,Topic,Count,Name,Representation,Representative_Docs,Keywords 0,0,2007,0_reed solomon codes_solomon codes_codes constructed_linear codes,"['reed solomon codes', 'solomon codes', 'codes constructed', 'linear codes', 'codes finite', 'cyclic codes', 'reed muller codes', 'codes length', 'binary codes', 'dual codes']","['AG Codes Achieve List-decoding Capacity over Constant-sized Fields The recently-emerging field of higher order MDS codes has sought to unify a\nnumber of concepts in coding theory. Such areas captured by higher order MDS\ncodes include maximally recoverable (MR) tensor codes, codes with optimal\nlist-decoding guarantees, and codes with constrained generator matrices (as in\nthe GM-MDS theorem).\n By proving these equivalences, Brakensiek-Gopi-Makam showed the existence of\noptimally list-decodable Reed-Solomon codes over exponential sized fields.\nBuilding on this, recent breakthroughs by Guo-Zhang and Alrabiah-Guruswami-Li\nhave shown that randomly punctured Reed-Solomon codes achieve list-decoding\ncapacity (which is a relaxation of optimal list-decodability) over linear size\nfields. We extend these works by developing a formal theory of relaxed higher\norder MDS codes. In particular, we show that there are two inequivalent\nrelaxations which we call lower and upper relaxations. The lower relaxation is\nequivalent to relaxed optimal list-decodable codes and the upper relaxation is\nequivalent to relaxed MR tensor codes with a single parity check per column.\n We then generalize the techniques of GZ and AGL to show that both these\nrelaxations can be constructed over constant size fields by randomly puncturing\nsuitable algebraic-geometric codes. For this, we crucially use the generalized\nGM-MDS theorem for polynomial codes recently proved by Brakensiek-Dhar-Gopi. We\nobtain the following corollaries from our main result. First, randomly\npunctured AG codes of rate $R$ achieve list-decoding capacity with list size\n$O(1/\\epsilon)$ and field size $\\exp(O(1/\\epsilon^2))$. Prior to this work, AG\ncodes were not even known to achieve list-decoding capacity. Second, by\nrandomly puncturing AG codes, we can construct relaxed MR tensor codes with a\nsingle parity check per column over constant-sized fields, whereas\n(non-relaxed) MR tensor codes require exponential field size.\n', 'Many Non-Reed-Solomon Type MDS Codes From Arbitrary Genus Algebraic\n Curves It is always interesting and important to construct non-Reed-Solomon type MDS\ncodes in coding theory and finite geometries. In this paper, we prove that\nthere are non-Reed-Solomon type MDS codes from arbitrary genus algebraic\ncurves. It is proved that MDS algebraic geometry (AG) codes from higher genus\ncurves are not equivalent to MDS AG codes from lower genus curves. For genus\none case, we construct MDS AG codes of small consecutive lengths from elliptic\ncurves. New self-dual MDS AG codes over ${\\bf F}_{{2^s}}$ from elliptic curves\nare also constructed. These MDS AG codes are not equivalent to Reed-Solomon\ncodes, not equivalent to known MDS twisted Reed-Solomon codes and not\nequivalent to Roth-Lempel MDS codes.\n Hence many non-equivalent MDS AG codes, which are not equivalent to\nReed-Solomon codes and known MDS twisted-Reed-Solomon codes, can be obtained\nfrom arbitrary genus algebraic curves. It is interesting open problem to\nconstruct explicit longer MDS AG codes from maximal curves.\n', 'New Constructions of MDS Twisted Reed-Solomon Codes and LCD MDS Codes Maximum distance separable (MDS) codes are optimal where the minimum distance\ncannot be improved for a given length and code size. Twisted Reed-Solomon codes\nover finite fields were introduced in 2017, which are generalization of\nReed-Solomon codes. Twisted Reed-Solomon codes can be applied in cryptography\nwhich prefer the codes with large minimum distance. MDS codes can be\nconstructed from twisted Reed-Solomon codes, and most of them are not\nequivalent to Reed-Solomon codes. In this paper, we first generalize twisted\nReed-Solomon codes to generalized twisted Reed-Solomon codes, then we give some\nnew explicit constructions of MDS (generalized) twisted Reed-Solomon codes. In\nsome cases, our constructions can get MDS codes with the length longer than the\nconstructions of previous works. Linear complementary dual (LCD) codes are\nlinear codes that intersect with their duals trivially. LCD codes can be\napplied in cryptography. This application of LCD codes renewed the interest in\nthe construction of LCD codes having a large minimum distance. We also provide\nnew constructions of LCD MDS codes from generalized twisted Reed-Solomon codes.\n']","[('reed solomon codes', 0.6646755337715149), ('solomon codes', 0.6306332945823669), ('codes constructed', 0.616558849811554), ('linear codes', 0.6121247410774231), ('codes finite', 0.607392430305481), ('cyclic codes', 0.5927842855453491), ('reed muller codes', 0.5909152626991272), ('codes length', 0.575136125087738), ('binary codes', 0.5728431940078735), ('dual codes', 0.555058479309082)]" 1,1,1557,1_nonlinear schr odinger_schr odinger equations_nonlinear schrodinger_nonlinear schr,"['nonlinear schr odinger', 'schr odinger equations', 'nonlinear schrodinger', 'nonlinear schr', 'odinger equations', 'cubic nonlinear schr', 'well posedness scattering', 'nonlinear schr dinger', 'posedness scattering', 'soliton solutions']","['Decay estimates for nonlinear Schr\\""odinger equations In this short note, we present some decay estimates for nonlinear solutions\nof 3d quintic, 3d cubic and 2d quintic NLS (nonlinear Schr\\""odinger equations).\n', 'Scattering for the dispersion managed nonlinear Schr\\""odinger equation We consider the dispersion managed nonlinear Schr\\""dinger equations with\nquintic and cubic nonlinearities in one and two dimensions, respectively. We\nprove the global well-posedness and scattering in $L_x^2$ for small initial\ndata employing the $U^p$ and $V^p$ spaces.\n', 'Global well-posedness and scattering of the two dimensional cubic\n focusing nonlinear Schr\\""odinger system In this article, we prove the global well-posedness and scattering of the\ncubic focusing infinite coupled nonlinear Schr\\""odinger system on\n$\\mathbb{R}^2$ below the threshold in $L_x^2h^1(\\mathbb{R}^2\\times\n\\mathbb{Z})$. We first establish the variational characterization of the ground\nstate, and derive the threshold of the global well-posedness and scattering.\nThen we show the global well-posedness and scattering below the threshold by\nthe concentration-compactness/rigidity method, where the almost periodic\nsolution is excluded by adapting the argument in the proof of the mass-critical\nnonlinear Schr\\""odinger equations by B. Dodson. As a byproduct of the\nscattering of the cubic focusing infinite coupled nonlinear Sch\\""odinger\nsystem, we obtain the scattering of the cubic focusing nonlinear Schr\\""odinger\nequation on the small cylinder, this is the first large data scattering result\nof the focusing nonlinear Schr\\""odinger equations on the cylinders. In the\narticle, we also show the global well-posedness and scattering of the two\ndimensional $N-$coupled focusing cubic nonlinear Schr\\""odinger system in\n$\\left(L^2(\\mathbb{R}^2) \\right)^N$.\n']","[('nonlinear schr odinger', 0.7245205640792847), ('schr odinger equations', 0.709191620349884), ('nonlinear schrodinger', 0.634990394115448), ('nonlinear schr', 0.6349025368690491), ('odinger equations', 0.5982327461242676), ('cubic nonlinear schr', 0.5895614624023438), ('well posedness scattering', 0.5350183844566345), ('nonlinear schr dinger', 0.49812424182891846), ('posedness scattering', 0.4957127273082733), ('soliton solutions', 0.48148131370544434)]" 2,2,1483,2_von neumann algebras_von neumann algebra_neumann algebras_ast algebras,"['von neumann algebras', 'von neumann algebra', 'neumann algebras', 'ast algebras', 'operator algebras', 'group algebras', 'banach algebras', 'unital algebras', 'groupoid algebras', 'neumann algebra']","['The weak tracial Rokhlin property for finite group actions on simple\n C*-algebras We develop the concept of weak tracial Rokhlin property for finite group\nactions on simple (not necessarily unital) C*-algebras and study its properties\nsystematically. In particular, we show that this property is stable under\nrestriction to invariant hereditary C*-algebras, minimal tensor products, and\ndirect limits of actions. Some of these results are new even in the unital case\nand answer open questions asked by N. C. Phillips in full generality. We\npresent several examples of finite group actions with the weak tracial Rokhlin\nproperty on simple stably projectionless C*-algebras. We prove that if $\\alpha\n\\colon G \\rightarrow \\mathrm{Aut}(A)$ is an action of a finite group $G$ on a\nsimple C*-algebra $A$ with tracial rank zero and $\\alpha$ has the weak tracial\nRokhlin property, then the crossed product $A \\rtimes _{\\alpha} G$ and the\nfixed point algebra $A^{\\alpha}$ are simple with tracial rank zero. This\nextends a result of N. C. Phillips to the nonunital case. We use the machinery\nof Cuntz subequivalence to work in this nonunital setting.\n', 'Amenable and inner amenable actions and approximation properties for\n crossed products by locally compact groups Amenable actions of locally compact groups on von Neumann algebras are\ninvestigated by exploiting the natural module structure of the crossed product\nover the Fourier algebra of the acting group. The resulting characterisation of\ninjectivity for crossed products generalises a result of Anantharaman-Delaroche\non discrete groups. Amenable actions of locally compact groups on\n$C^*$-algebras are investigated in the same way, and amenability of the action\nis related to nuclearity of the corresponding crossed product. A survey is\ngiven to show that this notion of amenable action for $C^*$-algebras satisfies\na number of expected properties. A notion of inner amenability for actions of\nlocally compact groups is introduced, and a number of applications are given in\nthe form of averaging arguments, relating approximation properties of crossed\nproduct von Neumann algebras to properties of the components of the underlying\n$w^*$-dynamical system. We use these results to answer a recent question of\nBuss-Echterhoff-Willett.\n', 'A von Neumann algebraic approach to self-similar group actions We study some relations between self-similar group actions and operator\nalgebras. We consider KMS states on the Cuntz--Pimsner algebras constructed by\nNekrashevych from self-similar actions and the GNS representations of the KMS\nstates. The KMS states are given by the Bernoulli measure. We also consider the\nvon Neumann algebras on the GNS spaces and show that the von Neumann algebras\nare type III factors.\n']","[('von neumann algebras', 0.6377335786819458), ('von neumann algebra', 0.5751657485961914), ('neumann algebras', 0.5746338963508606), ('ast algebras', 0.5306749939918518), ('operator algebras', 0.524013102054596), ('group algebras', 0.5180414319038391), ('banach algebras', 0.5093449950218201), ('unital algebras', 0.5085675716400146), ('groupoid algebras', 0.5026136636734009), ('neumann algebra', 0.4977380335330963)]" 3,3,1449,3_partially hyperbolic_topological entropy_uniformly hyperbolic_singular hyperbolic,"['partially hyperbolic', 'topological entropy', 'uniformly hyperbolic', 'singular hyperbolic', 'anosov diffeomorphisms', 'ergodic measures', 'diffeomorphisms', 'measures maximal entropy', 'ergodic measure', 'invariant measures']","['SRB measures for mostly expanding partially hyperbolic diffeomorphisms\n via the variational approach By using the variational approach, we prove the existence of\nSinai-Ruelle-Bowen measures for partially hyperbolic $\\mathcal C^1$\ndiffeomorphisms with mostly expanding properties. The same conclusion holds\ntrue if one considers a dominated splitting $E\\oplus F$, where $\\dim E=1$ and\n$F$ is mostly expanding. When the diffeomorphisms are $\\mathcal C^{1+\\alpha}$,\nwe prove the basin covering property for both cases.\n', 'Unstable Entropy and Unstable Pressure for Partially Hyperbolic\n Endomorphisms In this paper, unstable metric entropy, unstable topological entropy and\nunstable pressure for partially hyperbolic endomorphisms are introduced and\ninvestigated. A version of Shannon-McMillan-Breiman Theorem is established, and\na variational principle is formulated, which gives a relationship between\nunstable metric entropy and unstable pressure (unstable topological entropy).\nAs an application of the variational principle, some results on the\n$u$-equilibrium states are given.\n', 'Minimality of Strong Foliations of Anosov and Partially Hyperbolic\n Diffeomorphisms We study the topological properties of expanding invariant foliations of\n$C^{1+}$ diffeomorphisms, in the context of partially hyperbolic\ndiffeomorphisms and laminations with $1$-dimensional center bundle.\n In this first version of the paper, we introduce a property we call\n*s-transversality* of a partially hyperbolic lamination with $1$-dimensional\ncenter bundle, which is robust under $C^1$ perturbations. We prove that under a\nweak expanding condition on the center bundle (called *some hyperbolicity*, or\n""SH""), any s-transverse partially hyperbolic lamination contains a disk tangent\nto the center-unstable direction (Theorem C).\n We obtain several corollaries, among them: if $f$ is a $C^{1+}$ partially\nhyperbolic Anosov diffeomorphism with $1$-dimensional expanding center, and the\n(strong) unstable foliation $W^{uu}$ of $f$ is minimal, then $W^{uu}$ is\nrobustly minimal under $C^1$-small perturbations, provided that the stable and\nstrong unstable bundles are not jointly integrable (Theorem B).\n Theorem B has applications in our upcoming work with Eskin, Potrie and Zhang,\nin which we prove that on ${\\mathbb T}^3$, any $C^{1+}$ partially hyperbolic\nAnosov diffeomorphism with $1$-dimensional expanding center has a minimal\nstrong unstable foliation, and has a unique $uu$-Gibbs measure provided that\nthe stable and strong unstable bundles are not jointly integrable.\n In a future work, we address the density (in any $C^r$ topology) of\nminimality of strong unstable foliations for $C^{1+}$ partially hyperbolic\ndiffeomorphisms with $1$-dimensional center and the SH property.\n']","[('partially hyperbolic', 0.5368204116821289), ('topological entropy', 0.5126826763153076), ('uniformly hyperbolic', 0.5120298862457275), ('singular hyperbolic', 0.5108306407928467), ('anosov diffeomorphisms', 0.506287157535553), ('ergodic measures', 0.49570387601852417), ('diffeomorphisms', 0.48167508840560913), ('measures maximal entropy', 0.46082785725593567), ('ergodic measure', 0.4517849087715149), ('invariant measures', 0.44821715354919434)]" 4,4,1371,4_enriched categories_infty categories_monoidal categories_monoidal infty,"['enriched categories', 'infty categories', 'monoidal categories', 'monoidal infty', 'categories enriched', 'monoidal category', 'infty categorical', 'infty category', 'functors', 'adjunctions']","[""An equivalence between enriched $\\infty$-categories and\n $\\infty$-categories with weak action We show that an $\\infty$-category $\\mathcal{M}$ with a closed left action of\na monoidal $\\infty$-category $\\mathcal{V}$ is completely determined by the\n$\\mathcal{V}$-valued graph of morphism objects equipped with the structure of a\n$\\mathcal{V}$-enrichment in the sense of Gepner-Haugseng. We prove a similar\nresult when $\\mathcal{M}$ is a $\\mathcal{V}$-enriched $\\infty$-category in the\nsense of Lurie, an operadic generalization of the notion of $\\infty$-category\nwith closed left action. Precisely, we prove that sending a\n$\\mathcal{V}$-enriched $\\infty$-category in the sense of Lurie to the\n$\\mathcal{V}$-valued graph of morphism objects refines to an equivalence $\\chi$\nbetween the $\\infty$-category of $\\mathcal{V}$-enriched $\\infty$-categories in\nthe sense of Lurie and of Gepner-Haugseng. Moreover if $\\mathcal{V}$ is a\npresentably $\\mathbb{E}_{\\mathrm{k+1}}$-monoidal $\\infty$-category for $1 \\leq\nk \\leq \\infty$, we prove that $\\chi$ restricts to a lax\n$\\mathbb{E}_{\\mathrm{k}}$-monoidal functor between the $\\infty$-category of\nleft $\\mathcal{V}$-modules in $\\mathrm{Pr}^L$, the symmetric monoidal\n$\\infty$-category of presentable $\\infty$-categories, endowed with the relative\ntensor product, and the tensor product of $\\mathcal{V}$-enriched\n$\\infty$-categories of Gepner-Haugseng. As an application of our theory we\nconstruct a lax symmetric monoidal embedding of the $\\infty$-category of small\nstable $\\infty$-categories into the $\\infty$-category of small spectral\n$\\infty$-categories. As a second application we produce a Yoneda-embedding for\nLurie's notion of enriched $\\infty$-categories.\n"", ""The higher algebra of weighted colimits We develop a theory of weighted colimits in the framework of weakly\nbienriched $\\infty$-categories, an extension of Lurie's notion of enriched\n$\\infty$-categories. We prove an existence result for weighted colimits, study\nweighted colimits of diagrams of enriched functors, express weighted colimits\nvia enriched coends, characterize the enriched $\\infty$-category of enriched\npresheaves as the free cocompletion under weighted colimits, prove a\nBousfield-Kan formula for weighted colimits and an enriched adjoint functor\ntheorem and develop a theory of universally adjoining weighted colimits to an\nenriched $\\infty$-category. Via the latter we construct for every presentably\n$\\mathbb{E}_{k+1}$-monoidal $\\infty$-category $\\mathcal{V}$ for $1 \\leq k \\leq\n\\infty$ and set $\\mathcal{H}$ of weights a presentably $\\mathbb{E}_k$-monoidal\nstructure on the $\\infty$-category of $\\mathcal{V}$-enriched\n$\\infty$-categories that admit $\\mathcal{H}$-weighted colimits. Varying\n$\\mathcal{H}$ this $\\mathbb{E}_k$-monoidal structure interpolates between the\ntensor product for $\\mathcal{V}$-enriched $\\infty$-categories and the relative\ntensor product for $\\infty$-categories presentably left tensored over\n$\\mathcal{V}$. Studying functoriality in $\\mathcal{H}$ we deduce that taking\n$\\mathcal{V}$-enriched presheaves is $\\mathbb{E}_k$-monoidal with respect to\nthe tensor product on small $\\mathcal{V}$-enriched $\\infty$-categories and the\nrelative tensor product on $\\infty$-categories presentably left tensored over\n$\\mathcal{V}.$ As key applications we construct for every $n \\geq 1 $ and set\n$\\mathcal{K}$ of $(\\infty, n)$-categories a tensor product for\n$(\\infty,n)$-categories that admit $\\mathcal{K}$-indexed (op)lax colimits, a\ntensor product for Cauchy-complete $\\mathcal{V}$-enriched $\\infty$-categories\nand tensor products for (Cauchy complete) $n$-stable, $n$-additive and\n$n$-preadditive $(\\infty,n)$-categories.\n"", ""On bi-enriched $\\infty$-categories We extend Lurie's definition of enriched $\\infty$-categories to notions of\nleft enriched, right enriched and bienriched $\\infty$-categories, which\ngeneralize the concepts of closed left tensored, right tensored and bitensored\n$\\infty$-categories and share many desirable features with them. We use\nbienriched $\\infty$-categories to endow the $\\infty$-category of enriched\nfunctors with enrichment that generalizes both the internal hom of the tensor\nproduct of enriched $\\infty$-categories when the latter exists, and the free\ncocompletion under colimits and tensors. As an application we construct\nenriched Kan-extensions from operadic Kan-extensions, compute the monad for\nenriched functors, prove an end formula for morphism objects of enriched\n$\\infty$-categories of enriched functors and a coend formula for the relative\ntensor product of enriched profunctors and construct transfer of enrichment\nfrom scalar extension of presentably bitensored $\\infty$-categories. In\nparticular, we develop an independent theory of enriched $\\infty$-categories\nfor Lurie's model of enriched $\\infty$-categories.\n""]","[('enriched categories', 0.5784633159637451), ('infty categories', 0.5609920024871826), ('monoidal categories', 0.5609633326530457), ('monoidal infty', 0.5506011843681335), ('categories enriched', 0.5311741828918457), ('monoidal category', 0.5300876498222351), ('infty categorical', 0.5235422849655151), ('infty category', 0.5138448476791382), ('functors', 0.48752516508102417), ('adjunctions', 0.474403440952301)]" 5,5,1366,5_randomized kaczmarz_sparse matrix_krylov subspace methods_iterative methods,"['randomized kaczmarz', 'sparse matrix', 'krylov subspace methods', 'iterative methods', 'large sparse', 'low rank approximation', 'subspace methods', 'krylov methods', 'solving linear systems', 'singular value decomposition']","['Parallelization Strategies for the Randomized Kaczmarz Algorithm on\n Large-Scale Dense Systems The Kaczmarz algorithm is an iterative technique designed to solve consistent\nlinear systems of equations. It falls within the category of row-action\nmethods, focusing on handling one equation per iteration. This characteristic\nmakes it especially useful in solving very large systems. The recent\nintroduction of a randomized version, the Randomized Kaczmarz method, renewed\ninterest in the algorithm, leading to the development of numerous variations.\nSubsequently, parallel implementations for both the original and Randomized\nKaczmarz method have since then been proposed. However, previous work has\naddressed sparse linear systems, whereas we focus on solving dense systems. In\nthis paper, we explore in detail approaches to parallelizing the Kaczmarz\nmethod for both shared and distributed memory for large dense systems. In\nparticular, we implemented the Randomized Kaczmarz with Averaging (RKA) method\nthat, for inconsistent systems, unlike the standard Randomized Kaczmarz\nalgorithm, reduces the final error of the solution. While efficient\nparallelization of this algorithm is not achievable, we introduce a block\nversion of the averaging method that can outperform the RKA method.\n', 'A Novel Greedy Kaczmarz Method For Solving Consistent Linear Systems With a quite different way to determine the working rows, we propose a novel\ngreedy Kaczmarz method for solving consistent linear systems. Convergence\nanalysis of the new method is provided. Numerical experiments show that, for\nthe same accuracy, our method outperforms the greedy randomized Kaczmarz method\nand the relaxed greedy randomized Kaczmarz method introduced recently by Bai\nand Wu [Z.Z. BAI AND W.T. WU, On greedy randomized Kaczmarz method for solving\nlarge sparse linear systems, SIAM J. Sci. Comput., 40 (2018), pp. A592--A606;\nZ.Z. BAI AND W.T. WU, On relaxed greedy randomized Kaczmarz methods for solving\nlarge sparse linear systems, Appl. Math. Lett., 83 (2018), pp. 21--26] in term\nof the computing time.\n', 'Mixed Precision Iterative Refinement with Adaptive Precision Sparse\n Approximate Inverse Preconditioning Hardware trends have motivated the development of mixed precision algo-rithms\nin numerical linear algebra, which aim to decrease runtime while maintaining\nacceptable accuracy. One recent development is the development of an adaptive\nprecision sparse matrix-vector produce routine, which may be used to accelerate\nthe solution of sparse linear systems by iterative methods. This approach is\nalso applicable to the application of inexact preconditioners, such as sparse\napproximate inverse preconditioners used in Krylov subspace methods. In this\nwork, we develop an adaptive precision sparse approximate inverse\npreconditioner and demonstrate its use within a five-precision GMRES-based\niterative refinement method. We call this algorithm variant BSPAI-GMRES-IR. We\nthen analyze the conditions for the convergence of BSPAI-GMRES-IR, and\ndetermine settings under which BSPAI-GMRES-IR will produce similar backward and\nforward errors as the existing SPAI-GMRES-IR method, the latter of which does\nnot use adaptive precision in preconditioning. Our numerical experiments show\nthat this approach can potentially lead to a reduction in the cost of storing\nand applying sparse approximate inverse preconditioners, although a significant\nreduction in cost may comes at the expense of increasing the number of GMRES\niterations required for convergence.