ be a complex Hilbert space. \begin{enumerate}[label=(\alph*),leftmargin=2\parindent] \item $\mathcal{B}_X$ is the Borel $\sigma$-algebra on $X$. \item $B(V;W)$ is the space of bounded li...
\section*{Acknowledgments} \begin{abstract} In this paper, we propose a a machine learning approach via model-operator-data network (MOD-Net) for solving PDEs. A MOD-Net is driven by a model to solve PDEs based on operator representation with regularization from data. For linear PDEs, we use a DNN to paramete...
\section{Introduction} In recent years, the field of machine learning (ML) has matured to the point where it can provide real value to power system operations; for this reason, a large portion of research work focuses on applying ML to power system applications. Within this new paradigm, the availability of large amoun...
\section{Introduction} The formation of Sun-like stars is set in motion by the collapse of a cold, dense cloud. Many different physical processes take place in the protostellar stage -- first few $10^5$ yrs that are critical to the subsequent evolution of the star and its planetary system \citep{Lada1987}. The mass ...
\section{Introduction} The goal of this paper is twofold. First of all, we are interested in the so-called \emph{advection-diffusion equation} \begin{equation*} \partial_t v + \mathop{\mathrm {div}}(v\b) = \Delta v \end{equation*} under general, low regularity assumptions on the (divergence-free) vector field $\b$. F...
\section{Introduction} Turbulence remains one of the oldest and most challenging research problems in both pure and applied science; the high Reynolds number limit of the Navier-Stokes equations is of particular interest and developments in scientific computing are useful in advancing the frontiers of our understanding...
\section{Introduction} Compliant mechanisms (CMs) are established concepts in industry and academia offering various advantages over traditional linkage-based counterparts, e.g., less wear and tear, low manufacturing and assembly cost, repeatability and high precision, lack of frictional losses, to name a few. Due t...
\section{Introduction}\label{sec1} Current wireless communication systems are omni-directional and so are easy to eavesdrop upon (see Fig.~\ref{QKD}(a)). Public-key cryptography can be used to secure such transmissions, offering security via assumptions about the computational power of malicious eavesdroppers. These ...
\section{Introduction} \label{sec:intro} There is a great deal of interest in optimization algorithms that can be run on today's noisy intermediate scale quantum (NISQ) information processors~\cite{Preskill:2018aa}. Two prime examples are quantum annealing (QA)~\cite{kadowaki_quantum_1998} and the quantum approximate ...
\section{Introduction}\label{sec.intro} Let $(\Om,\mathscr{F})$ be a measurable space and $H$ be a complex Hilbert space. We write $B(H)$ for the space of bounded linear operators $H \to H$. A function $P \colon \mathscr{F} \to B(H)$ is called a \textbf{projection-valued measure} if $P(\Om)=1 = \id_H$, $P(G)^2= P(G) =...
\section{Introduction} Hamilton cycles is a fundamental object in graph theory and it has been studied in both the deterministic and the stochastic setting. One of the first stochastic settings in which the threshold for Hamiltonicity was determined is the random graph process $\{G_t\}_{t\geq 0}$. $\{G_t\}_{t\geq 0...
\section{INTRODUCTION} \label{sec:introduction} ''{\it The eyes which are the windows of the soul.}`` \\ \rightline{--- Plato (427 BC - 347 BC)} \\ Eye movements are crucial but implicit cues for determining people's attention. Gaze estimation enables the study of visual perception mechanisms in humans, and has been ...
\section{Introduction} \setcounter{equation}{0} The Jacobian conjecture was first formulated in 1939 by Keller \cite{K} which states that a polynomial map $P:\bfF^n\to \bfF^n$ where $\bfF$ is a field of characteristic zero and $n\geq2$ has a polynomial inverse if the Jacobian $J(P)$ of $P$ is a nonzero constant. This ...
\section{Introduction} \label{sec_intuduction} The Low Gain Avalanche Diode (LGAD) is a new type of silicon sensor which has good timing resolution and moderate spatial resolution. This technology will be used to build the High Granularity Timing Detector (HGTD) for the ATLAS experiment in the High Luminosity Large H...
\section{INTRODUCTION} In the past decades, many charmoniumlike states were observed experimentally, such as the $X(3872)$, $Y(4260)$, and $Z_c(3900)$~\cite{Olsen:2017bmm}. Among them, the vector $Y$-states should have quantum numbers $J^{PC} = 1^{--}$, as they are produced in $e^+e^-$ annihilation process. Considerin...
\section{Introduction} Ultra-compact dwarf galaxies (UCDs) were first discovered in spectroscopic surveys of the Fornax cluster \citep{Hilker1999, Drinkwater2000} and have since been discovered in other clusters \citep{Mieske2004, Mieske2007a, has2005, Madrid2010, Misgeld2011, caso2013, Zhang2015}, in galaxy groups \c...
\section{Introduction} 3D point cloud semantic segmentation draws increasing attention in the field of computer vision. In recent years, a large number of Deep Neural Networks (DNNs)~\cite{2017pointnet, 2017pointnet++, 2018sscn, 2018pointcnn, 2018spgraph, 2018dgcnn, 2019pointweb, 2019sspspg, 2020randlanet, 2020grid, 20...
\section{Introduction} In the development of the standard model(SM) \cite{1948Phys}, the anomalous magnetic dipole moment (MDM) of muon has played a huge role. The SM contributions to muon MDM include several parts: The QED loop contributions $a_\mu^{QED}=116584718.931(104)\times 10^{-11}$ \cite{g2rep2020,add,...
\section{Introduction and Statement of Results}\label{sec: intro} In his 1916 paper titled ``On certain arithmetical functions,'' Ramanujan defined the function $\tau(n)$ to be the Fourier coefficients of the normalized weight 12 cusp form for $\operatorname{SL}_2(\mathbb{Z})$ given by \begin{equation} \Delta(z) = ...
\section{Introduction} In the era of information explosion, Recommender Systems (RSs) play critical roles in providing users with interesting contents in many online applications such as e-commerce or music application. Most conventional RSs discover the users' preferences based on their long-term interaction history ...