\n']","[('randomized kaczmarz', 0.5546283721923828), ('sparse matrix', 0.5349823236465454), ('krylov subspace methods', 0.5323358178138733), ('iterative methods', 0.5034121870994568), ('large sparse', 0.47312769293785095), ('low rank approximation', 0.45638352632522583), ('subspace methods', 0.4484175145626068), ('krylov methods', 0.43034589290618896), ('solving linear systems', 0.4274519681930542), ('singular value decomposition', 0.4176044464111328)]" 6,6,1125,6_banach lattices_operators banach spaces_banach lattice_banach spaces,"['banach lattices', 'operators banach spaces', 'banach lattice', 'banach spaces', 'banach space', 'spaces banach', 'dimensional banach space', 'operators banach', 'dimensional banach', 'properties banach']","['Unbounded continuous operators and unbounded Banach-Saks property in\n Banach lattices Motivated by the equivalent definition of a continuous operator between\nBanach spaces in terms of weakly null nets, we introduce unbounded continuous\noperators by replacing weak convergence with the unbounded absolutely weak\nconvergence ( $uaw$-convergence) in the definition of a continuous operator\nbetween Banach lattices. We characterize order continuous Banach lattices and\nreflexive Banach lattices in terms of these spaces of operators. Moreover,\nmotivated by characterizing of a reflexive Banach lattice in terms of unbounded\nabsolutely weakly Cauchy sequences, we consider pre-unbounded operators between\nBanach lattices which maps $uaw$-Cauchy sequences to weakly ( $uaw$- or norm)\nconvergent sequences. This allows us to characterize $KB$-spaces and reflexive\nspaces in terms of these operators, too. Furthermore, we consider the unbounded\nBanach-Saks property as an unbounded version of the weak Banach-Saks property.\nThere are many considerable relations between spaces possessing the unbounded\nBanach-Saks property with spaces fulfilled by different types of the known\nBanach-Saks property. In particular, we characterize order continuous Banach\nlattices in terms of these relations, as well.\n', 'Free Banach lattices over pre-ordered Banach spaces We define the free Banach lattice over a pre-ordered Banach space in a\ncategory of Banach lattices of a given convexity type, and show its existence.\nThe subsumption of a pre-ordering necessitates an approach that differs\nfundamentally from the known one for the free Banach lattice over a Banach\nspace under a given convexity condition, which is a special case. The relation\nbetween the free vector lattice over a pre-ordered Banach space and the free\nBanach lattice of a given convexity type over it is made explicit. It is\ndetermined when precisely the free Banach lattice has a canonical realisation\nas a lattice of homogeneous continuous functions on the positive part of the\nunit ball of the dual space. For free $p$-convex Banach lattices with convexity\nconstant 1 over pre-ordered Banach spaces, realisations as function lattices\nare obtained that generalise those for free Banach lattices of that type over\nBanach spaces.\n A characterisation of $p$-convex Banach lattices in terms of vector lattice\nhomomorphisms into $\\mathrm{L}_p$-spaces or into the real numbers is included.\n', 'On Subspaces of Indecomposable Banach Spaces We address the following question: what is the class of Banach spaces\nisomorphic to subspaces of indecomposable Banach spaces? We show that this\nclass includes all Banach spaces of density not bigger than the continuum which\ndo not admit $\\ell_\\infty$ as a quotient (equivalently do not admit a subspace\nisomorphic to $\\ell_1(\\cc)$). This includes all Asplund spaces and all weakly\nLindel\\""of determined Banach spaces of density not bigger than the continuum.\nHowever, we also show that this class includes some Banach spaces admitting\n$\\ell_\\infty$ as a quotient. This sheds some light on the question asked in [S.\nArgyros, R. Haydon, \\emph{Bourgain-Delbaen $L^\\infty$-spaces, the\nscalar-plus-compact property and related problems}, Proceedings of the\nInternational Congress of Mathematicians (ICM 2018), Vol. III, 1477--1510. Page\n1502] whether all Banach spaces not containing $\\ell_\\infty$ embed in some\nindecomposable Banach spaces. Our method of constructing indecomposable Banach\nspaces above a given Banach space is a considerable modification of the method\nof constructing Banach spaces of continuous functions with few$^*$ operators\ndeveloped before by the first-named author.\n']","[('banach lattices', 0.7167437672615051), ('operators banach spaces', 0.6922822594642639), ('banach lattice', 0.6896278262138367), ('banach spaces', 0.6819224953651428), ('banach space', 0.6386907696723938), ('spaces banach', 0.6321093440055847), ('dimensional banach space', 0.6247883439064026), ('operators banach', 0.6192137002944946), ('dimensional banach', 0.6020046472549438), ('properties banach', 0.5831128358840942)]" 7,7,1085,7_coloring graphs_edge colorings_vertex coloring_chromatic number graph,"['coloring graphs', 'edge colorings', 'vertex coloring', 'chromatic number graph', 'coloring graph', 'coloring edges', 'edge coloring', 'chromatic number', 'chromatic index', 'chromatic']","['New bounds on the anti-Ramsey numbers of star graphs The anti-Ramsey number $ar(G,H)$ with input graph $G$ and pattern graph $H$,\nis the maximum positive integer $k$ such that there exists an edge coloring of\n$G$ using $k$ colors, in which there are no rainbow subgraphs isomorphic to $H$\nin $G$. ($H$ is rainbow if all its edges get distinct colors). The concept of\nanti-Ramsey number was introduced by Erd\\""os, Simanovitz, and S\\\'os in 1973.\nThereafter several researchers investigated this concept in the combinatorial\nsetting. Recently, Feng et al. revisited the anti-Ramsey problem for the\npattern graph $K_{1,t}$ (for $t \\geq 3$) purely from an algorithmic point of\nview due to its applications in interference modeling of wireless networks.\nThey posed it as an optimization problem, the maximum edge $q$-coloring\nproblem. For a graph $G$ and an integer $q\\geq 2$, an edge $q$-coloring of $G$\nis an assignment of colors to edges of $G$, such that edges incident on a\nvertex span at most $q$ distinct colors. The maximum edge $q$-coloring problem\nseeks to maximize the number of colors in an edge $q$-coloring of the graph\n$G$. Note that the optimum value of the edge $q$-coloring problem of $G$ equals\n$ar(G,K_{1,q+1})$. In this paper, we study $ar(G,K_{1,t})$, the anti-Ramsey\nnumber of stars, for each fixed integer $t\\geq 3$, both from combinatorial and\nalgorithmic point of view. The first of our main results presents an upper\nbound for $ar(G,K_{1,q+1})$, in terms of number of vertices and the minimum\ndegree of $G$. The second one improves this result for the case of\ntriangle-free input graphs. For a positive integer $t$, let $H_t$ denote a\nsubgraph of $G$ with maximum number of possible edges and maximum degree $t$.\nOur third main result presents an upper bound for $ar(G,K_{1,q+1})$ in terms of\n$|E(H_{q-1})|$. All our results have algorithmic consequences.\n', 'Introduction to dominated edge chromatic number of a graph We introduce and study the dominated edge coloring of a graph. A dominated\nedge coloring of a graph $G$ is a proper edge coloring of $G$ such that each\ncolor class is dominated by at least one edge of $G$. The minimum number of\ncolors among all dominated edge coloring is called the dominated edge chromatic\nnumber, denoted by $\\chi_{dom}^{\\prime}(G)$. We obtain some properties of\n$\\chi_{dom}^{\\prime}(G)$ and compute it for specific graphs. Also we examine\nthe effects on $\\chi_{dom}^{\\prime}(G)$ when $G$ is modified by operations on\nvertex and edge of $G$. Finally, we consider the $k$-subdivision of $G$ and\nstudy the dominated edge chromatic number of these kind of graphs.\n', 'A polynomial time algorithm to find star chromatic index on bounded\n treewidth graphs with given maximum degree A star edge coloring of a graph $G$ is a proper edge coloring with no\n2-colored path or cycle of length four. The star edge coloring problem is to\nfind an edge coloring of a given graph $G$ with minimum number $k$ of colors\nsuch that $G$ admits a star edge coloring with $k$ colors. This problem is\nknown to be NP-complete. In this paper, for a bounded treewidth graph with\ngiven maximum degree, we show that it can be solved in polynomial time.\n']","[('coloring graphs', 0.7209494113922119), ('edge colorings', 0.6942355632781982), ('vertex coloring', 0.6914392709732056), ('chromatic number graph', 0.6857175827026367), ('coloring graph', 0.6821513772010803), ('coloring edges', 0.6717137098312378), ('edge coloring', 0.6575759053230286), ('chromatic number', 0.6307727694511414), ('chromatic index', 0.5741596221923828), ('chromatic', 0.5573487281799316)]" 8,8,1025,8_elliptic equations_laplacian_normalized solutions_state solutions,"['elliptic equations', 'laplacian', 'normalized solutions', 'state solutions', 'ground state solutions', 'positive solutions', 'nonlinearities', 'solutions following', 'elliptic', 'delta lambda']","['Positive normalized solutions of Schr\\""{o}dinger equations with Sobolev critical growth in bounded domains This paper investigates the existence of positive normalized solutions to the Sobolev critical Schr\\""{o}dinger equation: \\begin{equation*} \\left\\{ \\begin{aligned} &-\\Delta u +\\lambda u =|u|^{2^*-2}u \\quad &\\mbox{in}& \\ \\Omega,\\\\ &\\int_{\\Omega}|u|^{2}dx=c, \\quad u=0 \\quad &\\mbox{on}& \\ \\partial\\Omega, \\end{aligned} \\right. \\end{equation*} where $\\Omega\\subset\\mathbb{R}^{N}$ ($N\\geq3$) is a bounded smooth domain, $2^*=\\frac{2N}{N-2}$, $\\lambda\\in \\mathbb{R}$ is a Lagrange multiplier, and $c>0$ is a prescribed constant. By introducing a novel blow-up analysis for Sobolev subcritical approximation solutions with uniformly bounded Morse index and fixed mass, we establish the existence of mountain pass type positive normalized solutions for\n $N\\ge 3$. This resolves an open problem posed in [Pierotti, Verzini and Yu, SIAM J. Math. Anal. 2025].', 'Multiplicity of normalized solutions for a Schr\\""{o}dinger equation with\n critical growth in $\\mathbb{R}^{N}$ In this paper we study the multiplicity of normalized solutions to the\nfollowing nonlinear Schr\\""{o}dinger equation with critical growth\n\\begin{align*}\n \\left\\{ \\begin{aligned} &-\\Delta u=\\lambda u+\\mu |u|^{q-2}u+f(u), \\quad \\quad\n\\hbox{in }\\mathbb{R}^N,\\\\ &\\int_{\\mathbb{R}^{N}}|u|^{2}dx=a^{2}, \\end{aligned}\n\\right. \\end{align*} where $a,\\mu>0$, $\\lambda\\in \\mathbb{R}$ is an unknown\nparameter that appears as a Lagrange multiplier, $q \\in (2,2+\\frac{4}{N})$ and\n$f$ has an exponential critical growth when $N=2$, and $f(u)=|u|^{2^*-2}u$ when\n$N \\geq 3$ and $2^{*}=\\frac{2N}{N-2}$.\n', 'Normalized ground states for a biharmonic Choquard system in\n $\\mathbb{R}^4$ In this paper, we study the existence of normalized ground state solutions\nfor the following biharmonic Choquard system \\begin{align*}\n \\begin{split}\n \\left\\{\n \\begin{array}{ll}\n \\Delta^2u=\\lambda_1 u+(I_\\mu*F(u,v))F_u (u,v),\n \\quad\\mbox{in}\\ \\ \\mathbb{R}^4,\n \\Delta^2v=\\lambda_2 v+(I_\\mu*F(u,v)) F_v(u,v),\n \\quad\\mbox{in}\\ \\ \\mathbb{R}^4,\n \\displaystyle\\int_{\\mathbb{R}^4}|u|^2dx=a^2,\\quad\n\\displaystyle\\int_{\\mathbb{R}^4}|v|^2dx=b^2,\\quad u,v\\in H^2(\\mathbb{R}^4),\n \\end{array}\n \\right.\n \\end{split}\n \\end{align*} where $a,b>0$ are prescribed, $\\lambda_1,\\lambda_2\\in\n\\mathbb{R}$, $I_\\mu=\\frac{1}{|x|^\\mu}$ with $\\mu\\in (0,4)$, $F_u,F_v$ are\npartial derivatives of $F$ and $F_u,F_v$ have exponential subcritical or\ncritical growth in the sense of the Adams inequality. By using a minimax\nprinciple and analyzing the behavior of the ground state energy with respect to\nthe prescribed mass, we obtain the existence of ground state solutions for the\nabove problem.\n']","[('elliptic equations', 0.4259313642978668), ('laplacian', 0.41863712668418884), ('normalized solutions', 0.3873852491378784), ('state solutions', 0.3728928864002228), ('ground state solutions', 0.3410762548446655), ('positive solutions', 0.3221206068992615), ('nonlinearities', 0.30490800738334656), ('solutions following', 0.2973612844944), ('elliptic', 0.2876700162887573), ('delta lambda', 0.2798498570919037)]" 9,9,1016,9_singular integral operators_maximal operators_integral operators_maximal operator,"['singular integral operators', 'maximal operators', 'integral operators', 'maximal operator', 'weighted lebesgue spaces', 'besov spaces', 'integral operator', 'morrey spaces', 'operators', 'triebel lizorkin spaces']","['Extrapolation for multilinear compact operators and applications This paper is devoted to studying the Rubio de Francia extrapolation for\nmultilinear compact operators. It allows one to extrapolate the compactness of\n$T$ from just one space to the full range of weighted spaces, whenever an\n$m$-linear operator $T$ is bounded on weighted Lebesgue spaces. This result is\nindeed established in terms of the multilinear Muckenhoupt weights $A_{\\vec{p},\n\\vec{r}}$, and the limited range of the $L^p$ scale. To show extrapolation\ntheorems above, by means of a new weighted Fr\\\'{e}chet-Kolmogorov theorem, we\npresent the weighted interpolation for multilinear compact operators. To prove\nthe latter, we also need to bulid a weighted interpolation theorem in\nmixed-norm Lebesgue spaces. As applications, we obtain the weighted compactness\nof commutators of many multilinear operators, including multilinear\n$\\omega$-Calder\\\'{o}n-Zygmund operators, multilinear Fourier multipliers,\nbilinear rough singular integrals and bilinear Bochner-Riesz means. Beyond\nthat, we establish the weighted compactness of higher order Calder\\\'{o}n\ncommutators, and commutators of Riesz transforms related to Schr\\""{o}dinger\noperators.\n', 'The multilinear Littlewood-Paley square operators and their commutators\n on weighted Morrey spaces In this paper, we prove the boundedness of the multilinear Littlewood-Paley\nsquare operators and their commutators on weighted Morrey spaces, then we give\nthe boundedness and weak-type $L\\log L$ estimates for the commutators of\nmultilinear Littlewood-Paley g-functions and multilinear Marcinkiewicz\nintegrals on weighted Morrey spaces in the form of corollaries.\n', ""A class of multilinear bounded oscillation operators on measure spaces\n and applications In this paper, we develop a comprehensive weighted theory for a class of\nBanach-valued multilinear bounded oscillation operators on measure spaces,\nwhich merges multilinear Calder\\'{o}n-Zygmund operators with a quantity of\noperators beyond the multilinear Calder\\'{o}n-Zygmund theory. We prove that\nsuch multilinear operators and corresponding commutators are locally pointwise\ndominated by two sparse dyadic operators, respectively. We also establish three\nkinds of typical estimates: local exponential decay estimates, mixed weak type\nestimates, and sharp weighted norm inequalities. Beyond that, based on Rubio de\nFrancia extrapolation for abstract multilinear compact operators, we obtain\nweighted compactness for commutators of specific multilinear operators on\nspaces of homogeneous type. A compact extrapolation allows us to get full range\nof exponents, while weighted interpolation for multilinear compact operators is\ncrucial to the compact extrapolation. These are due to a weighted\nFr\\'{e}chet-Kolmogorov theorem in the quasi-Banach range, which gives a\ncharacterization of relative compactness of subsets in weighted Lebesgue\nspaces. As applications, we illustrate multilinear bounded oscillation\noperators with examples including multilinear Hardy-Littlewood maximal\noperators on measure spaces, multilinear $\\omega$-Calder\\'{o}n-Zygmund\noperators on spaces of homogeneous type, multilinear Littlewood-Paley square\noperators, multilinear Fourier integral operators, higher order Calder\\'{o}n\ncommutators, maximally modulated multilinear singular integrals, and\n$q$-variation of $\\omega$-Calder\\'{o}n-Zygmund operators.\n""]","[('singular integral operators', 0.5150975584983826), ('maximal operators', 0.5139108896255493), ('integral operators', 0.5090199708938599), ('maximal operator', 0.4837888479232788), ('weighted lebesgue spaces', 0.4723037779331207), ('besov spaces', 0.4702804982662201), ('integral operator', 0.4377456307411194), ('morrey spaces', 0.43089646100997925), ('operators', 0.42896440625190735), ('triebel lizorkin spaces', 0.4198434054851532)]" 10,10,993,10_persistent homology_homology persistent_persistence diagrams_persistence diagram,"['persistent homology', 'homology persistent', 'persistence diagrams', 'persistence diagram', 'persistence modules', 'space persistence', 'persistent', 'persistence', 'persistence module', 'topological information']","['Persistent Homology and Applied Homotopy Theory This paper is a survey of persistent homology, primarily as it is used in\ntopological data analysis. It includes the theory of persistence modules, as\nwell as stability theorems for persistence barcodes, generalized persistence,\nvectorization of persistence barcodes, as well as some applications.\n', 'Approximating Persistent Homology for Large Datasets Persistent homology is an important methodology from topological data\nanalysis which adapts theory from algebraic topology to data settings and has\nbeen successfully implemented in many applications. It produces a statistical\nsummary in the form of a persistence diagram, which captures the shape and size\nof the data. Despite its widespread use, persistent homology is simply\nimpossible to implement when a dataset is very large. In this paper we address\nthe problem of finding a representative persistence diagram for prohibitively\nlarge datasets. We adapt the classical statistical method of bootstrapping,\nnamely, drawing and studying smaller multiple subsamples from the large\ndataset. We show that the mean of the persistence diagrams of subsamples --\ntaken as a mean persistence measure computed from the subsamples -- is a valid\napproximation of the true persistent homology of the larger dataset. We give\nthe rate of convergence of the mean persistence diagram to the true persistence\ndiagram in terms of the number of subsamples and size of each subsample. Given\nthe complex algebraic and geometric nature of persistent homology, we adapt the\nconvexity and stability properties in the space of persistence diagrams\ntogether with random set theory to achieve our theoretical results for the\ngeneral setting of point cloud data. We demonstrate our approach on simulated\nand real data, including an application of shape clustering on complex\nlarge-scale point cloud data.\n', 'Persistent Homology Analysis for Materials Research and Persistent\n Homology Software: HomCloud This paper introduces persistent homology, which is a powerful tool to\ncharacterize the shape of data using the mathematical concept of topology. We\nexplain the fundamental idea of persistent homology from scratch using some\nexamples. We also review some applications of persistent homology to materials\nresearches and software for persistent homology data analysis. HomCloud, one of\npersistent homology software, is especially featured in this paper.\n']","[('persistent homology', 0.7719906568527222), ('homology persistent', 0.744110107421875), ('persistence diagrams', 0.7337721586227417), ('persistence diagram', 0.699025571346283), ('persistence modules', 0.6252869367599487), ('space persistence', 0.5914064049720764), ('persistent', 0.5803965330123901), ('persistence', 0.5683341026306152), ('persistence module', 0.5662754774093628), ('topological information', 0.5057733058929443)]" 11,11,865,11_physics informed neural_neural networks solving_neural networks pinns_neural network pinn,"['physics informed neural', 'neural networks solving', 'neural networks pinns', 'neural network pinn', 'informed neural networks', 'neural operators', 'operator networks', 'neural networks', 'informed neural network', 'deep learning']","['Physics-Informed Neural Networks for Solving Forward and Inverse PDEs\n with Limited and Noisy Data: Application to Solar Corona Modeling I will demonstrate the effectiveness of Physics-Informed Neural Networks\n(PINNs) in solving partial differential equations (PDEs) when training data are\nscarce or noisy. The training data can be located either at the boundaries or\nwithin the domain. Additionally, PINNs can be used as an inverse method to\ndetermine unknown coefficients in the equations. This study will highlight the\napplication of PINNs in modeling magnetohydrodynamic processes relevant to\nstrongly magnetized plasmas, such as those found in the solar corona.\n', 'Operator Learning Enhanced Physics-informed Neural Networks for Solving\n Partial Differential Equations Characterized by Sharp Solutions Physics-informed Neural Networks (PINNs) have been shown as a promising\napproach for solving both forward and inverse problems of partial differential\nequations (PDEs). Meanwhile, the neural operator approach, including methods\nsuch as Deep Operator Network (DeepONet) and Fourier neural operator (FNO), has\nbeen introduced and extensively employed in approximating solution of PDEs.\nNevertheless, to solve problems consisting of sharp solutions poses a\nsignificant challenge when employing these two approaches. To address this\nissue, we propose in this work a novel framework termed Operator Learning\nEnhanced Physics-informed Neural Networks (OL-PINN). Initially, we utilize\nDeepONet to learn the solution operator for a set of smooth problems relevant\nto the PDEs characterized by sharp solutions. Subsequently, we integrate the\npre-trained DeepONet with PINN to resolve the target sharp solution problem. We\nshowcase the efficacy of OL-PINN by successfully addressing various problems,\nsuch as the nonlinear diffusion-reaction equation, the Burgers equation and the\nincompressible Navier-Stokes equation at high Reynolds number. Compared with\nthe vanilla PINN, the proposed method requires only a small number of residual\npoints to achieve a strong generalization capability. Moreover, it\nsubstantially enhances accuracy, while also ensuring a robust training process.\nFurthermore, OL-PINN inherits the advantage of PINN for solving inverse\nproblems. To this end, we apply the OL-PINN approach for solving problems with\nonly partial boundary conditions, which usually cannot be solved by the\nclassical numerical methods, showing its capacity in solving ill-posed problems\nand consequently more complex inverse problems.\n', '$PINN - a Domain Decomposition Method for Bayesian Physics-Informed\n Neural Networks Physics-Informed Neural Networks (PINNs) are a novel computational approach\nfor solving partial differential equations (PDEs) with noisy and sparse initial\nand boundary data. Although, efficient quantification of epistemic and\naleatoric uncertainties in big multi-scale problems remains challenging. We\npropose \\$PINN a novel method of computing global uncertainty in PDEs using a\nBayesian framework, by combining local Bayesian Physics-Informed Neural\nNetworks (BPINN) with domain decomposition. The solution continuity across\nsubdomains is obtained by imposing the flux continuity across the interface of\nneighboring subdomains. To demonstrate the effectiveness of \\$PINN, we conduct\na series of computational experiments on PDEs in 1D and 2D spatial domains.\nAlthough we have adopted conservative PINNs (cPINNs), the method can be\nseamlessly extended to other domain decomposition techniques. The results infer\nthat the proposed method recovers the global uncertainty by computing the local\nuncertainty exactly more efficiently as the uncertainty in each subdomain can\nbe computed concurrently. The robustness of \\$PINN is verified by adding\nuncorrelated random noise to the training data up to 15% and testing for\ndifferent domain sizes.\n']","[('physics informed neural', 0.5689100623130798), ('neural networks solving', 0.5453101992607117), ('neural networks pinns', 0.5199720859527588), ('neural network pinn', 0.507737398147583), ('informed neural networks', 0.46342530846595764), ('neural operators', 0.43872472643852234), ('operator networks', 0.43652039766311646), ('neural networks', 0.4260292053222656), ('informed neural network', 0.4212857186794281), ('deep learning', 0.4172765016555786)]" 12,12,864,12_eigenvalue adjacency_eigenvalue adjacency matrix_eigenvalue graph_maximum spectral radius,"['eigenvalue adjacency', 'eigenvalue adjacency matrix', 'eigenvalue graph', 'maximum spectral radius', 'maximum spectral', 'spectral graph', 'spectral radius among', 'alpha spectral', 'spectral radius', 'laplacian spectral radius']","[""On the eigenvalues and energy of the $A_\\alpha$-matrix of graphs For a graph $G$, the generalized adjacency matrix $A_\\alpha(G)$ is the convex\ncombination of the diagonal matrix $D(G)$ and the adjacency matrix $A(G)$ and\nis defined as $A_\\alpha(G)=\\alpha D(G)+(1-\\alpha) A(G)$ for $0\\leq \\alpha \\leq\n1$. This matrix has been found to be useful in merging the spectral theories of\n$A(G)$ and the signless Laplacian matrix $Q(G)$ of the graph $G$. The\ngeneralized adjacency energy or $A_\\alpha$-energy is the mean deviation of the\n$A_\\alpha$-eigenvalues of $G$ and is defined as\n$E(A_\\alpha(G))=\\sum_{i=1}^{n}|p_i-\\frac{2\\alpha m}{n}|$, where $p_i$'s are\n$A_\\alpha$-eigenvalues of $G$. In this paper, we investigate the\n$A_\\alpha$-eigenvalues of a strongly regular graph $G$. We observe that\n$A_\\alpha$-spectral radius $p_1$ satisfies $\\delta(G)\\leq p_1 \\leq \\Delta(G)$,\nwhere $\\delta(G)$ and $\\Delta(G)$ are, respectively, the smallest and the\nlargest degrees of $G$. Further, we show that the complete graph is the only\ngraph to have exactly two distinct $A_\\alpha$-eigenvalues. We obtain lower and\nupper bounds of $A_\\alpha$-energy in terms of order, size and extremal degrees\nof $G$. We also discuss the extremal cases of these bounds.\n"", 'On the sum of the largest $A_{\\alpha}$-eigenvalues of graphs For every real $0\\leq \\alpha \\leq 1$, Nikiforov defined the\n$A_{\\alpha}$-matrix of a graph $G$ as $A_{\\alpha}(G)=\\alpha\nD(G)+(1-\\alpha)A(G)$, where $A(G)$ and $D(G)$ are the adjacency matrix and the\ndegree diagonal matrix of a graph $G$, respectively. The eigenvalues of\n$A_{\\alpha}(G)$ are called the $A_{\\alpha}$-eigenvalues of $G$. Let\n$S_k(A_{\\alpha}(G))$ be the sum of $k$ largest $A_{\\alpha}$-eigenvalues of $G$.\nIn this paper, we present several upper and lower bounds on\n$S_k(A_{\\alpha}(G))$ and characterize the extremal graphs for certain cases,\nwhich can be regard as a common generalization of the sum of $k$ largest\neigenvalues of adjacency matrix and signless Laplacian matrix of graphs. In\naddition, some graph operations on $S_k(A_{\\alpha}(G))$ are presented.\n', 'The $A_\\alpha$ spectral radius with given independence number $n-4$ Let $G$ be a graph with adjacency matrix $A(G)$ and degree diagonal matrix $D\n(G)$. In 2017, Nikiforov [Appl. Anal. Discrete Math., 11 (2017) 81--107]\ndefined the matrix $A_\\alpha(G) = \\alpha D(G) + (1-\\alpha)A(G)$ for any real\n$\\alpha\\in[0,1]$. The largest eigenvalue of $A(G)$ is called the spectral\nradius of $G$, while the largest eigenvalue of $A_\\alpha(G)$ is called the\n$A_\\alpha$ spectral radius of $G$. Let $\\mathcal{G}_{n,i}$ be the set of graphs\nof order $n$ with independence number $i$. Recently, for all graphs in\n$\\mathcal{G}_{n,i}$ having the minimum or the maximum $A$, $Q$ and $A_\\alpha$\nspectral radius where\n$i\\in\\{1,2,\\lfloor\\frac{n}{2}\\rfloor\\,\\lceil\\frac{n}{2}\\rceil+1,n-3,n-2,n-1\\}$,\nthere are some results have been given by Xu, Li and Sun et al., respectively.\nIn 2021, Luo and Guo [Discrete Math., 345 (2022) 112778] determined all graphs\nin $\\mathcal{G}_{n,n-4}$ having the minimum spectral radius. In this paper, we\ncharacterize the graphs in $\\mathcal{G}_{n,n-4}$ having the minimum and the\nmaximum $A_\\alpha$ spectral radius for $\\alpha\\in[\\frac{1}{2},1)$,\nrespectively.\n']","[('eigenvalue adjacency', 0.5817904472351074), ('eigenvalue adjacency matrix', 0.5783923864364624), ('eigenvalue graph', 0.5597145557403564), ('maximum spectral radius', 0.553380012512207), ('maximum spectral', 0.5523805618286133), ('spectral graph', 0.5423811078071594), ('spectral radius among', 0.5341256856918335), ('alpha spectral', 0.5182501673698425), ('spectral radius', 0.5051199197769165), ('laplacian spectral radius', 0.49834445118904114)]" 13,13,844,13_iterative regularization_total variation regularization_variation regularization_regularization methods,"['iterative regularization', 'total variation regularization', 'variation regularization', 'regularization methods', 'variational regularization', 'image reconstruction', 'image restoration', 'regularization', 'regularization parameters', 'reconstruction methods']","['Feature reconstruction from incomplete tomographic data without detour In this paper, we consider the problem of feature reconstruction from\nincomplete x-ray CT data. Such problems occurs, e.g., as a result of dose\nreduction in the context medical imaging. Since image reconstruction from\nincomplete data is a severely ill-posed problem, the reconstructed images may\nsuffer from characteristic artefacts or missing features, and significantly\ncomplicate subsequent image processing tasks (e.g., edge detection or\nsegmentation). In this paper, we introduce a novel framework for the robust\nreconstruction of convolutional image features directly from CT data, without\nthe need of computing a reconstruction firs. Within our framework we use\nnon-linear (variational) regularization methods that can be adapted to a\nvariety of feature reconstruction tasks and to several limited data situations\n. In our numerical experiments, we consider several instances of edge\nreconstructions from angularly undersampled data and show that our approach is\nable to reliably reconstruct feature maps in this case.\n', 'Convergent regularization in inverse problems and linear plug-and-play\n denoisers Plug-and-play (PnP) denoising is a popular iterative framework for solving\nimaging inverse problems using off-the-shelf image denoisers. Their empirical\nsuccess has motivated a line of research that seeks to understand the\nconvergence of PnP iterates under various assumptions on the denoiser. While a\nsignificant amount of research has gone into establishing the convergence of\nthe PnP iteration for different regularity conditions on the denoisers, not\nmuch is known about the asymptotic properties of the converged solution as the\nnoise level in the measurement tends to zero, i.e., whether PnP methods are\nprovably convergent regularization schemes under reasonable assumptions on the\ndenoiser. This paper serves two purposes: first, we provide an overview of the\nclassical regularization theory in inverse problems and survey a few notable\nrecent data-driven methods that are provably convergent regularization schemes.\nWe then continue to discuss PnP algorithms and their established convergence\nguarantees. Subsequently, we consider PnP algorithms with linear denoisers and\npropose a novel spectral filtering technique to control the strength of\nregularization arising from the denoiser. Further, by relating the implicit\nregularization of the denoiser to an explicit regularization functional, we\nrigorously show that PnP with linear denoisers leads to a convergent\nregularization scheme. More specifically, we prove that in the limit as the\nnoise vanishes, the PnP reconstruction converges to the minimizer of a\nregularization potential subject to the solution satisfying the noiseless\noperator equation. The theoretical analysis is corroborated by numerical\nexperiments for the classical inverse problem of tomographic image\nreconstruction.\n', 'Plug-and-Play image reconstruction is a convergent regularization method Non-uniqueness and instability are characteristic features of image\nreconstruction processes. As a result, it is necessary to develop\nregularization methods that can be used to compute reliable approximate\nsolutions. A regularization method provides of a family of stable\nreconstructions that converge to an exact solution of the noise-free problem as\nthe noise level tends to zero. The standard regularization technique is defined\nby variational image reconstruction, which minimizes a data discrepancy\naugmented by a regularizer. The actual numerical implementation makes use of\niterative methods, often involving proximal mappings of the regularizer. In\nrecent years, Plug-and-Play image reconstruction (PnP) has been developed as a\nnew powerful generalization of variational methods based on replacing proximal\nmappings by more general image denoisers. While PnP iterations yield excellent\nresults, neither stability nor convergence in the sense of regularization has\nbeen studied so far. In this work, we extend the idea of PnP by considering\nfamilies of PnP iterations, each being accompanied by its own denoiser. As our\nmain theoretical result, we show that such PnP reconstructions lead to stable\nand convergent regularization methods. This shows for the first time that PnP\nis mathematically equally justified for robust image reconstruction as\nvariational methods\n']","[('iterative regularization', 0.6654669642448425), ('total variation regularization', 0.6452040672302246), ('variation regularization', 0.6424564123153687), ('regularization methods', 0.6273462176322937), ('variational regularization', 0.6228638887405396), ('image reconstruction', 0.6172869801521301), ('image restoration', 0.6093907952308655), ('regularization', 0.5960000157356262), ('regularization parameters', 0.577573835849762), ('reconstruction methods', 0.5735197067260742)]" 14,14,813,14_hermitian random matrices_random matrix theory_hermitian random_random matrix ensembles,"['hermitian random matrices', 'random matrix theory', 'hermitian random', 'random matrix ensembles', 'unitary ensemble', 'random matrices', 'spectral statistics', 'spectral distribution', 'gaussian unitary', 'empirical spectral distribution']","[""Towards the bulk universality of non-Hermitian random matrices We consider the non-Hermitian analogue of the celebrated Wigner-Dyson-Mehta\nbulk universality phenomenon, i.e. that in the bulk the local eigenvalue\nstatistics of a large random matrix with independent, identically distributed\ncentred entries are universal, in particular they asymptotically coincide with\nthose of the Ginibre ensemble in the corresponding symmetry class. In this\npaper we reduce this problem to understanding a certain microscopic regime for\nthe Hermitized resolvent in Girko's formula by showing that all other regimes\nare negligible.\n"", 'Edge Universality for non-Hermitian Random Matrices We consider large non-Hermitian real or complex random matrices $X$ with\nindependent, identically distributed centred entries. We prove that their local\neigenvalue statistics near the spectral edge, the unit circle, coincide with\nthose of the Ginibre ensemble, i.e. when the matrix elements of $X$ are\nGaussian. This result is the non-Hermitian counterpart of the universality of\nthe Tracy-Widom distribution at the spectral edges of the Wigner ensemble.\n', 'Universal eigenvector correlations in quaternionic Ginibre ensembles Non-Hermitian random matrices enjoy non-trivial correlations in the\nstatistics of their eigenvectors. We study the overlap among left and right\neigenvectors in Ginibre ensembles with quaternion valued Gaussian matrix\nelements. This concept was introduced by Chalker and Mehlig in the complex\nGinibre ensemble. Using a Schur decomposition, for harmonic potentials we can\nexpress the overlap in terms of complex eigenvalues only, coming in conjugate\npairs in this symmetry class. Its expectation value leads to a Pfaffian\ndeterminant, for which we explicitly compute the matrix elements for the\ninduced Ginibre ensemble with $2\\alpha$ zero eigenvalues, for finite matrix\nsize $N$. In the macroscopic large-$N$ limit in the bulk of the spectrum we\nrecover the limiting expressions of the complex Ginibre ensemble for the\ndiagonal and off-diagonal overlap, which are thus universal.\n']","[('hermitian random matrices', 0.6939499378204346), ('random matrix theory', 0.62031489610672), ('hermitian random', 0.5967514514923096), ('random matrix ensembles', 0.5674776434898376), ('unitary ensemble', 0.549867570400238), ('random matrices', 0.5347515940666199), ('spectral statistics', 0.530767023563385), ('spectral distribution', 0.5011853575706482), ('gaussian unitary', 0.4785281717777252), ('empirical spectral distribution', 0.4635581970214844)]" 15,15,778,15_minimal surface_minimal surfaces_minimal hypersurfaces_minimal hypersurface,"['minimal surface', 'minimal surfaces', 'minimal hypersurfaces', 'minimal hypersurface', 'curvature hypersurfaces', 'curvature surfaces', 'mean curvature hypersurfaces', 'boundary minimal', 'surfaces euclidean space', 'surfaces euclidean']","[""Contributions to the theory of free boundary minimal surfaces In this thesis, we present various contributions to the study of free\nboundary minimal surfaces. After introducing some basic tools and discussing\nsome delicate aspects related to the definition of Morse index when allowing\nfor a contact set, we divide the thesis in two parts. In the first part of this\ndissertation, we study free boundary minimal surfaces with bounded Morse index\nin a three-dimensional ambient manifold. More specifically, we present a\ndegeneration analysis of a sequence of such surfaces, proving that (up to\nsubsequence) they converge smoothly away from finitely many points and that,\naround such `bad' points, we can at least `uniformly' control the topology and\nthe area of the surfaces in question. As a corollary, we obtain a complete\npicture of the way different `complexity criteria' (in particular: topology,\narea and Morse index) compare for free boundary minimal surfaces in ambient\nmanifolds with positive scalar curvature and mean convex boundary. In the\nsecond part, we focus on an equivariant min-max scheme to prove the existence\nof free boundary minimal surfaces with a prescribed topological type. The\nprinciple is to choose a suitable group of isometries of the ambient manifold\nin order to obtain exactly the topology we are looking for. We recall a proof\nof the equivariant min-max theorem, and we also prove a bound on the Morse\nindex of the resulting surfaces. Finally, we apply this procedure to show the\nexistence of a new family of free boundary minimal surfaces with connected\nboundary and arbitrary genus in the three-dimensional unit ball.\n"", 'On free boundary minimal hypersurfaces in the Riemannian Schwarzschild\n space In contrast with the 3-dimensional case (cf. \\cite{RaMo}), where rotationally\nsymmetric totally geodesic free boundary minimal surfaces have Morse index one;\nwe prove in this work that the Morse index of a free boundary rotationally\nsymmetric totally geodesic hypersurface of the $n$-dimensional Riemannnian\nSchwarzschild space with respect to variations that are tangential along the\nhorizon is zero, for $n\\geq4$.\n Moreover, we show that there exist non-compact free boundary minimal\nhypersurfaces which are not totally geodesic, $n\\geq 8$, with Morse index equal\nto $0$. Also, it is shown that, for $n\\geq4$, there exist infinitely many\nnon-compact free boundary minimal hypersurfaces, which are not congruent to\neach other, with infinite Morse index.\n We also study the density at infinity of a free boundary minimal hypersurface\nwith respect to a minimal cone constructed over a minimal hypersurface of the\nunit Euclidean sphere. We obtain a lower bound for the density in terms of the\narea of the boundary of the hypersurface and the area of the minimal\nhypersurface in the unit sphere. This lower bound is optimal in the sense that\nonly minimal cones achieve it.\n', 'Geodesic boundary of constant mean curvature surfaces in\n $\\mathbb{H}^2\\times \\mathbb{R}$ Some results about the geodesic boundary of minimal surfaces in\n$\\mathbb{H}^2\\times \\mathbb{R}$ are generalized for surfaces of constant mean\ncurvature surfaces $H$, with $0\\le H\\le 1/2$.\n']","[('minimal surface', 0.6928406357765198), ('minimal surfaces', 0.6897007822990417), ('minimal hypersurfaces', 0.6710419058799744), ('minimal hypersurface', 0.6568589806556702), ('curvature hypersurfaces', 0.6564315557479858), ('curvature surfaces', 0.6536926031112671), ('mean curvature hypersurfaces', 0.6350403428077698), ('boundary minimal', 0.6231570243835449), ('surfaces euclidean space', 0.5849295258522034), ('surfaces euclidean', 0.5756801962852478)]" 16,16,760,16_electricity market_electricity markets_energy storage_renewable energy,"['electricity market', 'electricity markets', 'energy storage', 'renewable energy', 'optimal power flow', 'distributed energy resources', 'ac optimal power', 'bidding', 'microgrids', 'economic dispatch']","['Strategic Bidding in Electricity Markets with Convexified AC\n Market-Clearing Process This paper presents a framework to solve the strategic bidding problem of\nparticipants in an electricity market cleared by employing the full AC Optimal\nPower Flow (ACOPF) problem formulation. Traditionally, the independent system\noperators (ISOs) leveraged DC Optimal Power Flow (DCOPF) problem formulation to\nsettle the electricity market. The main quest of this work is to find what\nwould be the challenges and opportunities if ISOs leverage the full ACOPF as\nthe market-clearing Problem (MCP)? This paper presents tractable mathematical\nprogramming with equilibrium constraints for the convexified AC market-clearing\nproblem. Market participants maximize their profit via strategic bidding while\nconsidering the reactive power dispatch of generation units. The equilibrium\nconstraints are procured by presenting the dual form of the relaxed ACOPF\nproblem. The strategic bidding problem with ACOPF-based MCP improves the\nexactness of the location marginal prices (LMPs) and profit of market\nparticipants compared to the one with DCOPF. It is shown that the strategic\nbidding problem with DCOFP-based MCP is unable to model the limitations of\nreactive power support. The presented results display cases where the proposed\nstrategic bidding method renders $52.3\\%$ more profit for the Generation\nCompany (GENCO) than the DCOPF-based MCP model. The proposed strategic bidding\nframework also addresses the challenges in coupling real and reactive power\ndispatch of generation constraints, ramping constraints, demand response\nimplications with curtailable and time shiftable loads, and AC line flow\nconstraints. Therefore, the presented method will help market participants\nleverage the more accurate ACOPF model in the strategic bidding problem.\n', 'Electricity Market Bidding for Renewable Electrolyzer Plants: An\n Opportunity Cost Approach Hydrogen produced through electrolysis with renewable power is considered key\nto decarbonize several hard-to-electrify sectors. This work proposes a novel\napproach to model the active electricity market participation of co-located\nrenewable energy and electrolyzer plants, based on opportunity-cost bidding.\nWhile a renewable energy plant typically has zero marginal cost, selling power\nto the grid carries a potential opportunity-cost of not producing hydrogen when\nit is co-located with a hydrogen electrolyzer. We first consider only the\nelectrolyzer, and derive its revenue of consuming electricity based on the\nnon-convex hydrogen production curve. We then consider the available renewable\nenergy production and form a piece-wise linear cost curve representing the\nopportunity cost of selling (or revenue from consuming) various levels of\nelectricity. This cost curve can be used to model a stand-alone electrolyzer or\na co-located hydrogen and renewable energy plant participating in an\nelectricity market. Our case study analyzes the effects of market-bidding\nelectrolyzers on electricity markets and grid operations. We compare two\nstrategies for a co-located electrolyzer-wind plant; one based on the proposed\nbid curve and one with a more conventional fixed electrolyzer consumption. The\nresults show that electrolyzers that actively participate in the electricity\nmarket lower the average cost of electricity and the amount of curtailed\nrenewable energy in the system compared with a fixed consumption case. However,\nthe difference in total system emissions between the two strategies is\ninsignificant. The specific impacts vary based on electrolyzer capacity and\nhydrogen price, which determines the location of the co-located plant in the\nelectricity market merit order.\n', 'Towards Low-carbon Power Networks: Optimal Integration of Renewable\n Energy Sources and Hydrogen Storage This paper proposes a new optimization model and solution method for\ndetermining optimal locations and sizing of renewable energy sources and\nhydrogen storage in a power network. We obtain these strategic decisions based\non the multi-period alternating current optimal power (AC OPF) flow problem\nthat considers the uncertainty of renewable output, electricity demand, and\nelectricity prices. We develop a second-order cone programming approach within\na Benders decomposition framework to provide globally optimal solutions. To the\nbest of our knowledge, our paper is the first to propose a systematic\noptimization framework based on AC OPF that jointly analyzes power network,\nrenewable, and hydrogen storage interactions in order to provide optimal\nlocations and sizing decisions of renewables and hydrogen storage. In a test\ncase, we show that the joint integration of renewable sources and hydrogen\nstorage and consideration of the AC OPF model significantly reduces the\noperational cost of the power network. In turn, our findings can provide\nquantitative insights to decision-makers on how to integrate renewable sources\nand hydrogen storage under different settings of the hydrogen selling price,\nrenewable curtailment costs, emission tax prices, and conversion efficiency.\n']","[('electricity market', 0.6624227166175842), ('electricity markets', 0.6622233390808105), ('energy storage', 0.511863648891449), ('renewable energy', 0.487198144197464), ('optimal power flow', 0.48545706272125244), ('distributed energy resources', 0.466025173664093), ('ac optimal power', 0.43247517943382263), ('bidding', 0.4297572672367096), ('microgrids', 0.427568644285202), ('economic dispatch', 0.4235292077064514)]" 17,17,756,17_prime gaps_number primes_prime conjecture_goldbach conjecture,"['prime gaps', 'number primes', 'prime conjecture', 'goldbach conjecture', 'primes arithmetic progressions', 'prime numbers', 'number prime', 'primes', 'prime counting', 'almost primes']","['The ternary Goldbach problem with a prime with a missing digit and\n primes of special types Let $$\\gamma^*:=\\frac{8}{9}+\\frac{2}{3}\\:\\frac{\\log(10/9)}{\\log 10}\\:(\\approx\n0.919\\ldots)\\:,\\ \\gamma^*<\\frac{1}{c_0}\\leq 1\\:.$$\n Let $\\gamma^*<\\gamma_0\\leq 1$, $c_0=1/\\gamma_0$ be fixed. Let also\n$a_0\\in\\{0,1,\\ldots, 9\\}$. In [23] we proved on assumption of the Generalized\nRiemann Hypothesis (GRH), that each sufficiently large odd integer $N_0$ can be\nrepresented in the form $$N_0=p_1+p_2+p_3\\:,$$ where for $i=2, 3$ the primes\n$p_i$ are Piatetski-Shapiro primes - primes of the form $p_i=[n_i^{c_0}]$,\n$n_i\\in\\mathbb{N}$ - whereas the decimal expansion of $p_1$ does not contain\nthe digit $a_0$. In this paper we replace one of the Piatetski-Shapiro primes\n$p_2$ and $p_3$ by primes of the type $$p=x^2+y^2+1\\:.$$\n', 'The importance of finding the upper bounds for prime gaps in order to\n solve the twin primes conjecture and the Goldbach conjecture ABSTRACT. In this article we present a point of view that highlights the\nimportance of finding the upper bounds for prime gaps, in order to solve the\ntwin primes conjecture and the Goldbach conjecture. For this purpose, we\npresent a procedure for the determination of the upper bounds for prime gaps\ndifferent from the most famous and known approaches. The proposed method\nanalyzes the distribution of prime numbers using the set of relative numbers.\nUsing negative numbers too, it becomes intuitive to understand that that the\narrangement of 2P+1 consecutive numbers that goes -P to P, is the only\narrangement that minimizes the distance between two powers having the same\nabsolute value of the base D, with |D|<=P. This arrangement is considered\nimportant because by increasing the number of powers of the prime numbers\nwithin a range of consecutive numbers, it is presumed to decrease the overlap\nbetween the prime numbers considered. Consequently, by reducing these overlaps,\nwe suppose to obtain an arrangement, in which the prime numbers less than and\nequal to P and their multiples occupy the greatest possible number of positions\nwithin a range of 2P+1 consecutive numbers. If this result could be\ndemonstrated, would imply not only the resolution of the Legendre conjecture,\nbut also a step forward in the resolution of the twin primes conjecture and the\nGoldbach conjecture.\n', 'The prime number theorem for primes in arithmetic progressions at large\n values Assuming the Riemann hypothesis, we prove the latest explicit version of the\nprime number theorem for short intervals. Using this result, and assuming the\ngeneralised Riemann hypothesis for Dirichlet $L$-functions is true, we then\nestablish explicit formulae for $\\psi(x,\\chi)$, $\\theta(x,\\chi)$, and an\nexplicit version of the prime number theorem for primes in arithmetic\nprogressions that hold for general moduli $q\\geq 3$. Finally, we restrict our\nattention to $q\\leq 10\\,000$ and use an exact computation to refine these\nresults.\n']","[('prime gaps', 0.6675330996513367), ('number primes', 0.6480919122695923), ('prime conjecture', 0.6419015526771545), ('goldbach conjecture', 0.6226076483726501), ('primes arithmetic progressions', 0.6190563440322876), ('prime numbers', 0.605564534664154), ('number prime', 0.5766497254371643), ('primes', 0.5702134966850281), ('prime counting', 0.5620697140693665), ('almost primes', 0.5605617165565491)]" 18,18,754,18_epidemic models_epidemic dynamics_covid 19 pandemic_covid 19,"['epidemic models', 'epidemic dynamics', 'covid 19 pandemic', 'covid 19', 'spread covid 19', 'disease dynamics', 'spread covid', 'covid', '19 pandemic', 'epidemic']","['A novel analysis approach of uniform persistence for a COVID-19 model\n with quarantine and standard incidence rate A coronavirus disease 2019 (COVID-19) model with quarantine and standard\nincidence rate is first developed, then a novel analysis approach for finding\nthe ultimate lower bound of COVID-19 infectious individuals is proposed, which\nmeans that the COVID-19 pandemic is uniformly persistent if the control\nreproduction number $\\mathcal{R}_{c}>1$. This approach can be applied to other\nrelated biomathematical models, and some existing works can be improved by\nusing it. In addition, the COVID-19-free equilibrium $V^0$ is locally\nasymptotically stable (LAS) if $\\mathcal{R}_{c}<1$ and linearly stable if\n$\\mathcal{R}_{c}=1$, respectively; while $V^0$ is unstable if\n$\\mathcal{R}_{c}>1$.\n', 'Analysis of COVID-19 Infection Dynamics: Extended SIR Model Approach This paper presents a detailed mathematical investigation into the dynamics of COVID-19 infections through extended Susceptible-Infected-Recovered (SIR) and Susceptible-Exposed-Infected-Recovered (SEIR) epidemiological models. By incorporating demographic factors such as birth and death rates, we enhance the classical Kermack-McKendrick framework to realistically represent long-term disease progression. Using empirical data from four COVID-19 epidemic waves in Orange County, California, between January 2020 and March 2022, we estimate key parameters and perform stability and bifurcation analyses. Our results consistently indicate endemic states characterized by stable spiral equilibria due to reproduction numbers (R0) exceeding unity across all waves. Additionally, the inclusion of vaccination demonstrates the potential to reduce the effective reproduction number below one, shifting the system towards a stable disease-free equilibrium. Our analysis underscores the critical role of latency periods in shaping epidemic dynamics and highlights actionable insights for public health interventions aimed at COVID-19 control and eventual eradication.', 'Dynamics of COVID-19 models with asymptomatic infections and quarantine\n measures Considering the propagation characteristics of COVID-19 in different regions,\nthe dynamics analysis and numerical demonstration of long-term and short-term\nmodels of COVID-19 are carried out, respectively. The long-term model is\ndevoted to investigate the global stability of COVID-19 model with asymptomatic\ninfections and quarantine measures. By using the limit system of the model and\nLyapunov function method, it is shown that the COVID-19-free equilibrium $V^0$\nis globally asymptotically stable if the control reproduction number\n$\\mathcal{R}_{c}<1$ and globally attractive if $\\mathcal{R}_{c}=1$, which means\nthat COVID-19 will die out; the COVID-19 equilibrium $V^{\\ast}$ is globally\nasymptotically stable if $\\mathcal{R}_{c}>1$, which means that COVID-19 will be\npersistent. In particular, to obtain the local stability of $V^{\\ast}$, we use\nproof by contradiction and the properties of complex modulus with some novel\ndetails, and we prove the weak persistence of the system to obtain the global\nattractivity of $V^{\\ast}$. Moreover, the final size of the corresponding\nshort-term model is calculated and the stability of its multiple equilibria is\nanalyzed. Numerical simulations of COVID-19 cases show that quarantine measures\nand asymptomatic infections have a non-negligible impact on the transmission of\nCOVID-19.\n']","[('epidemic models', 0.6135826110839844), ('epidemic dynamics', 0.5887249112129211), ('covid 19 pandemic', 0.5673967599868774), ('covid 19', 0.5290824174880981), ('spread covid 19', 0.5087593793869019), ('disease dynamics', 0.46155285835266113), ('spread covid', 0.4544823169708252), ('covid', 0.45442166924476624), ('19 pandemic', 0.4410402774810791), ('epidemic', 0.43481525778770447)]" 19,19,716,19_differential privacy_differentially private_privacy utility_privacy constraints,"['differential privacy', 'differentially private', 'privacy utility', 'privacy constraints', 'privacy preserving', 'privacy leakage', 'privacy', 'privacy guarantees', 'privacy preservation', 'information privacy']","[""A Statistical Viewpoint on Differential Privacy: Hypothesis Testing,\n Representation and Blackwell's Theorem Differential privacy is widely considered the formal privacy for\nprivacy-preserving data analysis due to its robust and rigorous guarantees,\nwith increasingly broad adoption in public services, academia, and industry.\nDespite originating in the cryptographic context, in this review paper we argue\nthat, fundamentally, differential privacy can be considered a \\textit{pure}\nstatistical concept. By leveraging David Blackwell's informativeness theorem,\nour focus is to demonstrate based on prior work that all definitions of\ndifferential privacy can be formally motivated from a hypothesis testing\nperspective, thereby showing that hypothesis testing is not merely convenient\nbut also the right language for reasoning about differential privacy. This\ninsight leads to the definition of $f$-differential privacy, which extends\nother differential privacy definitions through a representation theorem. We\nreview techniques that render $f$-differential privacy a unified framework for\nanalyzing privacy bounds in data analysis and machine learning. Applications of\nthis differential privacy definition to private deep learning, private convex\noptimization, shuffled mechanisms, and U.S.\\ Census data are discussed to\nhighlight the benefits of analyzing privacy bounds under this framework\ncompared to existing alternatives.\n"", ""Randomized Privacy Budget Differential Privacy While pursuing better utility by discovering knowledge from the data,\nindividual's privacy may be compromised during an analysis. To that end,\ndifferential privacy has been widely recognized as the state-of-the-art privacy\nnotion. By requiring the presence of any individual's data in the input to only\nmarginally affect the distribution over the output, differential privacy\nprovides strong protection against adversaries in possession of arbitrary\nbackground. However, the privacy constraints (e.g., the degree of\nrandomization) imposed by differential privacy may render the released data\nless useful for analysis, the fundamental trade-off between privacy and utility\n(i.e., analysis accuracy) has attracted significant attention in various\nsettings. In this report we present DP mechanisms with randomized parameters,\ni.e., randomized privacy budget, and formally analyze its privacy and utility\nand demonstrate that randomizing privacy budget in DP mechanisms will boost the\naccuracy in a humongous scale.\n"", 'Privacy-Utility Trade-Off In this paper, we investigate the privacy-utility trade-off (PUT) problem,\nwhich considers the minimal privacy loss at a fixed expense of utility. Several\ndifferent kinds of privacy in the PUT problem are studied, including\ndifferential privacy, approximate differential privacy, maximal information,\nmaximal leakage, Renyi differential privacy, Sibson mutual information and\nmutual information. The average Hamming distance is used to measure the\ndistortion caused by the privacy mechanism. We consider two scenarios: global\nprivacy and local privacy. In the framework of global privacy framework, the\nprivacy-distortion function is upper-bounded by the privacy loss of a special\nmechanism, and lower-bounded by the optimal privacy loss with any possible\nprior input distribution. In the framework of local privacy, we generalize a\ncoloring method for the PUT problem.\n']","[('differential privacy', 0.8331697583198547), ('differentially private', 0.7061411142349243), ('privacy utility', 0.6955509185791016), ('privacy constraints', 0.6809157133102417), ('privacy preserving', 0.6730833053588867), ('privacy leakage', 0.6569550633430481), ('privacy', 0.6513382792472839), ('privacy guarantees', 0.6435558199882507), ('privacy preservation', 0.6347290277481079), ('information privacy', 0.6130636930465698)]" 20,20,682,20_sparse random graphs_enyi random graphs_inhomogeneous random graphs_random graphs,"['sparse random graphs', 'enyi random graphs', 'inhomogeneous random graphs', 'random graphs', 'graphs random', 'inhomogeneous random graph', 'enyi random graph', 'random graph', 'random geometric graph', 'binomial random graph']","[""Counting cliques in a random graph We show that the expected number of cliques in the Erd\\H{o}s-R\\'enyi random\ngraph $G(n,p)$ is $n^{\\frac1{-2\\log p}(\\log n-2\\log\\log n+O(1))}$.\n"", ""The friendship paradox for sparse random graphs Let $G_n$ be an undirected finite graph on $n\\in\\mathbb{N}$ vertices labelled\nby $[n] = \\{1,\\ldots,n\\}$. For $i \\in [n]$, let $\\Delta_{i,n}$ be the\nfriendship bias of vertex $i$, defined as the difference between the average\ndegree of the neighbours of vertex $i$ and the degree of vertex $i$ itself when\n$i$ is not isolated, and zero when $i$ is isolated. Let $\\mu_n$ denote the\nfriendship-bias empirical distribution, i.e., the measure that puts mass\n$\\frac{1}{n}$ at each $\\Delta_{i,n}$, $i \\in [n]$. The friendship paradox says\nthat $\\int_{\\mathbb{R}} x\\mu_n(\\mathrm{d}x) \\geq 0$, with equality if and only\nif in each connected component of $G_n$ all the degrees are the same.\n We show that if $(G_n)_{n\\in\\mathbb{N}}$ is a sequence of sparse random\ngraphs that converges to a rooted random tree in the sense of convergence\nlocally in probability, then $\\mu_n$ converges weakly to a limiting measure\n$\\mu$ that is expressible in terms of the law of the rooted random tree. We\nstudy $\\mu$ for four classes of sparse random graphs: the homogeneous\nErd\\H{o}s-R\\'enyi random graph, the inhomogeneous Erd\\H{o}s-R\\'enyi random\ngraph, the configuration model and the preferential attachment model. In\nparticular, we compute the first two moments of $\\mu$, identify the right tail\nof $\\mu$, and argue that $\\mu([0,\\infty))\\geq\\tfrac{1}{2}$, a property we refer\nto as friendship paradox significance.\n"", ""Scaling limits of random graph models at criticality: Universality and\n the basin of attraction of the Erd\\H{o}s-R\\'enyi random graph A wide array of random graph models have been postulated to understand\nproperties of observed networks. Typically these models have a parameter $t$\nand a critical time $t_c$ when a giant component emerges. It is conjectured\nthat for a large class of models, the nature of this emergence is similar to\nthat of the Erd\\H{o}s-R\\'enyi random graph, in the sense that (a) the sizes of\nthe maximal components in the critical regime scale like $n^{2/3}$, and (b) the\nstructure of the maximal components at criticality (rescaled by $n^{-1/3}$)\nconverges to random fractals. To date, (a) has been proven for a number of\nmodels using different techniques. This paper develops a general program for\nproving (b) that requires three ingredients: (i) in the critical scaling\nwindow, components merge approximately like the multiplicative coalescent, (ii)\nscaling exponents of susceptibility functions are the same as that of the\nErd\\H{o}s-R\\'enyi random graph, and (iii) macroscopic averaging of distances\nbetween vertices in the barely subcritical regime. We show that these apply to\ntwo fundamental random graph models: the configuration model and inhomogeneous\nrandom graphs with a finite ground space. For these models, we also obtain new\nresults for component sizes at criticality and structural properties in the\nbarely subcritical regime.\n""]","[('sparse random graphs', 0.6838136315345764), ('enyi random graphs', 0.6805925369262695), ('inhomogeneous random graphs', 0.6747233271598816), ('random graphs', 0.6644832491874695), ('graphs random', 0.6533709168434143), ('inhomogeneous random graph', 0.6371763944625854), ('enyi random graph', 0.6254574656486511), ('random graph', 0.5861456990242004), ('random geometric graph', 0.5233210921287537), ('binomial random graph', 0.5006449818611145)]" 21,21,644,21_intuitionistic logic_classical logic_modal logic_propositional logic,"['intuitionistic logic', 'classical logic', 'modal logic', 'propositional logic', 'logics', 'kripke semantics', 'linear logic', 'axiomatizations', 'logic', 'first order logic']","[""Wijesekera-style constructive modal logics We define a family of propositional constructive modal logics corresponding\neach to a different classical modal system. The logics are defined in the style\nof Wijesekera's constructive modal logic, and are both proof-theoretically and\nsemantically motivated. On the one hand, they correspond to the\nsingle-succedent restriction of standard sequent calculi for classical modal\nlogics. On the other hand, they are obtained by incorporating the\nhereditariness of intuitionistic Kripke models into the classical satisfaction\nclauses for modal formulas. We show that, for the considered classical logics,\nthe proof-theoretical and the semantical approach return the same constructive\nsystems.\n"", 'Undecidability and non-axiomatizability of modal many-valued logics In this work we study the decidability of a class of global modal logics\narising from Kripke frames evaluated over certain residuated lattices, known in\nthe literature as modal many-valued logics. We exhibit a large family of these\nmodal logics which are undecidable, in contrast with classical modal logic and\npropositional logics defined over the same classes of algebras. This family\nincludes the global modal logics arising from Kripke frames evaluated over the\nstandard Lukasiewicz and Product algebras. We later refine the previous result,\nand prove that global modal Lukasiewicz and Product logics are not even\nrecursively axiomatizable. We conclude by solving negatively the open question\nof whether each global modal logic coincides with its local modal logic closed\nunder the unrestricted necessitation rule.\n', 'Goldblat-Thomason Theorems for Fundamental (Modal) Logic Holliday recently introduced a non-classical logic called Fundamental Logic,\nwhich intends to capture exactly those properties of the connectives ""and"",\n""or"" and ""not"" that hold in virtue of their introduction and elimination rules\nin Fitch\'s natural deduction system for propositional logic. Holliday provides\nan intuitive relational semantics for fundamental logic which generalizes both\nGoldblatt\'s semantics for orthologic and Kripke semantics for intuitionistic\nlogic. In this paper, we further the analysis of this semantics by providing a\nGoldblatt-Thomason theorem for Fundamental Logic. We identify necessary and\nsufficient conditions on a class K of fundamental frames for it to be\naxiomatic, i.e., to be the class of frames satisfying some logic extending\nFundamental Logic. As a straightforward application of our main result, we also\nobtain a Goldblatt-Thomason theorem for Fundamental Modal Logic, which extends\nFundamental Logic with standard Box and Diamond operators.\n']","[('intuitionistic logic', 0.6555971503257751), ('classical logic', 0.6389921307563782), ('modal logic', 0.635036826133728), ('propositional logic', 0.5318912863731384), ('logics', 0.5301538705825806), ('kripke semantics', 0.5282455682754517), ('linear logic', 0.5247777104377747), ('axiomatizations', 0.4690765142440796), ('logic', 0.46435263752937317), ('first order logic', 0.4517408013343811)]" 22,22,628,22_distributed optimization_distributed optimization algorithms_distributed stochastic gradient_consensus optimization,"['distributed optimization', 'distributed optimization algorithms', 'distributed stochastic gradient', 'consensus optimization', 'distributed optimization problems', 'distributed gradient', 'optimization distributed', 'decentralized optimization', 'distributed algorithms', 'distributed stochastic']","['Decentralized Riemannian Gradient Descent on the Stiefel Manifold We consider a distributed non-convex optimization where a network of agents\naims at minimizing a global function over the Stiefel manifold. The global\nfunction is represented as a finite sum of smooth local functions, where each\nlocal function is associated with one agent and agents communicate with each\nother over an undirected connected graph. The problem is non-convex as local\nfunctions are possibly non-convex (but smooth) and the Steifel manifold is a\nnon-convex set. We present a decentralized Riemannian stochastic gradient\nmethod (DRSGD) with the convergence rate of $\\mathcal{O}(1/\\sqrt{K})$ to a\nstationary point. To have exact convergence with constant stepsize, we also\npropose a decentralized Riemannian gradient tracking algorithm (DRGTA) with the\nconvergence rate of $\\mathcal{O}(1/K)$ to a stationary point. We use multi-step\nconsensus to preserve the iteration in the local (consensus) region. DRGTA is\nthe first decentralized algorithm with exact convergence for distributed\noptimization on Stiefel manifold.\n', 'Distributed Stochastic Gradient Tracking Methods In this paper, we study the problem of distributed multi-agent optimization\nover a network, where each agent possesses a local cost function that is smooth\nand strongly convex. The global objective is to find a common solution that\nminimizes the average of all cost functions. Assuming agents only have access\nto unbiased estimates of the gradients of their local cost functions, we\nconsider a distributed stochastic gradient tracking method (DSGT) and a\ngossip-like stochastic gradient tracking method (GSGT). We show that, in\nexpectation, the iterates generated by each agent are attracted to a\nneighborhood of the optimal solution, where they accumulate exponentially fast\n(under a constant stepsize choice). Under DSGT, the limiting (expected) error\nbounds on the distance of the iterates from the optimal solution decrease with\nthe network size $n$, which is a comparable performance to a centralized\nstochastic gradient algorithm. Moreover, we show that when the network is\nwell-connected, GSGT incurs lower communication cost than DSGT while\nmaintaining a similar computational cost. Numerical example further\ndemonstrates the effectiveness of the proposed methods.\n', 'Compressed Gradient Tracking Methods for Decentralized Optimization with\n Linear Convergence Communication compression techniques are of growing interests for solving the\ndecentralized optimization problem under limited communication, where the\nglobal objective is to minimize the average of local cost functions over a\nmulti-agent network using only local computation and peer-to-peer\ncommunication. In this paper, we first propose a novel compressed gradient\ntracking algorithm (C-GT) that combines gradient tracking technique with\ncommunication compression. In particular, C-GT is compatible with a general\nclass of compression operators that unifies both unbiased and biased\ncompressors. We show that C-GT inherits the advantages of gradient\ntracking-based algorithms and achieves linear convergence rate for strongly\nconvex and smooth objective functions. In the second part of this paper, we\npropose an error feedback based compressed gradient tracking algorithm\n(EF-C-GT) to further improve the algorithm efficiency for biased compression\noperators. Numerical examples complement the theoretical findings and\ndemonstrate the efficiency and flexibility of the proposed algorithms.\n']","[('distributed optimization', 0.6905539035797119), ('distributed optimization algorithms', 0.6812353730201721), ('distributed stochastic gradient', 0.680627703666687), ('consensus optimization', 0.679185688495636), ('distributed optimization problems', 0.6634774208068848), ('distributed gradient', 0.6421706676483154), ('optimization distributed', 0.6395581364631653), ('decentralized optimization', 0.59379643201828), ('distributed algorithms', 0.5768039226531982), ('distributed stochastic', 0.5120251774787903)]" 23,23,615,23_knot floer homology_classical knots_knots links_space knots,"['knot floer homology', 'classical knots', 'knots links', 'space knots', 'alternating knots', 'ribbon knots', 'knots', 'knot diagrams', 'torus knots', 'bridge knots']","[""On unknotting fibered positive knots and braids The unknotting number $u$ and the genus $g$ of braid positive knots are\nequal, as shown by Rudolph. We prove the stronger statement that any positive\nbraid diagram of a genus $g$ knot contains $g$ crossings, such that changing\nthem produces a diagram of the trivial knot. Then, we turn to unknotting the\nmore general class of fibered positive knots, for which $u = g$ was conjectured\nby Stoimenow. We prove that the known ways to unknot braid positive knots do\nnot generalize to fibered positive knots. Namely, we prove that there are\nfibered positive knots that cannot be unknotted optimally along fibered\npositive knots; there are fibered positive knots that do not arise as trefoil\nplumbings; and there are positive diagrams of fibered positive knots of genus\n$g$ that do not contain $g$ crossings, such that changing them produces a\ndiagram of the trivial knot. In fact, we conjecture that one of our examples is\na counterexample to Stoimenow's conjecture.\n"", ""Knot cobordisms, bridge index, and torsion in Floer homology Given a connected cobordism between two knots in the 3-sphere, our main\nresult is an inequality involving torsion orders of the knot Floer homology of\nthe knots, and the number of local maxima and the genus of the cobordism. This\nhas several topological applications: The torsion order gives lower bounds on\nthe bridge index and the band-unlinking number of a knot, the fusion number of\na ribbon knot, and the number of minima appearing in a slice disk of a knot. It\nalso gives a lower bound on the number of bands appearing in a ribbon\nconcordance between two knots. Our bounds on the bridge index and fusion number\nare sharp for $T_{p,q}$ and $T_{p,q}\\# \\overline{T}_{p,q}$, respectively. We\nalso show that the bridge index of $T_{p,q}$ is minimal within its concordance\nclass.\n The torsion order bounds a refinement of the cobordism distance on knots,\nwhich is a metric. As a special case, we can bound the number of band moves\nrequired to get from one knot to the other. We show knot Floer homology also\ngives a lower bound on Sarkar's ribbon distance, and exhibit examples of ribbon\nknots with arbitrarily large ribbon distance from the unknot.\n"", 'The $CFK^\\infty$ Type of Almost L-space Knots Heegaard Floer homology and knot Floer homology are powerful invariants of\n3-manifolds and links respectively. L-space knots are knots which admit Dehn\nsurgeries to 3-manifolds with Heegaard Floer homology of minimal rank. In this\npaper we study almost L-space knots, which are knots admitting large Dehn\nsurgeries to 3-manifolds with Heegaard Floer homology of next-to-minimal rank.\nOur main result is a classification of the $CFK^\\infty$ type of almost L-space\nknots. As corollaries we show that almost L-space knots satisfy various\ntopological properties, including some given by Baldwin-Sivek. We also give\nsome new cable link detection results.\n']","[('knot floer homology', 0.75910484790802), ('classical knots', 0.6912286877632141), ('knots links', 0.6890235543251038), ('space knots', 0.6854243874549866), ('alternating knots', 0.672646164894104), ('ribbon knots', 0.6645262241363525), ('knots', 0.6641207337379456), ('knot diagrams', 0.647487223148346), ('torus knots', 0.6406930685043335), ('bridge knots', 0.6242289543151855)]" 24,24,603,24_weighted bergman spaces_bergman spaces_bergman space_weighted bergman,"['weighted bergman spaces', 'bergman spaces', 'bergman space', 'weighted bergman', 'toeplitz operators', 'operators hardy space', 'toeplitz operator', 'bergman', 'toeplitz algebra', 'hankel operators']","['Difference of weighted composition operators on weighted Bergman spaces\n over the unit Ball In this paper, we characterize the boundedness and compactness of differences\nof weighted composition operators from weighted Bergman spaces $A^p_\\omega$\ninduced by a doubling weight $\\omega$ to Lebesgue spaces $L^q_\\mu$ on the unit\nball for full $00$ depending only on the carpet. We also\nprovide examples of self-affine carpets of `Bara\\'nski type' where there is no\ndimension gap and in fact the Assouad dimension of the carpet is equal to the\nAssouad dimension of a carefully chosen self-affine measure.\n"", 'Assouad-type Dimensions of Overlapping Self-affine Sets We study the Assouad and quasi-Assoaud dimensions of dominated rectangular\nself-affine sets in the plane. In contrast to previous work on the dimension\ntheory of self-affine sets, we assume that the sets satisfy certain separation\nconditions on the projection to the principal axis, but otherwise have\narbitrary overlaps in the plane. We introduce and study regularity properties\nof a certain symbolic non-autonomous iterated function system corresponding to\n""symbolic slices"" of the self-affine set. We then establish dimensional\nformulas for the self-affine sets in terms of the dimension of the projection\nalong with the maximal dimension of slices orthogonal to the projection. Our\nresults are new even in the case when the self-affine set satisfies the strong\nseparation condition: in fact, as an application, we show that self-affine sets\nsatisfying the strong separation condition can have distinct Assouad and\nquasi-Assouad dimensions, answering a question of the first named author.\n', ""Tangents and slices of self-affine carpets We study the fine scaling properties of planar self-affine carpets. For\nGatzouras--Lalley carpets, we give a precise formula for maximal Hausdorff\ndimension of a tangent in terms of the Hausdorff dimension of the projection\nand the Assouad dimension of the corresponding vertical slice. Using regularity\nproperties for the Assouad dimension of non-autonomous self-similar sets, this\nimplies that the set of points with tangents that are as large as possible has\nfull Hausdorff measure, at the critical exponent. On the other hand, we give an\nexplicit example of a Bara\\'nski carpet for which the Hausdorff dimension of\nthe set of points for which there exists a maximal tangent has Hausdorff\ndimension strictly less than the Hausdorff dimension of the original carpet.\n""]","[('hausdorff dimension', 0.6743176579475403), ('self affine measures', 0.626956045627594), ('dimension self', 0.6207682490348816), ('fractal dimension', 0.607244610786438), ('dimension theory', 0.5570173263549805), ('fractal dimensions', 0.5543171763420105), ('dimensions self', 0.5542188286781311), ('assouad dimension', 0.5503014922142029), ('affine measures', 0.5351769924163818), ('fractal sets', 0.5139787197113037)]" 40,40,425,40_combinatorial games_combinatorial game_game theory_game played graph,"['combinatorial games', 'combinatorial game', 'game theory', 'game played graph', 'played graph', 'winning strategy', 'winning strategies', 'strategy game', 'two player game', 'can win']","['The Maker-Breaker percolation game on a random board The $(m,b)$ Maker-Breaker percolation game on $(\\mathbb{Z}^2)_p$, introduced\nby Day and Falgas-Ravry, is played in the following way. Before the game\nstarts, each edge of $\\mathbb{Z}^2$ is removed independently with probability\n$1-p$. After that, Maker chooses a vertex $v_0$ to protect. Then, in each round\nMaker and Breaker claim respectively $m$ and $b$ unclaimed edges of $G$.\nBreaker wins if after the removal of the edges claimed by him the component of\n$v_0$ becomes finite, and Maker wins if she can indefinitely prevent Breaker\nfrom winning.\n We show that for any $p < 1$, Breaker almost surely has a wining strategy for\nthe $(1,1)$ game on $(\\mathbb{Z}^2)_p$. This fully answers a question of Day\nand Falgas-Ravry, who showed that for $p = 1$ Maker has a winning strategy for\nthe $(1,1)$ game. Further, we show that in the $(2,1)$ game on\n$(\\mathbb{Z}^2)_p$ Maker almost surely has a winning strategy whenever $p >\n0.9402$, while Breaker almost surely has a winning strategy whenever $p <\n0.5278$. This shows that the threshold value of $p$ above which Maker has a\nwinning strategy for the $(2,1)$ game on $\\mathbb{Z}^2$ is non-trivial. In\nfact, we prove similar results in various settings, including other lattices\nand biases $(m,b)$.\n These results extend also to the most general case, which we introduce, where\neach edge is given to Maker with probability $\\alpha$ and to Breaker with\nprobability $\\beta$ before the game starts.\n', 'A Constructive Winning Maker Strategy in the Maker-Breaker $C_4$-Game Maker-Breaker subgraph games are among the most famous combinatorial games.\nFor given $n,q \\in \\mathbb{N}$ and a subgraph $C$ of the complete graph $K_n$,\nthe two players, called Maker and Breaker, alternately claim edges of $K_n$. In\neach round of the game Maker claims one edge and Breaker is allowed to claim up\nto $q$ edges. If Maker is able to claim all edges of a copy of $C$, he wins the\ngame. Otherwise Breaker wins. In this work we introduce the first constructive\nstrategy for Maker for the $C_4$-Maker-Breaker game and show that he can win\nthe game if $q < 0.16 n^{2/3}$. According to the theorem of Bednarska and\nLuczak (2000) $n^{2/3}$ is asymptotically optimal for this game, but the\nconstant given there for a random Maker strategy is magnitudes apart from our\nconstant 0.16.\n', 'Maker-Breaker Percolation Games I: Crossing Grids Motivated by problems in percolation theory, we study the following 2-player\npositional game. Let $\\Lambda_{m \\times n}$ be a rectangular grid-graph with\n$m$ vertices in each row and $n$ vertices in each column. Two players, Maker\nand Breaker, play in alternating turns. On each of her turns, Maker claims $p$\n(as-yet unclaimed) edges of the board $\\Lambda_{m \\times n}$, while on each of\nhis turns Breaker claims $q$ (as-yet unclaimed) edges of the board and destroys\nthem. Maker wins the game if she manages to claim all the edges of a crossing\npath joining the left-hand side of the board to its right-hand side, otherwise\nBreaker wins. We call this game the $(p,q)$-crossing game on $\\Lambda_{m \\times\nn}$.\n Given $m,n\\in \\mathbb{N}$, for which pairs $(p,q)$ does Maker have a winning\nstrategy for the $(p,q)$-crossing game on $\\Lambda_{m \\times n}$? The\n$(1,1)$-case corresponds exactly to the popular game of Bridg-it, which is well\nunderstood due to it being a special case of the older Shannon switching game.\nIn this paper, we study the general $(p,q)$-case. Our main result is to\nestablish the following transition:\n $\\bullet$ If $p\\geqslant 2q$, then Maker wins the game on arbitrarily long\nversions of the narrowest board possible, i.e. Maker has a winning strategy for\nthe $(2q, q)$-crossing game on $\\Lambda_{m \\times(q+1)}$ for any $m\\in\n\\mathbb{N}$;\n $\\bullet$ if $p\\leqslant 2q-1$, then for every width $n$ of the board,\nBreaker has a winning strategy for the $(p,q)$-crossing game on $\\Lambda_{m\n\\times n}$ for all sufficiently large board-lengths $m$.\n Our winning strategies in both cases adapt more generally to other grids and\ncrossing games. In addition we pose many new questions and problems.\n']","[('combinatorial games', 0.56508469581604), ('combinatorial game', 0.549239456653595), ('game theory', 0.503360390663147), ('game played graph', 0.4994741678237915), ('played graph', 0.4409196972846985), ('winning strategy', 0.42470064759254456), ('winning strategies', 0.42316678166389465), ('strategy game', 0.3965260088443756), ('two player game', 0.3707963228225708), ('can win', 0.3680345416069031)]" 41,41,415,41_black holes_black hole_de sitter spacetimes_einstein vacuum equations,"['black holes', 'black hole', 'de sitter spacetimes', 'einstein vacuum equations', 'schwarzschild black', 'sitter spacetimes', 'einstein scalar', 'positive cosmological', 'einstein vacuum', 'general relativity']","['Spectral (in)stability of quasinormal modes and strong cosmic censorship Recent studies have shown that quasinormal modes suffer from spectral\ninstabilities, a frailty of black holes that leads to disproportional migration\nof their spectra in the complex plane when black-hole effective potentials are\nmodified by minuscule perturbations. Similar results have been found with the\nmathematical notion of the pseudospectrum which was recently introduced in\ngravitational physics. Environmental effects, such as the addition of a thin\naccretion disk or a matter shell, lead to a secondary bump that appears in the\neffective potential of black hole perturbations. Regardless of the\nenvironment\'s small contribution to the effective potential, its presence can\ncompletely destabilize the fundamental quasinormal mode and may potentially\naffect black hole spectroscopy. Here, we perform a comprehensive analysis of\nsuch phenomenon for Schwarzschild, Reissner-Nordstr\\""om, Schwarzschild-de\nSitter, and Reissner-Nordstr\\""om-de Sitter black holes by considering the\npotential for a test scalar field with the addition of a tiny bump sufficiently\naway from the photon sphere. We find a qualitatively similar destabilization\npattern for photon sphere, complex, scalar quasinormal modes in all cases, and\na surprising spectral stability for dominant scalar, purely imaginary, de\nSitter and near-extremal modes that belong to different families of the\nspectrum. For Reissner-Nordstr\\""om-de Sitter black holes, we re-evaluate the\nvalidity of the strong cosmic censorship and find that the addition of a\nrealistic bump in the effective potential cannot prevent its violation due to a\ncombination of the spectral stability of dominant de Sitter and near-extremal\nmodes for small cosmological constants and an ineffective migration of the\nphoton sphere modes that dominate the late-time ringdown signal for\nsufficiently large cosmological constants.\n', 'Gravitational collapse to extremal black holes and the third law of\n black hole thermodynamics We construct examples of black hole formation from regular, one-ended\nasymptotically flat Cauchy data for the Einstein-Maxwell-charged scalar field\nsystem in spherical symmetry which are exactly isometric to extremal\nReissner-Nordstr\\""om after a finite advanced time along the event horizon.\nMoreover, in each of these examples the apparent horizon of the black hole\ncoincides with that of a Schwarzschild solution at earlier advanced times. In\nparticular, our result can be viewed as a definitive disproof of the ""third law\nof black hole thermodynamics.""\n The main step in the construction is a novel $C^k$ characteristic gluing\nprocedure, which interpolates between a light cone in Minkowski space and a\nReissner-Nordstr\\""om event horizon with specified charge to mass ratio $e/M$.\nOur setup is inspired by the recent work of Aretakis-Czimek-Rodnianski on\nperturbative characteristic gluing for the Einstein vacuum equations. However,\nour construction is fundamentally nonperturbative and is based on a finite\ncollection of scalar field pulses which are modulated by the Borsuk-Ulam\ntheorem.\n', 'Uniqueness of extremal charged black holes in de Sitter We prove a uniqueness theorem for the charged Nariai black holes and\nultracold black holes in four dimensions. In particular, we show that an\nanalytic solution to four-dimensional Einstein-Maxwell theory with a positive\ncosmological constant containing a static extremal Killing horizon with\nspherical cross-sections of large radius (compared to the cosmological scale),\nmust be locally isometric to the extremal Reissner-Nordstr\\""om-de Sitter black\nhole or its near-horizon geometry. The theorem generalises to extremal static\nhorizons with small radius, establishing uniqueness of cold black holes for\ngeneric values of the radius.\n']","[('black holes', 0.6131636500358582), ('black hole', 0.5596070289611816), ('de sitter spacetimes', 0.5466445684432983), ('einstein vacuum equations', 0.5440360307693481), ('schwarzschild black', 0.516690731048584), ('sitter spacetimes', 0.49376681447029114), ('einstein scalar', 0.4719286561012268), ('positive cosmological', 0.4569825232028961), ('einstein vacuum', 0.4507296085357666), ('general relativity', 0.4502578377723694)]" 42,42,412,42_estimating causal_average treatment effects_causal inference_average treatment effect,"['estimating causal', 'average treatment effects', 'causal inference', 'average treatment effect', 'effect estimation', 'estimators', 'causal effects', 'estimating', 'treatment effects', 'unobserved']","['The CATT SATT on the MATT: semiparametric inference for sample treatment\n effects on the treated We study variants of the average treatment effect on the treated with\npopulation parameters replaced by their sample counterparts. For each estimand,\nwe derive the limiting distribution with respect to a semiparametric efficient\nestimator of the population effect and provide guidance on variance estimation.\nIncluded in our analysis is the well-known sample average treatment effect on\nthe treated, for which we obtain some unexpected results. Unlike the ordinary\nsample average treatment effect, we find that the asymptotic variance for the\nsample average treatment effect on the treated is point-identified and\nconsistently estimable, but it potentially exceeds that of the population\nestimand. To address this shortcoming, we propose a modification that yields a\nnew estimand, the mixed average treatment effect on the treated, which is\nalways estimated more precisely than both the population and sample effects. We\nalso introduce a second new estimand that arises from an alternative\ninterpretation of the treatment effect on the treated with which all\nindividuals are weighted by the propensity score.\n', 'Regression-adjusted average treatment effect estimates in stratified\n randomized experiments Researchers often use linear regression to analyse randomized experiments to\nimprove treatment effect estimation by adjusting for imbalances of covariates\nin the treatment and control groups. Our work offers a randomization-based\ninference framework for regression adjustment in stratified randomized\nexperiments. Under mild conditions, we re-establish the finite population\ncentral limit theorem for a stratified experiment. We prove that both the\nstratified difference-in-means and the regression-adjusted average treatment\neffect estimators are consistent and asymptotically normal. The asymptotic\nvariance of the latter is no greater and is typically lesser than that of the\nformer. We also provide conservative variance estimators to construct\nlarge-sample confidence intervals for the average treatment effect.\n', ""Semiparametric proximal causal inference Skepticism about the assumption of no unmeasured confounding, also known as\nexchangeability, is often warranted in making causal inferences from\nobservational data; because exchangeability hinges on an investigator's ability\nto accurately measure covariates that capture all potential sources of\nconfounding. In practice, the most one can hope for is that covariate\nmeasurements are at best proxies of the true underlying confounding mechanism\noperating in a given observational study. In this paper, we consider the\nframework of proximal causal inference introduced by Miao et al. (2018);\nTchetgen Tchetgen et al. (2020), which while explicitly acknowledging covariate\nmeasurements as imperfect proxies of confounding mechanisms, offers an\nopportunity to learn about causal effects in settings where exchangeability on\nthe basis of measured covariates fails. We make a number of contributions to\nproximal inference including (i) an alternative set of conditions for\nnonparametric proximal identification of the average treatment effect; (ii)\ngeneral semiparametric theory for proximal estimation of the average treatment\neffect including efficiency bounds for key semiparametric models of interest;\n(iii) a characterization of proximal doubly robust and locally efficient\nestimators of the average treatment effect. Moreover, we provide analogous\nidentification and efficiency results for the average treatment effect on the\ntreated. Our approach is illustrated via simulation studies and a data\napplication on evaluating the effectiveness of right heart catheterization in\nthe intensive care unit of critically ill patients.\n""]","[('estimating causal', 0.5282000303268433), ('average treatment effects', 0.4836682677268982), ('causal inference', 0.4829055368900299), ('average treatment effect', 0.46095171570777893), ('effect estimation', 0.4286339581012726), ('estimators', 0.4091922342777252), ('causal effects', 0.39889323711395264), ('estimating', 0.38157957792282104), ('treatment effects', 0.37819772958755493), ('unobserved', 0.3750286102294922)]" 43,43,411,43_schur functions_schur polynomials_macdonald polynomials_quasisymmetric functions,"['schur functions', 'schur polynomials', 'macdonald polynomials', 'quasisymmetric functions', 'quasi symmetric functions', 'symmetric functions', 'semistandard tableaux', 'standard young tableaux', 'hall littlewood polynomials', 'quasi symmetric']","['Expanding quasisymmetric Schur $Q$-functions into peak Young\n quasisymmetric Schur functions The dual immaculate and Young quasisymmetric Schur bases of quasisymmetric\nfunctions possess analogues in the peak algebra: respectively, the\nquasisymmetric Schur $Q$-functions and the peak Young quasisymmetric Schur\nfunctions. We show elements of the former basis expand into the latter basis\nwith nonnegative coefficients.\n', ""Skew row-strict quasisymmetric Schur functions Mason and Remmel introduced a basis for quasisymmetric functions known as the\nrow-strict quasisymmetric Schur functions. This basis is generated\ncombinatorially by fillings of composition diagrams that are analogous to the\nrow-strict tableaux that generate Schur functions. We introduce a modification\nknown as Young row-strict quasisymmetric Schur functions, which are generated\nby row-strict Young composition fillings. After discussing basic combinatorial\nproperties of these functions, we define a skew Young row-strict quasisymmetric\nSchur function using the Hopf algebra of quasisymmetric functions and then\nprove this is equivalent to a combinatorial description. We also provide a\ndecomposition of the skew Young row-strict quasisymmetric Schur functions into\na sum of Gessel's fundamental quasisymmetric functions and prove a\nmultiplication rule for the product of a Young row-strict quasisymmetric Schur\nfunction and a Schur function.\n"", 'Compact formulas for Macdonald polynomials and quasisymmetric Macdonald\n polynomials We present several new and compact formulas for the modified and integral\nform of the Macdonald polynomials, building on the compact ""multiline queue""\nformula for Macdonald polynomials due to Corteel, Mandelshtam, and Williams. We\nalso introduce a new quasisymmetric analogue of Macdonald polynomials. These\n""quasisymmetric Macdonald polynomials"" refine the (symmetric) Macdonald\npolynomials and specialize to the quasisymmetric Schur polynomials defined by\nHaglund, Luoto, Mason, and van Willigenburg.\n']","[('schur functions', 0.6462730169296265), ('schur polynomials', 0.6429260969161987), ('macdonald polynomials', 0.589475691318512), ('quasisymmetric functions', 0.5751291513442993), ('quasi symmetric functions', 0.5725226402282715), ('symmetric functions', 0.507175624370575), ('semistandard tableaux', 0.4884788990020752), ('standard young tableaux', 0.46837306022644043), ('hall littlewood polynomials', 0.4663620591163635), ('quasi symmetric', 0.45985034108161926)]" 44,44,410,44_algebraic tropical_tropical geometry_theory tropical_tropical curves,"['algebraic tropical', 'tropical geometry', 'theory tropical', 'tropical curves', 'moduli spaces tropical', 'tropicalization', 'tropical linear', 'tropical curve', 'tropical analogue', 'terms tropical']","['Cohomologically tropical varieties Given the tropicalization of a complex subvariety of the torus, we define a\nmorphism between the tropical cohomology and the rational cohomology of their\nrespective tropical compactifications. We say that the subvariety of the torus\nis cohomologically tropical if this map is an isomorphism for all closed strata\nof the tropical compactification.\n We prove that a sch\\""on subvariety of the torus is cohomologically tropical\nif and only if it is wundersch\\""on and its tropicalization is a tropical\nhomology manifold. The former property means that the open strata in the\nboundary of a tropical compactification are all connected and the mixed Hodge\nstructures on their cohomology are pure of maximum possible weight; the latter\nproperty requires that, locally, the tropicalization verifies tropical\nPoincar\\\'e duality.\n We study other properties of cohomologically tropical and wundersch\\""on\nvarieties, and show that in a semistable degeneration to an arrangement of\ncohomologically tropical varieties, the Hodge numbers of the smooth fibers are\ncaptured in the tropical cohomology of the tropicalization. This extends the\nresults of Itenberg, Katzarkov, Mikhalkin, and Zharkov.\n', 'Tropical Normal Functions -- Higher Abel-Jacobi Invariants of Tropical\n cycles We consider the variation of tropical Hodge structure (TVHS) associated to\nfamilies of tropical varieties. The family of the tropical intermediate\nJacobians of the associated tropical Hodge structure defines a bundle of\ntropical Jacobians, whose sections we call the tropical normal functions. We\ndefine formal sequential derivatives of these functions on the base with\nrespect to the natural Gauss-Manin connection as the Hodge theoretic invariants\ndetecting tropical cycles in the fibers. The associated invariants which are\ndefined inductively are the higher Abel-Jacobi invariants in the tropical\ncategory. They naturally identify the tropical Bloch-Beilinson filtration on\nthe tropical Chow group. We examine this construction on the moduli of tropical\ncurves with marked points, in order to study the tropical tautological classes\nin the tautological ring of $\\mathcal{M}_{g,n}^{\\text{trop}}$. The expectation\nis the nontriviality of these cycles could be examined with less complexity in\nthe tropical category. The construction is compatible with the tropicalization\nfunctor on the category of schemes, and the aforementioned procedure will also\nprovide an alternative way to examine the relations in the tautological ring of\n$\\mathcal{M}_{g,n}$ in the schemes category.\n', 'Maximum Inscribed and Minimum Enclosing Tropical Balls of Tropical\n Polytopes and Applications to Volume Estimation and Uniform Sampling We consider a minimum enclosing and maximum inscribed tropical balls for any\ngiven tropical polytope over the tropical projective torus in terms of the\ntropical metric with the max-plus algebra. We show that we can obtain such\ntropical balls via linear programming. Then we apply minimum enclosing and\nmaximum inscribed tropical balls of any given tropical polytope to estimate the\nvolume of and sample uniformly from the tropical polytope.\n']","[('algebraic tropical', 0.7248362898826599), ('tropical geometry', 0.6453468203544617), ('theory tropical', 0.6326200366020203), ('tropical curves', 0.6249240040779114), ('moduli spaces tropical', 0.602134644985199), ('tropicalization', 0.5858491063117981), ('tropical linear', 0.5706323385238647), ('tropical curve', 0.5653814673423767), ('tropical analogue', 0.5642475485801697), ('terms tropical', 0.5622387528419495)]" 45,45,409,45_gradient ricci soliton_ricci solitons_ricci soliton_ricci curvature,"['gradient ricci soliton', 'ricci solitons', 'ricci soliton', 'ricci curvature', 'dimensional ricci', 'ricci tensor', 'solutions ricci', 'gradient ricci', 'ricci flows', 'singular ricci']","['On Complete Gradient Steady Ricci Solitons with Vanishing D-tensor In this paper, we extend the work of Cao-Chen [9] on Bach-flat gradient Ricci\nsolitons to classify $n$-dimensional ($n\\ge 5$) complete $D$-flat gradient\nsteady Ricci solitons. More precisely, we prove that any $n$-dimensional\ncomplete noncompact gradient steady Ricci soliton with vanishing $D$-tensor is\neither Ricci-flat, or isometric to the Bryant soliton. Furthermore, the proof\nextends to the shrinking case and the expanding case as well.\n', 'Almost $\\eta$-Ricci solitons on Kenmotsu manifolds In this paper we characterize the Einstein metrics in such broader classes of\nmetrics as almost $\\eta$-Ricci solitons and $\\eta$-Ricci solitons on Kenmotsu\nmanifolds, and generalize some results of other authors. First, we prove that a\nKenmotsu metric as an $\\eta$-Ricci soliton is Einstein metric if either it is\n$\\eta$-Einstein or the potential vector field $V$ is an infinitesimal contact\ntransformation or $V$ is collinear to the Reeb vector field. Further, we prove\nthat if a Kenmotsu manifold admits a gradient almost $\\eta$-Ricci soliton with\na Reeb vector field leaving the scalar curvature invariant, then it is an\nEinstein manifold. Finally, we present new examples of $\\eta$-Ricci solitons\nand gradient $\\eta$-Ricci solitons, which illustrate our results.\n', 'Triviality Results and Conjugate Radius Estimation of Ricci Solitons The investigation of Ricci solitons is the focus of this work. We have proved\ntriviality results for compact gradient Ricci soliton under certain\nrestriction. Later, a rigidity result is derived for a compact gradient\nshrinking Ricci soliton. Also, we have estimated the conjugate radius for\nnon-compact gradient shrinking Ricci solitons with superharmonic potential.\nMoreover, an upper bound for the conjugate radius of Ricci soliton with\nconcircular potential vector field is determined. Finally, it is proved that a\nnon-compact gradient Ricci soliton with a pole and non-negative Ricci curvature\nis non-shrinking.\n']","[('gradient ricci soliton', 0.8153871893882751), ('ricci solitons', 0.798119843006134), ('ricci soliton', 0.7690591216087341), ('ricci curvature', 0.717526912689209), ('dimensional ricci', 0.7008510231971741), ('ricci tensor', 0.664598822593689), ('solutions ricci', 0.6633076667785645), ('gradient ricci', 0.639927327632904), ('ricci flows', 0.6228723526000977), ('singular ricci', 0.6222289800643921)]" 46,46,407,46_permutation patterns_pattern avoiding permutations_avoiding permutations_permutations length,"['permutation patterns', 'pattern avoiding permutations', 'avoiding permutations', 'permutations length', 'permutations avoiding', 'permutations s_n', 'alternating permutations', 'permutations', 'number permutations', 'permutation sigma']","['A Complete Enumeration of Ballot Permutations Avoiding Sets of Small\n Patterns Permutations whose prefixes contain at least as many ascents as descents are\ncalled ballot permutations. Lin, Wang, and Zhao have previously enumerated\nballot permutations avoiding small patterns and have proposed the problem of\nenumerating ballot permutations avoiding a pair of permutations of length $3$.\nWe completely enumerate ballot permutations avoiding two patterns of length $3$\nand we relate these avoidance classes with their respective recurrence\nrelations and formulas, which leads to an interesting bijection between ballot\npermutations avoiding $132$ and $312$ with left factors of Dyck paths. In\naddition, we also conclude the Wilf-classification of ballot permutations\navoiding sets of two patterns of length $3$, and we then extend our results to\ncompletely enumerate ballot permutations avoiding three patterns of length $3$.\n', 'Pattern-avoiding shallow permutations Shallow permutations were defined in 1977 to be those that satisfy the lower\nbound of the Diaconis-Graham inequality. Recently, there has been renewed\ninterest in these permutations. In particular, Berman and Tenner showed they\nsatisfy certain pattern avoidance conditions in their cycle form and Woo showed\nthey are exactly those whose cycle diagrams are unlinked. Shallow permutations\nthat avoid 321 have appeared in many contexts; they are those permutations for\nwhich depth equals the reflection length, they have unimodal cycles, and they\nhave been called Boolean permutations. Motivated by this interest in\n321-avoiding shallow permutations, we investigate $\\sigma$-avoiding shallow\npermutations for all $\\sigma \\in \\mathcal{S}_3$. To do this, we develop more\ngeneral structural results about shallow permutations, and apply them to\nenumerate shallow permutations avoiding any pattern of length 3.\n', ""Descent generating polynomials for ($n-3$)- and ($n-4$)-stack-sortable\n (pattern-avoiding) permutations In this paper, we find distribution of descents over $(n-3)$- and\n$(n-4)$-stack-sortable permutations in terms of Eulerian polynomials. Our\nresults generalize the enumeration results by Claesson, Dukes, and\nSteingr\\'{\\i}msson on $(n-3)$- and $(n-4)$-stack-sortable permutations.\nMoreover, we find distribution of descents on $(n-2)$-, $(n-3)$- and\n$(n-4)$-stack-sortable permutations that avoid any given pattern of length 3,\nwhich extends known results in the literature on distribution of descents over\npattern-avoiding 1- and 2-stack-sortable permutations. Our distribution results\nalso give enumeration of $(n-2)$-, $(n-3)$- and $(n-4)$-stack-sortable\npermutations avoiding any pattern of length 3. One of our conjectures links our\nwork to stack-sorting with restricted stacks, and the other conjecture states\nthat 213-avoiding permutations sortable with $t$ stacks are equinumerous with\n321-avoiding permutations sortable with $t$ stacks for any $t$.\n""]","[('permutation patterns', 0.6891365647315979), ('pattern avoiding permutations', 0.6754373908042908), ('avoiding permutations', 0.6469812393188477), ('permutations length', 0.6260338425636292), ('permutations avoiding', 0.6240009069442749), ('permutations s_n', 0.5928261876106262), ('alternating permutations', 0.5714940428733826), ('permutations', 0.5664812922477722), ('number permutations', 0.5579226016998291), ('permutation sigma', 0.5549122095108032)]" 47,47,405,47_policy gradient methods_policy optimization_reinforcement learning rl_policy gradient,"['policy gradient methods', 'policy optimization', 'reinforcement learning rl', 'policy gradient', 'optimal policy', 'discounted markov', 'optimal policies', 'reinforcement learning', 'constrained markov decision', 'markov decision processes']","['Provably Efficient Representation Selection in Low-rank Markov Decision\n Processes: From Online to Offline RL The success of deep reinforcement learning (DRL) lies in its ability to learn\na representation that is well-suited for the exploration and exploitation task.\nTo understand how the choice of representation can improve the efficiency of\nreinforcement learning (RL), we study representation selection for a class of\nlow-rank Markov Decision Processes (MDPs) where the transition kernel can be\nrepresented in a bilinear form. We propose an efficient algorithm, called\nReLEX, for representation learning in both online and offline RL. Specifically,\nwe show that the online version of ReLEX, called ReLEX-UCB, always performs no\nworse than the state-of-the-art algorithm without representation selection, and\nachieves a strictly better constant regret if the representation function class\nhas a ""coverage"" property over the entire state-action space. For the offline\ncounterpart, ReLEX-LCB, we show that the algorithm can find the optimal policy\nif the representation class can cover the state-action space and achieves\ngap-dependent sample complexity. This is the first result with constant sample\ncomplexity for representation learning in offline RL.\n', 'Reward-Free Model-Based Reinforcement Learning with Linear Function\n Approximation We study the model-based reward-free reinforcement learning with linear\nfunction approximation for episodic Markov decision processes (MDPs). In this\nsetting, the agent works in two phases. In the exploration phase, the agent\ninteracts with the environment and collects samples without the reward. In the\nplanning phase, the agent is given a specific reward function and uses samples\ncollected from the exploration phase to learn a good policy. We propose a new\nprovably efficient algorithm, called UCRL-RFE under the Linear Mixture MDP\nassumption, where the transition probability kernel of the MDP can be\nparameterized by a linear function over certain feature mappings defined on the\ntriplet of state, action, and next state. We show that to obtain an\n$\\epsilon$-optimal policy for arbitrary reward function, UCRL-RFE needs to\nsample at most $\\tilde{\\mathcal{O}}(H^5d^2\\epsilon^{-2})$ episodes during the\nexploration phase. Here, $H$ is the length of the episode, $d$ is the dimension\nof the feature mapping. We also propose a variant of UCRL-RFE using\nBernstein-type bonus and show that it needs to sample at most\n$\\tilde{\\mathcal{O}}(H^4d(H + d)\\epsilon^{-2})$ to achieve an\n$\\epsilon$-optimal policy. By constructing a special class of linear Mixture\nMDPs, we also prove that for any reward-free algorithm, it needs to sample at\nleast $\\tilde \\Omega(H^2d\\epsilon^{-2})$ episodes to obtain an\n$\\epsilon$-optimal policy. Our upper bound matches the lower bound in terms of\nthe dependence on $\\epsilon$ and the dependence on $d$ if $H \\ge d$.\n', 'Stochastic first-order methods for average-reward Markov decision\n processes We study average-reward Markov decision processes (AMDPs) and develop novel\nfirst-order methods with strong theoretical guarantees for both policy\noptimization and policy evaluation. Compared with intensive research efforts in\nfinite sample analysis of policy gradient methods for discounted MDPs, existing\nstudies on policy gradient methods for AMDPs mostly focus on regret bounds\nunder restrictive assumptions, and they often lack guarantees on the overall\nsample complexities. Towards this end, we develop an average-reward stochastic\npolicy mirror descent (SPMD) method for solving AMDPs with and without\nregularizers and provide convergence guarantees in terms of the long-term\naverage reward. For policy evaluation, existing on-policy methods suffer from\nsub-optimal convergence rates as well as failure in handling insufficiently\nrandom policies due to the lack of exploration in the action space. To remedy\nthese issues, we develop a variance-reduced temporal difference (VRTD) method\nwith linear function approximation for randomized policies along with optimal\nconvergence guarantees, and design an exploratory VRTD method that resolves the\nexploration issue and provides comparable convergence guarantees. By combining\nthe policy evaluation and policy optimization parts, we establish sample\ncomplexity results for solving AMDPs under both generative and Markovian noise\nmodels. It is worth noting that when linear function approximation is utilized,\nour algorithm only needs to update in the low-dimensional parameter space and\nthus can handle MDPs with large state and action spaces.\n']","[('policy gradient methods', 0.5961518883705139), ('policy optimization', 0.5866567492485046), ('reinforcement learning rl', 0.5787047147750854), ('policy gradient', 0.5472708940505981), ('optimal policy', 0.5217691659927368), ('discounted markov', 0.5185737013816833), ('optimal policies', 0.5170655250549316), ('reinforcement learning', 0.5112757086753845), ('constrained markov decision', 0.5041696429252625), ('markov decision processes', 0.479580819606781)]" 48,48,404,48_semilinear wave equations_damped wave equations_semilinear damped wave_solutions semilinear wave,"['semilinear wave equations', 'damped wave equations', 'semilinear damped wave', 'solutions semilinear wave', 'semilinear damped', 'semilinear wave', 'time dependent damping', 'nonlinear wave equations', 'damped wave', 'wave equations']","['The lifespan of solutions of semilinear wave equations with the\n scale-invariant damping in two space dimensions In this paper, we study the initial value problem for semilinear wave\nequations with the time-dependent and scale-invariant damping in two\ndimensions. Similarly to the one dimensional case by Kato, Takamura and Wakasa\nin 2019, we obtain the lifespan estimates of the solution for a special\nconstant in the damping term, which are classified by total integral of the sum\nof the initial position and speed. The key fact is that, only in two space\ndimensions, such a special constant in the damping term is a threshold between\n""wave-like"" domain and ""heat-like"" domain. As a result, we obtain a new type of\nestimate especially for the critical exponent.\n', 'Sharp lifespan estimates for the weakly coupled system of semilinear\n damped wave equations in the critical case The open question, which seems to be also the final part, in terms of\nstudying the Cauchy problem for the weakly coupled system of damped wave\nequations or reaction-diffusion equations, is so far known as the sharp\nlifespan estimates in the critical case. In this paper, we mainly investigate\nlifespan estimates for solutions to the weakly coupled system of semilinear\ndamped wave equations in the critical case. By using a suitable test function\nmethod associated with nonlinear differential inequalities, we catch upper\nbound estimates for the lifespan. Moreover, we establish polynomial-logarithmic\ntype time-weighted Sobolev spaces to obtain lower bound estimates for the\nlifespan in low spatial dimensions. Then, together with the derived lifespan\nestimates, new and sharp results on estimates for the lifespan in the critical\ncase are claimed. Finally, we give an application of our results to the\nsemilinear reaction-diffusion system in the critical case.\n', 'Heat-like and wave-like lifespan estimates for solutions of semilinear\n damped wave equations via a Kato\'s type lemma In this paper we study several semilinear damped wave equations with\n""subcritical"" nonlinearities, focusing on demonstrating lifespan estimates for\nenergy solutions. Our main concern is on equations with scale-invariant damping\nand mass. Under different assumptions imposed on the initial data, lifespan\nestimates from above are clearly showed. The key fact is that we find\n""transition surfaces"", which distinguish lifespan estimates between ""wave-like""\nand ""heat-like"" behaviours. Moreover we conjecture that the lifespan estimates\non the ""transition surfaces"" can be logarithmically improved. As direct\nconsequences, we reorganize the blow-up results and lifespan estimates for the\nmassless case in which the ""transition surfaces"" degenerate to ""transition\ncurves"". Furthermore, we obtain improved lifespan estimates in one space\ndimension, comparing to the known results. We also study semilinear wave\nequations with the scattering damping and negative mass term, and find that if\nthe decay rate of the mass term equals to 2, the lifespan estimate is the same\nas one special case of the equations with the scale-invariant damping and\npositive mass. The main strategy of the proof consists of a Kato\'s type lemma\nin integral form, which is established by iteration argument.\n']","[('semilinear wave equations', 0.6504999995231628), ('damped wave equations', 0.6388559937477112), ('semilinear damped wave', 0.6249153017997742), ('solutions semilinear wave', 0.623485267162323), ('semilinear damped', 0.5592295527458191), ('semilinear wave', 0.5351925492286682), ('time dependent damping', 0.5337944626808167), ('nonlinear wave equations', 0.5224816203117371), ('damped wave', 0.5209072828292847), ('wave equations', 0.499022513628006)]" 49,49,398,49_circular orbits_periodic orbits_orbits_periodic orbit,"['circular orbits', 'periodic orbits', 'orbits', 'periodic orbit', 'celestial mechanics', 'keplerian', 'orbit', 'circular restricted three', 'orbital', 'restricted three body']","['Branches and bifurcations of ejection-collision orbits in the planar\n circular restricted three body problem The goal of this paper it to prove existence theorems for one parameter\nfamilies (branches) of ejection-collision orbits in the planar circular\nrestricted three body problem (CRTBP), and to study some of their bifurcations.\nThe orbits considered are ejected from one primary body and collide with the\nother (as opposed to more local ejections-collision orbits which involve only a\nsingle body). We consider branches which are (i) parameterized by the Jacobi\nintegral (energy like quantity conserved by the CRTBP) and (ii) parameterized\nby the two body mass ratio when energy is fixed. The method of proof is\nconstructive and computer assisted, hence can be applied in non perturbative\nsettings and (potentially) to other conservative systems of differential\nequations. The main requirement is that the system should admit a change of\ncoordinates which regularizes the singularities (collisions). In the planar\nCRTBP the necessary regularization is provided by the classical Levi-Civita\ntransformation.\n', 'A dynamical study of Hilda asteroids in the Circular and Elliptic RTBP The Hilda group is a set of asteroids whose mean motion is in a 3:2 orbital\nresonance with Jupiter. In this paper we use the planar Circular Restricted\nThree-Body Problem (CRTBP) as a dynamical model and we show that there exists a\nfamily of stable periodic orbits that are surrounded by islands of\nquasi-periodic motions. We have computed the frequencies of these\nquasi-periodic motions and we have shown how the Hilda family fits inside these\nislands. We have compared these results with the ones obtained using the\nElliptic Restricted Three-Body Problem and they are similar, showing the\nsuitability of the CRTBP model. It turns out that, to decide if a given\nasteroid belongs to the Hilda class, it is much better to look at its\nfrequencies in the planar CRTBP rather than to use two-body orbital elements as\nit is commonly done today.\n', ""Jacobi stability analysis of the classical restricted three body problem The circular restricted three body problem, which considers the dynamics of\nan infinitesimal particle in the presence of the gravitational interaction with\ntwo massive bodies moving on circular orbits about their common center of mass,\nis a very useful model for investigating the behavior of real astronomical\nobjects in the Solar System. In such a system, there are five Lagrangian\nequilibrium points, and one important characteristic of the motion is the\nexistence of linearly stable equilibria at the two equilibrium points that form\nequilateral triangles with the primaries, in the plane of the primaries' orbit.\nWe analyze the stability of motion in the restricted three body problem by\nusing the concept of Jacobi stability, as introduced and developed in the\nKosambi-Cartan-Chern (KCC) theory. The KCC theory is a differential geometric\napproach to the variational equations describing the deviation of the whole\ntrajectory of a dynamical system with respect to the nearby ones. We obtain the\ngeneral result that, from the point of view of the KCC theory and of Jacobi\nstability, all five Lagrangian equilibrium points of the restricted three body\nproblem are unstable.\n""]","[('circular orbits', 0.6289022564888), ('periodic orbits', 0.5931240320205688), ('orbits', 0.5663216710090637), ('periodic orbit', 0.5516265630722046), ('celestial mechanics', 0.4694705009460449), ('keplerian', 0.44999873638153076), ('orbit', 0.4436573088169098), ('circular restricted three', 0.4273732900619507), ('orbital', 0.4184876084327698), ('restricted three body', 0.4081304967403412)]" 50,50,397,50_shallow water waves_water waves_water wave_shallow water equations,"['shallow water waves', 'water waves', 'water wave', 'shallow water equations', 'wave solutions', 'solitary wave solutions', 'water equations', 'surface waves', 'waves surface', 'solitary waves']","['On the capillary water waves with constant vorticity This article is devoted to the study of local well-posedness for deep water\nwaves with constant vorticity in two space dimensions on the real line. The\nwater waves can be paralinearized and written as a quasilinear dispersive\nsystem of equations. By using the energy estimate and the Strichartz estimate,\nwe show that for $s> \\frac{5}{4}$, the gravity-capillary water wave system with\nconstant vorticity is locally well-posed in $\\mathcal{H}^{s}(\\mathbb{R})$.\n', 'Bifurcation of gravity-capillary Stokes waves with constant vorticity We consider the gravity-capillary water waves equations of a 2D fluid with\nconstant vorticity. Using variational methods we prove the bifurcation of\nsteady periodic traveling water waves for {\\it all} the values of gravity,\nsurface tension, constant vorticity, depth and wavelenght, extending previous\nresults valid for restricted values of the parameters. We parametrize the\nbifurcating Stokes waves either with their speed or their momentum.\n', 'On the amplitude of steady water waves with positive constant vorticity For two-dimensional steady pure-gravity water waves with a unidirectional\nflow of constant favourable vorticity, we prove an explicit bound on the\namplitude of the wave, which decays to zero as the vorticity tends to infinity.\nNotably, our result holds true for arbitrary water waves, that is, we do not\nhave to restrict ourselves to periodic or solitary or symmetric waves.\n']","[('shallow water waves', 0.6633684635162354), ('water waves', 0.6602864861488342), ('water wave', 0.6214060187339783), ('shallow water equations', 0.6138467192649841), ('wave solutions', 0.613305926322937), ('solitary wave solutions', 0.6016306281089783), ('water equations', 0.5905227661132812), ('surface waves', 0.5768841505050659), ('waves surface', 0.5724037289619446), ('solitary waves', 0.5521935820579529)]" 51,51,397,51_amenable groups_amenable group_measure preserving actions_actions countable,"['amenable groups', 'amenable group', 'measure preserving actions', 'actions countable', 'action countable', 'group actions', 'countable groups', 'compact groups', 'countable group', 'preserving action']","['Tail variational principle and asymptotic $h$-expansiveness for amenable\n group actions In this paper we prove the tail variational principle for actions of\ncountable amenable groups. This allows us to extend some characterizations of\nasymptotic $h$-expansiveness from $\\mathbb{Z}$-actions to actions of countable\namenable groups.\n', ""Multiorders in amenable group actions The paper offers a thorough study of multiorders and their applications to\nmeasure-preserving actions of countable amenable groups. By a~{\\em multiorder}\non a~countable group we mean any probability measure $\\nu$ on the collection\n$\\tilde{\\mathcal{O}}$ of linear orders of type $\\mathbb Z$ on $G$, invariant\nunder the natural action of $G$ on such orders. Every free measure-preserving\n$G$-action $(X,\\mu,G)$ has a~multiorder $(\\tilde{\\mathcal{O}},\\nu,G)$ as a\nfactor and has the same orbits as the $\\mathbb Z$-action $(X,\\mu,S)$, where $S$\nis the \\emph{successor map} determined by the multiorder factor. Moreover, the\nsub-sigma-algebra $\\Sigma_{\\tilde{\\mathcal{O}}}$ associated with the multiorder\nfactor is invariant under $S$, which makes the corresponding $\\mathbb Z$-action\n$(\\tilde{\\mathcal{O}},\\nu,\\tilde S)$ a factor of $(X,\\mu,S)$. We prove that the\nentropy of any $G$-process generated by a finite partition of $X$, conditional\nwith respect to $\\Sigma_{\\tilde{\\mathcal{O}}}$, is preserved by the orbit\nequivalence with $(X,\\mu,S)$. Furthermore, this entropy can be computed in\nterms of the so-called random past, by a formula analogous to $\nh(\\mu,T,\\mathcal P)=H(\\mu,\\mathcal P|\\mathcal{P}^-)$ known for $\\mathbb\nZ$-actions. The above fact is then applied to prove a variant of a result by\nRudolph and Weiss. The original theorem states that orbit equivalence between\nfree actions of countable amenable groups preserves conditional entropy with\nrespect to a~sub-sigma-algebra $\\Sigma$, as soon as the ``orbit change'' is\nmeasurable with respect to $\\Sigma$. In our variant, we replace the\nmeasurability assumption by a~simpler one: $\\Sigma$ should be invariant under\nboth actions and the actions on the resulting factor should be free. In\nconclusion we provide a characterization of the Pinsker sigma-algebra of any\n$G$-process in terms of an appropriately defined remote past arising from a\nmultiorder.\n"", 'Folner tilings for actions of amenable groups We show that every probability-measure-preserving action of a countable\namenable group G can be tiled, modulo a null set, using finitely many finite\nsubsets of G (""shapes"") with prescribed approximate invariance so that the\ncollection of tiling centers for each shape is Borel. This is a dynamical\nversion of the Downarowicz--Huczek--Zhang tiling theorem for countable amenable\ngroups and strengthens the Ornstein--Weiss Rokhlin lemma. As an application we\nprove that, for every countably infinite amenable group G, the crossed product\nof a generic free minimal action of G on the Cantor set is Z-stable.\n']","[('amenable groups', 0.6227824091911316), ('amenable group', 0.5867101550102234), ('measure preserving actions', 0.5484967231750488), ('actions countable', 0.5471590161323547), ('action countable', 0.5343608260154724), ('group actions', 0.5283998847007751), ('countable groups', 0.5121774077415466), ('compact groups', 0.49674147367477417), ('countable group', 0.4953179657459259), ('preserving action', 0.4733406901359558)]" 52,52,381,52_fractional brownian motion_fractional brownian motions_driven fractional brownian_fractional brownian,"['fractional brownian motion', 'fractional brownian motions', 'driven fractional brownian', 'fractional brownian', 'brownian motion hurst', 'fractional stochastic', 'dimensional fractional brownian', 'motion hurst parameter', 'hurst parameter', 'motion hurst']","['Stochastic differential equations driven by fractional Brownian motion The aim of this paper is to analyse a WIS-stochastic differential equation\ndriven by fractional Brownian motion with H>0.5. For this, we summarise the\ntheory of fractional white noise and prove a fundamental L^2-estimate for\nWIS-integrals. We apply this to prove the existence and uniqueness of a\nsolution in L^2(P) of a WIS-stochastic differential equation driven fractional\nBrownian motion with H>0.5 under Lipschitz conditions on its coefficients.\n', 'Branching fractional Brownian motion: discrete approximations and\n maximal displacement We construct and study branching fractional Brownian motion with Hurst\nparameter $H\\in(1/2,1)$. The construction relies on a generalization of the\ndiscrete approximation of fractional Brownian motion (Hammond and Sheffield,\nProbability Theory and Related Fields, 2013) to power law P\\\'olya urns indexed\nby trees. We show that the first order of the speed of branching fractional\nBrownian motion with Hurst parameter $H$ is $ct^{H+1/2}$ where $c$ is explicit\nand only depends on the Hurst parameter. A notion of ""branching property"" for\nprocesses with memory emerges naturally from our construction.\n', 'A note on the continuity in the Hurst index of the solution of rough\n differential equations driven by a fractional Brownian motion Within the rough path framework we prove the continuity of the solution to\nrandom differential equations driven by fractional Brownian motion with respect\nto the Hurst parameter $H$ when $H \\in (1/3, 1/2]$.\n']","[('fractional brownian motion', 0.7912901639938354), ('fractional brownian motions', 0.7747256755828857), ('driven fractional brownian', 0.761769711971283), ('fractional brownian', 0.7424856424331665), ('brownian motion hurst', 0.7383249998092651), ('fractional stochastic', 0.718473494052887), ('dimensional fractional brownian', 0.6924065947532654), ('motion hurst parameter', 0.6250861883163452), ('hurst parameter', 0.5868803858757019), ('motion hurst', 0.5601426362991333)]" 53,53,375,53_zeros riemann zeta_riemann zeta critical_riemann zeta_zeta riemann,"['zeros riemann zeta', 'riemann zeta critical', 'riemann zeta', 'zeta riemann', 'zeros zeta', 'riemann zeta zeta', 'values riemann zeta', 'zeta zeros', 'zeta functions', 'riemann hypothesis']","[""Almost all of the nontrivial zeros of the Riemann zeta-function are on\n the critical line Applying Littlewood's lemma in connection to Riemann's Hypothesis and\nexploiting the symmetry of Riemann's $xi$ function we show that almost all\nnontrivial Riemann's Zeta zeros are on the critical line.\n"", 'A Proof of Riemann Hypothesis The meromorphic function $W(s)$ introduced in the Riemann-Zeta function\n$\\zeta(s) = W(s) \\zeta(1-s)$ maps the line of $s = 1/2 + it$ onto the unit\ncircle in $W$-space. $|W(s)| = 0$ gives the trivial zeroes of the Riemann-Zeta\nfunction $\\zeta(s)$. In the range: $0 < |W(s)| \\neq 1$, $\\zeta(s)$ does not\nhave nontrivial zeroes. $|W(s)|=1$ is the necessary condition for the\nnontrivial zeros of the Riemann-Zeta function. Writing $s = \\sigma + it$, in\nthe range: $0 \\leq \\sigma \\leq 1$, but $\\sigma \\neq 1/2$, even if $|W(s)|=1$,\nthe Riemann-Zeta function $\\zeta(s)$ is non-zero. Based on these arguments, the\nnontrivial zeros of the Riemann-Zeta function $\\zeta(s)$ can only be on the $s\n= 1/2 + it$ critical line. Therefore a proof of the Riemann Hypothesis is\npresented.\n', 'All Zeros of the Riemann Zeta Function in the Critical Strip are Located\n on the Critical Line and are Simple In this paper we study the function G(z) :=\n int{0,infinity} y^{z-1}(1 + \\exp(y))^{-1} dy,\n for z in C. We derive a functional equation\n that relates G(z) and G(1 - z) for all z in C,\n and we prove:\n -- That G and the Riemann Zeta function Zeta have\n exactly the same zeros in the critical region\n D := z in C: Re z in (0,1);\n -- All the zeros of the Riemann Zeta function\n located on the critical line are simple; and\n -- The Riemann hypothesis, i.e., that all of the zeros\n of G in D are located on the critical line L :=\n {z in D : Re z = 1/2}.\n']","[('zeros riemann zeta', 0.8029151558876038), ('riemann zeta critical', 0.733368456363678), ('riemann zeta', 0.6899474859237671), ('zeta riemann', 0.6872190833091736), ('zeros zeta', 0.6745483875274658), ('riemann zeta zeta', 0.6742033362388611), ('values riemann zeta', 0.671841025352478), ('zeta zeros', 0.6690836548805237), ('zeta functions', 0.6660757064819336), ('riemann hypothesis', 0.6498871445655823)]" 54,54,370,54_random walks_random walk_random walks random_walks random,"['random walks', 'random walk', 'random walks random', 'walks random', 'symmetric random walk', 'reinforced random walk', 'reinforced random walks', 'simple random walk', 'random walk random', 'walk random']","['Limit theorems for a random walk with memory perturbed by a dynamical\n system We introduce a new random walk with unbounded memory obtained as a mixture of\nthe Elephant Random Walk and the Dynamic Random Walk which we call the Dynamic\nElephant Random Walk (DERW). As a consequence of this mixture the distribution\nof the increments of the resulting random process is time dependent. We prove a\nstrong law of large numbers for the DERW and, in a particular case, we provide\nan explicit expression for its speed. Finally, we give sufficient conditions\nfor the central limit theorem and the law of the iterated logarithm to hold.\n', 'Universal survival probability for a correlated random walk and\n applications to records We consider a model of space-continuous one-dimensional random walk with\nsimple correlation between the steps: the probability that two consecutive\nsteps have same sign is $q$ with $0\\leq q\\leq 1$. The parameter $q$ allows thus\nto control the persistence of the random walk. We compute analytically the\nsurvival probability of a walk of $n$ steps, showing that it is independent of\nthe jump distribution for any finite $n$. This universality is a consequence of\nthe Sparre-Andersen theorem for random walks with uncorrelated and symmetric\nsteps. We then apply this result to derive the distribution of the step at\nwhich the random walk reaches its maximum and the record statistics of the\nwalk, which show the same universality. In particular, we show that the\ndistribution of the number of records for a walk of $n\\gg 1$ steps is the same\nas for a random walk with $n_{\\rm eff}(q)=n/(2(1-q))$ uncorrelated and\nsymmetrically distributed steps. We also show that in the regime where $n\\to\n\\infty$ and $q\\to 1$ with $y=n(1-q)$, this model converges to the\nrun-and-tumble particle, a persistent random walk often used to model the\nmotion of bacteria. Our theoretical results are confirmed by numerical\nsimulations.\n', 'Asymptotic Analysis of the Elephant Random Walk In this work we study asymptotic properties of a long range memory random\nwalk known as elephant random walk. First we prove recurrence and positive\nrecurrence for the elephant random walk. Then, we establish the transience\nregime of the model. Finally, under the Poisson Hypothesis, we study the\nreplica mean field limit for this random walk and we obtain an upper bound for\nthe expected distance of the walker from the origin.\n']","[('random walks', 0.7261306047439575), ('random walk', 0.6946095824241638), ('random walks random', 0.6918124556541443), ('walks random', 0.6813173890113831), ('symmetric random walk', 0.6783797740936279), ('reinforced random walk', 0.6666761636734009), ('reinforced random walks', 0.6620033979415894), ('simple random walk', 0.6591676473617554), ('random walk random', 0.6527147889137268), ('walk random', 0.6514910459518433)]" 55,55,365,55_local langlands correspondence_langlands correspondence_langlands conjecture_geometric langlands,"['local langlands correspondence', 'langlands correspondence', 'langlands conjecture', 'geometric langlands', 'langlands parameters', 'representations adic', 'langlands parameter', 'local langlands', 'supercuspidal representations', 'adic groups']","['Local Langlands Correspondence for Even Orthogonal Groups via Theta\n Lifts Using theta correspondence, we obtain a classification of irreducible\nrepresentations of an arbitrary even orthogonal group (i.e. the local Langlands\ncorrespondence) by deducing it from the local Langlands correspondence for\nsymplectic groups due to Arthur. Moreover,we show that our classifications\ncoincide with the local Langlands correspondence established by Arthur and\nformulated precisely by Atobe-Gan for quasi-split even orthogonal groups.\n', ""Functoriality for supercuspidal L-packets Kaletha constructs $L$-packets for supercuspidal $L$-parameters of tame\n$p$-adic groups. These $L$-packets consist entirely of supercuspidal\nrepresentations, which are explicitly described. Using the explicit\ndescriptions, we show that Kaletha's $L$-packets satisfy a fundamental\nfunctoriality property desired for the Local Langlands Correspondence.\n"", ""Local Langlands correspondence for regular supercuspidal representations\n of GL(n) In this paper, we prove the coincidence of Kaletha's recent construction of\nthe local Langlands correspondence for regular supercuspidal representations\nwith Harris--Taylor's one in the case of general linear groups. The keys are\nBushnell--Henniart's essentially tame local Langlands correspondence and Tam's\nresult on Bushnell--Henniart's rectifiers. By combining them, our problem is\nreduced to an elementary root-theoretic computation on the difference between\nKaletha's and Tam's $\\chi$-data.\n""]","[('local langlands correspondence', 0.6997964978218079), ('langlands correspondence', 0.699392557144165), ('langlands conjecture', 0.5890706777572632), ('geometric langlands', 0.5528521537780762), ('langlands parameters', 0.533141016960144), ('representations adic', 0.5308319926261902), ('langlands parameter', 0.5164182782173157), ('local langlands', 0.5107206702232361), ('supercuspidal representations', 0.4911685883998871), ('adic groups', 0.48800602555274963)]" 56,56,362,56_server queue_single server queue_server queues_queueing systems,"['server queue', 'single server queue', 'server queues', 'queueing systems', 'queueing system', 'queueing', 'queue lengths', 'queueing networks', 'queue length', 'queue']","[""Randomized Routing to Remote Queues We study load balancing for a queueing system where parallel stations are\ndistant from customers. In the presence of traveling delays, the\njoin-the-shortest-queue (JSQ) policy induces queue length oscillations and\nprolongs the mean waiting time. A variant of the JSQ policy, dubbed the\nrandomized join-the-shortest-queue (RJSQ) policy, is devised to mitigate the\noscillation phenomenon. By the RJSQ policy, customers are sent to each station\nwith a probability approximately proportional to its service capacity; only a\nsmall fraction of customers are purposely routed to the shortest queue. The\nadditional probability of routing a customer to the shortest queue, referred to\nas the balancing fraction, dictates the policy's performance. When the\nbalancing fraction is within a certain range, load imbalance between the\nstations is negligible in heavy traffic, so that complete resource pooling is\nachieved. We specify the optimal order of magnitude for the balancing fraction,\nby which heuristic formulas are proposed to fine-tune the RJSQ policy. A joint\nproblem of capacity planning and load balancing is considered for\ngeographically separated stations. With well planned service capacities, the\nRJSQ policy sends all but a small fraction of customers to the nearest\nstations, rendering the system asymptotically equivalent to an aggregated\nsingle-server system with all customers having minimum traveling delays. If\neach customer's service requirement does not depend on the station, the RJSQ\npolicy is asymptotically optimal for reducing workload.\n"", 'Zero Queueing for Multi-Server Jobs Cloud computing today is dominated by multi-server jobs. These are jobs that\nrequest multiple servers simultaneously and hold onto all of these servers for\nthe duration of the job. Multi-server jobs add a lot of complexity to the\ntraditional one-job-per-server model: an arrival might not ""fit"" into the\navailable servers and might have to queue, blocking later arrivals and leaving\nservers idle. From a queueing perspective, almost nothing is understood about\nmulti-server job queueing systems; even understanding the exact stability\nregion is a very hard problem.\n In this paper, we investigate a multi-server job queueing model under scaling\nregimes where the number of servers in the system grows. Specifically, we\nconsider a system with multiple classes of jobs, where jobs from different\nclasses can request different numbers of servers and have different service\ntime distributions, and jobs are served in first-come-first-served order. The\nmulti-server job model opens up new scaling regimes where both the number of\nservers that a job needs and the system load scale with the total number of\nservers. Within these scaling regimes, we derive the first results on\nstability, queueing probability, and the transient analysis of the number of\njobs in the system for each class. In particular we derive sufficient\nconditions for zero queueing. Our analysis introduces a novel way of extracting\ninformation from the Lyapunov drift, which can be applicable to a broader scope\nof problems in queueing systems.\n', 'On the SRPT Scheduling Discipline in Many-Server Queues with Impatient\n Customers The shortest-remaining-processing-time (SRPT) scheduling policy has been\nextensively studied, for more than 50 years, in single-server queues with\ninfinitely patient jobs. Yet, much less is known about its performance in\nmultiserver queues. In this paper, we present the first theoretical analysis of\nSRPT in multiserver queues with abandonment. In particular, we consider the\nM/GI/s+GI queue and demonstrate that, in the many-sever overloaded regime,\nperformance in the SRPT queue is equivalent, asymptotically in steady state, to\na preemptive two-class priority queue where customers with short service times\n(below a threshold) are served without wait, and customers with long service\ntimes (above a threshold) eventually abandon without service. We prove that the\nSRPT discipline maximizes, asymptotically, the system throughput, among all\nscheduling disciplines. We also compare the performance of the SRPT policy to\nblind policies and study the effects of the patience-time and service-time\ndistributions.\n']","[('server queue', 0.6747714281082153), ('single server queue', 0.6666238307952881), ('server queues', 0.663223922252655), ('queueing systems', 0.6590560078620911), ('queueing system', 0.6336919665336609), ('queueing', 0.6335346698760986), ('queue lengths', 0.6286018490791321), ('queueing networks', 0.6209797263145447), ('queue length', 0.6142797470092773), ('queue', 0.6024184823036194)]" 57,57,358,57_large cardinal_large cardinals_inaccessible cardinal_compact cardinal,"['large cardinal', 'large cardinals', 'inaccessible cardinal', 'compact cardinal', 'forcing notions', 'regular cardinals', 'cardinal characteristics', 'cardinal', 'forcings', 'proper forcing']","['Large cardinals need not be large in HOD We prove that large cardinals need not generally exhibit their large cardinal\nnature in HOD. For example, a supercompact cardinal $\\kappa$ need not be weakly\ncompact in HOD, and there can be a proper class of supercompact cardinals in\n$V$, none of them weakly compact in HOD, with no supercompact cardinals in HOD.\nSimilar results hold for many other types of large cardinals, such as\nmeasurable and strong cardinals.\n', 'Large cardinals, structural reflection, and the HOD Conjecture We introduce exacting cardinals and a strengthening of these, ultraexacting\ncardinals. These are natural large cardinals defined equivalently as weak forms\nof rank-Berkeley cardinals, strong forms of J\\\'onsson cardinals, or in terms of\nprinciples of structural reflection. However, they challenge commonly held\nintuition on strong axioms of infinity. We prove that ultraexacting cardinals\nare consistent with Zermelo-Fraenkel Set Theory with the Axiom of Choice (ZFC)\nrelative to the existence of an I0 embedding. However, the existence of an\nultraexacting cardinal below a measurable cardinal implies the consistency of\nZFC with a proper class of I0 embeddings, thus challenging the\nlinear-incremental picture of the large cardinal hierarchy. We show that the\nexistence of an exacting cardinal implies that V is not equal to HOD (G\\""odel\'s\nuniverse of Hereditarily Ordinal Definable sets), showing that these cardinals\nsurpass the current hierarchy of large cardinals consistent with ZFC. We prove\nthat the consistency of ZFC with an exacting cardinal above an extendible\ncardinal refutes Woodin\'s HOD Conjecture and Ultimate-L Conjecture. Finally, we\nestablish the consistency of ZFC with the existence of an exacting cardinal\nabove an extendible cardinal from the consistency of ZF with certain large\ncardinals beyond choice.\n', 'Forcing with overlapping supercompact extenders We build a supercompact version of the forcing defined in \\cite{gitik2019}.\nFor each singular cardinal in the ground model with any fixed cofinality, which\nis a limit of supercompact cardinals, it is possible to force so that the size\nof the powerset of the singular cardinal is arbitrarily large, while preserving\nthe singular cardinal. An important feature of this forcing is that it is\npossible to define the forcing so that the successor of the singular cardinal\nis collapsed, but all the cardinals above it are preserved.\n']","[('large cardinal', 0.5831047296524048), ('large cardinals', 0.5718084573745728), ('inaccessible cardinal', 0.5606800317764282), ('compact cardinal', 0.5526294112205505), ('forcing notions', 0.5444687008857727), ('regular cardinals', 0.5443752408027649), ('cardinal characteristics', 0.5298759341239929), ('cardinal', 0.48094403743743896), ('forcings', 0.4761696457862854), ('proper forcing', 0.4759313762187958)]" 58,58,356,58_gromov witten invariants_witten invariants_gromov witten theory_vafa witten invariants,"['gromov witten invariants', 'witten invariants', 'gromov witten theory', 'vafa witten invariants', 'genus gromov witten', 'toric varieties', 'relative gromov witten', 'witten theory', 'calabi yau manifolds', 'gromov witten']","['Gromov--Witten invariants with naive tangency conditions We introduce Gromov-Witten invariants with naive tangency conditions at the\nmarked points of the source curve. We then establish an explicit formula which\nexpresses Gromov-Witten invariants with naive tangency conditions in terms of\ndescendent Gromov-Witten invariants. Several examples of genus zero\nGromov-Witten invariants with naive tangencies are computed in the case of\ncurves and surfaces. In particular, the counts of rational curves naively\ntangent to an anticanonical divisor on a del Pezzo surface are studied, and via\nmirror symmetry, we obtain a relation to the local Gromov-Witten invariants.\n', 'Gromov-Witten Invariants and Mirror Symmetry For Non-Fano Varieties Via\n Tropical Disks Under mirror symmetry a non-Fano variety $X$ corresponds to an instanton\ncorrected Hori-Vafa potential $W$. The classical period of $W$ equals the\nregularized quantum period of $X$, which is a generating function for\ndescendant Gromov-Witten invariants. These periods define closed mirror maps\nrelating complex with symplectic parameters and open mirror maps relating\ncoordinates on the mirror curves.\n We interpret the corrections to $W$ by broken lines in a scattering diagram,\nso that $W$ is the primitive theta function $\\vartheta_1$. We show that, after\nwall crossing to infinity and application of the closed mirror map,\n$W=\\vartheta_1$ is equal to the open mirror map. By tropical correspondence,\n$\\vartheta_1$ is a generating function for $2$-marked logarithmic Gromov-Witten\ninvariants, which are algebraic analogues of counts of Maslov index $2$ disks.\nThis generalizes the predictions of mirror symmetry to the non-Fano case.\n', 'Relative Gromov-Witten invariants and the enumerative meaning of mirror\n maps for toric Calabi-Yau orbifolds We provide an enumerative meaning of the mirror maps for toric Calabi-Yau\norbifolds in terms of relative Gromov-Witten invariants of the toric\ncompactifications. As a consequence, we obtain an equality between relative\nGromov-Witten invariants and open Gromov-Witten invariants. Therefore, the\ninstanton corrected mirrors for toric Calabi-Yau orbifolds can be constructed\nusing relative Gromov-Witten invariants.\n']","[('gromov witten invariants', 0.8194909691810608), ('witten invariants', 0.7346245050430298), ('gromov witten theory', 0.6893924474716187), ('vafa witten invariants', 0.6826517581939697), ('genus gromov witten', 0.6084805130958557), ('toric varieties', 0.5856683254241943), ('relative gromov witten', 0.5819631814956665), ('witten theory', 0.5595704913139343), ('calabi yau manifolds', 0.49897950887680054), ('gromov witten', 0.49778592586517334)]" 59,59,355,59_wright fisher diffusion_population dynamics_fisher diffusion_population genetics,"['wright fisher diffusion', 'population dynamics', 'fisher diffusion', 'population genetics', 'evolutionary dynamics', 'evolution population', 'natural selection', 'populations', 'evolutionary', 'structured population']","['Active information requirements for fixation on the Wright-Fisher model\n of population genetics In the context of population genetics, active information can be extended to\nmeasure the change of information of a given event (e.g., fixation of an\nallele) from a neutral model in which only genetic drift is taken into account\nto a non-neutral model that includes other sources of frequency variation\n(e.g., selection and mutation). In this paper we illustrate active information\nin population genetics through the Wright-Fisher model.\n', 'A dual process for the coupled Wright-Fisher diffusion The coupled Wright-Fisher diffusion is a multi-dimensional Wright-Fisher\ndiffusion for multi-locus and multi-allelic genetic frequencies, expressed as\nthe strong solution to a system of stochastic differential equations that are\ncoupled in the drift, where the pairwise interaction among loci is modelled by\nan inter-locus selection. In this paper, an ancestral process, which is dual to\nthe coupled Wright-Fisher diffusion, is derived. The dual process corresponds\nto the block counting process of coupled ancestral selection graphs, one for\neach locus. Jumps of the dual process arise from coalescence, mutation,\nsingle-branching, which occur at one locus at the time, and double-branching,\nwhich occur simultaneously at two loci. The coalescence and mutation rates have\nthe typical structure of the transition rates of the Kingman coalescent\nprocess. The single-branching rate not only contains the one-locus selection\nparameters in a form that generalises the rates of an ancestral selection\ngraph, but it also contains the two-locus selection parameters to include the\neffect of the pairwise interaction on the single loci. The double-branching\nrate reflects the particular structure of pairwise selection interactions of\nthe coupled Wright-Fisher diffusion. Moreover, in the special case of two loci,\ntwo alleles, with selection and parent independent mutation, the stationary\ndensity for the coupled Wright-Fisher diffusion and the transition rates of the\ndual process are obtained in an explicit form.\n', 'The Wright-Fisher model with efficiency In populations competing for resources, it is natural to ask whether\nconsuming fewer resources provides any selective advantage. To answer this\nquestion, we propose a Wright- Fisher model with two types of individuals: the\ninefficient individuals, those who need more resources to reproduce and can\nhave a higher growth rate, and the efficient individuals. In this model, the\ntotal amount of resource N, is fixed, and the population size varies randomly\ndepending on the number of efficient individuals. We show that, as N increases,\nthe frequency process of efficient individuals converges to a diffusion which\nis a generalisation of the Wright- Fisher diffusion with selection. The\ngenealogy of this model is given by a branching-coalescing process that we call\nthe Ancestral Selection/Efficiency Graph, and that is an extension of the\nAncestral Selection Graph (Krone and Neuhauser (1997a), Krone and Neuhauser\n(1997b)). The main contribution of this paper is that, in evolving populations,\ninefficiency can arise as a promoter of selective advantage and not necessarily\nas a trade-off.\n']","[('wright fisher diffusion', 0.6031842231750488), ('population dynamics', 0.5601502060890198), ('fisher diffusion', 0.5309566855430603), ('population genetics', 0.5290646553039551), ('evolutionary dynamics', 0.5201376676559448), ('evolution population', 0.514836847782135), ('natural selection', 0.463375061750412), ('populations', 0.4594831168651581), ('evolutionary', 0.43851935863494873), ('structured population', 0.4313550293445587)]" 60,60,344,60_mean field games_mean field game_mean field equilibrium_mean field control,"['mean field games', 'mean field game', 'mean field equilibrium', 'mean field control', 'games mean field', 'deterministic mean field', 'differential games', 'stationary mean field', 'state mean field', 'nash equilibria']","['Master equations for finite state mean field games with nonlinear\n activations We formulate a class of mean field games on a finite state space with\nvariational principles resembling those in continuous-state mean field games.\nWe construct a controlled continuity equation featuring a nonlinear activation\nfunction on graphs induced by finite-state reversible continuous time Markov\nchains. In these graphs, each edge is weighted by the transition probability\nand invariant measure of the original process. Using these controlled dynamics\non the graph and the dynamic programming principle for the value function, we\nderive several key components: the mean field game systems, the functional\nHamilton-Jacobi equations, and the master equations on a finite probability\nspace for potential mean field games. The existence and uniqueness of solutions\nto the potential mean field game system are ensured through a convex\noptimization reformulation in terms of the density-flux pair. We also derive\nvariational principles for the master equations of both non-potential games and\nmixed games on a continuous state space. Finally, we offer several concrete\nexamples of discrete mean field game dynamics on a two-point space, complete\nwith closed-formula solutions. These examples include discrete Wasserstein\ndistances, mean field planning, and potential mean field games.\n', 'Mean Field Games of Controls: Propagation of Monotonicities The theory of Mean Field Game of Controls considers a class of mean field\ngames where the interaction is through the joint distribution of the state and\ncontrol. It is well known that, for standard mean field games, certain\nmonotonicity condition is crucial to guarantee the uniqueness of mean field\nequilibria and then the global wellposedness for master equations. In the\nliterature, the monotonicity condition could be the Lasry-Lions monotonicity,\nthe displacement monotonicity, or the anti-monotonicity conditions. In this\npaper, we investigate all these three types of monotonicity conditions for Mean\nField Games of Controls and show their propagation along the solutions to the\nmaster equations with common noises. In particular, we extend the displacement\nmonotonicity to semi-monotonicity, whose propagation result is new even for\nstandard mean field games. This is the first step towards the global\nwellposedness theory for master equations of Mean Field Games of Controls.\n', 'Linear-Quadratic Mean Field Games of Controls with Non-Monotone Data In this paper, we study a class of linear-quadratic (LQ) mean field games of\ncontrols with common noises and their corresponding $N$-player games. The\ntheory of mean field game of controls considers a class of mean field games\nwhere the interaction is via the joint law of both the state and control. By\nthe stochastic maximum principle, we first analyze the limiting behavior of the\nrepresentative player and obtain his/her optimal control in a feedback form\nwith the given distributional flow of the population and its control. The mean\nfield equilibrium is determined by the Nash certainty equivalence (NCE) system.\nThanks to the common noise, we do not require any monotonicity conditions for\nthe solvability of the NCE system. We also study the master equation arising\nfrom LQ mean field games of controls, which is a finite-dimensional\nsecond-order parabolic equation. It can be shown that the master equation\nadmits a unique classical solution over an arbitrary time horizon without any\nmonotonicity conditions. Beyond that, we can solve the $N$-player games\ndirectly by further assuming the non-degeneracy of the idiosyncratic noises. As\nbyproducts, we prove the quantitative convergence results from the $N$-player\ngame to the mean field game and the propagation of chaos property for the\nrelated optimal trajectories.\n']","[('mean field games', 0.6479817628860474), ('mean field game', 0.6373040080070496), ('mean field equilibrium', 0.6156010031700134), ('mean field control', 0.5613215565681458), ('games mean field', 0.5479129552841187), ('deterministic mean field', 0.5356229543685913), ('differential games', 0.5031536817550659), ('stationary mean field', 0.495622456073761), ('state mean field', 0.47456467151641846), ('nash equilibria', 0.47352883219718933)]" 61,61,340,61_angled artin groups_angled artin group_artin groups_artin group,"['angled artin groups', 'angled artin group', 'artin groups', 'artin group', 'relatively hyperbolic groups', 'hyperbolic groups', 'groups hyperbolic', 'graphs groups', 'parabolic subgroups', 'hyperbolic group']","['Droms Theorems for twisted right-angled Artin groups We characterize twisted right-angled Artin groups whose finitely generated\nsubgroups are also twisted right-angled Artin groups. Additionally, we give a\nclassification of coherence within this class of groups in terms of the\ndefining graph. Furthermore, we provide a solution to the isomorphism problem\nfor a notable subclass of these groups.\n', 'Uniqueness of quasi-roots in right-angled Artin Groups We introduce the notion of quasi-roots and study their uniqueness in\nright-angled Artin groups.\n', 'Around subgroups of Artin groups: derived subgroups and acylindrical\n hyperbolicity in the even FC-case We generalize to (certain) Artin groups some results previously known for\nright-angled Artin groups (RAAGs). First, we generalize a result by Droms, B.\nServatius, and H. Servatius, and prove that the derived subgroup of an Artin\ngroup is free if and only if the group is coherent. Second, coherent Artin\ngroups over non complete graphs split as free amalgamated products along free\nabelian subgroups, and we extend to arbitrary Artin groups admitting such a\nsplitting a recent result by Casals-Ruiz and the first author on finitely\ngenerated normal subgroups of RAAGs. Finally, we use splittings of even Artin\ngroups of FC-type to generalize results of Minasyan and Osin on acylindrical\nhyperbolicity of their subgroups.\n']","[('angled artin groups', 0.7894687056541443), ('angled artin group', 0.7589459419250488), ('artin groups', 0.7222594618797302), ('artin group', 0.633009672164917), ('relatively hyperbolic groups', 0.5826070308685303), ('hyperbolic groups', 0.5629180669784546), ('groups hyperbolic', 0.5590132474899292), ('graphs groups', 0.5315252542495728), ('parabolic subgroups', 0.5139179229736328), ('hyperbolic group', 0.5001447200775146)]" 62,62,338,62_gradient descent training_gradient descent_stochastic gradient descent_relu neural networks,"['gradient descent training', 'gradient descent', 'stochastic gradient descent', 'relu neural networks', 'relu networks', 'shallow neural networks', 'gradient flow', 'layer neural networks', 'linear neural networks', 'layer neural']","['Implicit Bias of Gradient Descent for Two-layer ReLU and Leaky ReLU\n Networks on Nearly-orthogonal Data The implicit bias towards solutions with favorable properties is believed to\nbe a key reason why neural networks trained by gradient-based optimization can\ngeneralize well. While the implicit bias of gradient flow has been widely\nstudied for homogeneous neural networks (including ReLU and leaky ReLU\nnetworks), the implicit bias of gradient descent is currently only understood\nfor smooth neural networks. Therefore, implicit bias in non-smooth neural\nnetworks trained by gradient descent remains an open question. In this paper,\nwe aim to answer this question by studying the implicit bias of gradient\ndescent for training two-layer fully connected (leaky) ReLU neural networks. We\nshowed that when the training data are nearly-orthogonal, for leaky ReLU\nactivation function, gradient descent will find a network with a stable rank\nthat converges to $1$, whereas for ReLU activation function, gradient descent\nwill find a neural network with a stable rank that is upper bounded by a\nconstant. Additionally, we show that gradient descent will find a neural\nnetwork such that all the training data points have the same normalized margin\nasymptotically. Experiments on both synthetic and real data backup our\ntheoretical findings.\n', 'On the existence of infinitely many realization functions of non-global\n local minima in the training of artificial neural networks with ReLU\n activation Gradient descent (GD) type optimization schemes are the standard instruments\nto train fully connected feedforward artificial neural networks (ANNs) with\nrectified linear unit (ReLU) activation and can be considered as temporal\ndiscretizations of solutions of gradient flow (GF) differential equations. It\nhas recently been proved that the risk of every bounded GF trajectory converges\nin the training of ANNs with one hidden layer and ReLU activation to the risk\nof a critical point. Taking this into account it is one of the key research\nissues in the mathematical convergence analysis of GF trajectories and GD type\noptimization schemes, respectively, to study sufficient and necessary\nconditions for critical points of the risk function and, thereby, to obtain an\nunderstanding about the appearance of critical points in dependence of the\nproblem parameters such as the target function. In the first main result of\nthis work we prove in the training of ANNs with one hidden layer and ReLU\nactivation that for every $ a, b \\in \\mathbb{R} $ with $ a < b $ and every\narbitrarily large $ \\delta > 0 $ we have that there exists a Lipschitz\ncontinuous target function $ f \\colon [a,b] \\to \\mathbb{R} $ such that for\nevery number $ H > 1 $ of neurons on the hidden layer we have that the risk\nfunction has uncountably many different realization functions of non-global\nlocal minimum points whose risks are strictly larger than the sum of the risk\nof the global minimum points and the arbitrarily large $ \\delta $. In the\nsecond main result of this work we show in the training of ANNs with one hidden\nlayer and ReLU activation in the special situation where there is only one\nneuron on the hidden layer and where the target function is continuous and\npiecewise polynomial that there exist at most finitely many different\nrealization functions of critical points.\n', 'A Generalized Neural Tangent Kernel Analysis for Two-layer Neural\n Networks A recent breakthrough in deep learning theory shows that the training of\nover-parameterized deep neural networks can be characterized by a kernel\nfunction called \\textit{neural tangent kernel} (NTK). However, it is known that\nthis type of results does not perfectly match the practice, as NTK-based\nanalysis requires the network weights to stay very close to their\ninitialization throughout training, and cannot handle regularizers or gradient\nnoises. In this paper, we provide a generalized neural tangent kernel analysis\nand show that noisy gradient descent with weight decay can still exhibit a\n""kernel-like"" behavior. This implies that the training loss converges linearly\nup to a certain accuracy. We also establish a novel generalization error bound\nfor two-layer neural networks trained by noisy gradient descent with weight\ndecay.\n']","[('gradient descent training', 0.6504259705543518), ('gradient descent', 0.6143527626991272), ('stochastic gradient descent', 0.5933504104614258), ('relu neural networks', 0.5583204030990601), ('relu networks', 0.5495492219924927), ('shallow neural networks', 0.5378432869911194), ('gradient flow', 0.5105582475662231), ('layer neural networks', 0.5077417492866516), ('linear neural networks', 0.5045082569122314), ('layer neural', 0.49329453706741333)]" 63,63,337,63_vertex operator algebras_vertex operator algebra_vertex algebras_affine vertex algebras,"['vertex operator algebras', 'vertex operator algebra', 'vertex algebras', 'affine vertex algebras', 'vertex algebra', 'vertex operator', 'operator algebras', 'lattice vertex', 'affine algebras', 'operator algebra']","['Representations of the orbifold of parafermion vertex operator algebra\n $K(osp(1|2),k)$ This paper is about the orbifold theory of parafermion vertex operator\nalgebras $K(osp(1|2),k)$ associated to the affine vertex operator superalgebra\n$L_{\\widehat{osp(1|2)}}(k,0)$ with any positive integer $k$. Among the main\nresults, we classify the irreducible modules for the orbifold of parafermion\nvertex operator algebra $K(osp(1|2),k)$.\n', '$\\mathbb{Z}_k$-code vertex operator algebras We introduce a simple, self-dual, rational, and $C_2$-cofinite vertex\noperator algebra of CFT-type associated with a $\\mathbb{Z}_k$-code for $k \\ge\n2$ based on the $\\mathbb{Z}_k$-symmetry among the simple current modules for\nthe parafermion vertex operator algebra $K(\\mathfrak{sl}_2,k)$. We show that it\nis naturally realized as the commutant of a certain subalgebra in a lattice\nvertex operator algebra. Furthermore, we construct all the irreducible modules\ninside a module for the lattice vertex operator algebra.\n', 'Cliffold algebras, modular Virasoro vertex operator algebras and\n Z[1/2]-forms This paper consists of two parts: (1) Using a Z[1/2]-form of Virasoro vertex\noperator algebra L(1/2,0) with central charge 1/2, we obtain a modular vertex\noperator algebra over any field F of finite characteristic different from 2. We\ndetermine the generators and classify the irreducible modules for this vertex\noperator algebra. (2) We investigate modular framed vertex operator algebras.\nIn particular, the rationality of modular framed vertex operator algebras is\nestablished. For a modular code vertex operator algebra, the irreducible\nmodules are constructed and classified. Moreover, a Z[1/2]-form for any framed\nvertex operator algebra over complex field C is constructed. As a result, one\ncan obtain a modular framed vertex operator algebra from any framed vertex\noperator algebra over C.\n']","[('vertex operator algebras', 0.7292448282241821), ('vertex operator algebra', 0.695993959903717), ('vertex algebras', 0.653117299079895), ('affine vertex algebras', 0.6198201179504395), ('vertex algebra', 0.596803605556488), ('vertex operator', 0.5420979857444763), ('operator algebras', 0.4913882613182068), ('lattice vertex', 0.4626636803150177), ('affine algebras', 0.44809532165527344), ('operator algebra', 0.4354516565799713)]" 64,64,333,64_topological phases matter_symmetry topological_symmetry protected topological_topological phases,"['topological phases matter', 'symmetry topological', 'symmetry protected topological', 'topological phases', 'generalized symmetries', 'global symmetry', 'topological field theory', 'protected topological phases', 'topological defects', 'topological quantum field']","['ICTP Lectures on (Non-)Invertible Generalized Symmetries What comprises a global symmetry of a Quantum Field Theory (QFT) has been\nvastly expanded in the past 10 years to include not only symmetries acting on\nhigher-dimensional defects, but also most recently symmetries which do not have\nan inverse. The principle that enables this generalization is the\nidentification of symmetries with topological defects in the QFT. In these\nlectures, we provide an introduction to generalized symmetries, with a focus on\nnon-invertible symmetries. We begin with a brief overview of invertible\ngeneralized symmetries, including higher-form and higher-group symmetries, and\nthen move on to non-invertible symmetries. The main idea that underlies many\nconstructions of non-invertible symmetries is that of stacking a QFT with\ntopological QFTs (TQFTs) and then gauging a diagonal non-anomalous global\nsymmetry. The TQFTs become topological defects in the gauged theory called\n(twisted) theta defects and comprise a large class of non-invertible symmetries\nincluding condensation defects, self-duality defects, and non-invertible\nsymmetries of gauge theories with disconnected gauge groups. We will explain\nthe general principle and provide numerous concrete examples. Following this\nextensive characterization of symmetry generators, we then discuss their action\non higher-charges, i.e. extended physical operators. As we will explain, even\nfor invertible higher-form symmetries these are not only representations of the\n$p$-form symmetry group, but more generally what are called\nhigher-representations. Finally, we give an introduction to the Symmetry\nTopological Field Theory (SymTFT) and its utility in characterizing symmetries,\ntheir gauging and generalized charges.\n Lectures prepared for the ICTP Trieste Spring School, April 2023.\n', 'Gapped Phases with Non-Invertible Symmetries: (1+1)d We propose a general framework to characterize gapped infra-red (IR) phases\nof theories with non-invertible (or categorical) symmetries. In this paper we\nfocus on (1+1)d gapped phases with fusion category symmetries. The approach\nthat we propose uses the Symmetry Topological Field Theory (SymTFT) as a key\ninput: associated to a field theory in d spacetime dimensions, the SymTFT lives\nin one dimension higher and admits a gapped boundary, which realizes the\ncategorical symmetries. It also admits a second, physical, boundary, which is\ngenerically not gapped. Upon interval compactification of the SymTFT by\ncolliding the gapped and physical boundaries, we regain the original theory. In\nthis paper, we realize gapped symmetric phases by choosing the physical\nboundary to be a gapped boundary condition as well. This set-up provides\ncomputational power to determine the number of vacua, the symmetry breaking\npattern, and the action of the symmetry on the vacua. The SymTFT also\nmanifestly encodes the order parameters for these gapped phases, thus providing\na generalized, categorical Landau paradigm for (1+1)d gapped phases. We find\nthat for non-invertible symmetries the order parameters involve multiplets\ncontaining both untwisted and twisted sector local operators, and hence can be\ninterpreted as mixtures of conventional and string order parameters. We also\nobserve that spontaneous breaking of non-invertible symmetries can lead to\nvacua that are physically distinguishable: unlike the standard symmetries\ndescribed by groups, non-invertible symmetries can have different actions on\ndifferent vacua of an irreducible gapped phase. This leads to the presence of\nrelative Euler terms between physically distinct vacua. We also provide a\nmathematical description of symmetric gapped phases as 2-functors from\ndelooping of fusion category characterizing the symmetry to Euler completion of\n2-vector spaces.\n', 'Higher Gauging and Non-invertible Condensation Defects We discuss invertible and non-invertible topological condensation defects\narising from gauging a discrete higher-form symmetry on a higher codimensional\nmanifold in spacetime, which we define as higher gauging. A $q$-form symmetry\nis called $p$-gaugeable if it can be gauged on a codimension-$p$ manifold in\nspacetime. We focus on 1-gaugeable 1-form symmetries in general 2+1d QFT, and\ngauge them on a surface in spacetime. The universal fusion rules of the\nresulting invertible and non-invertible condensation surfaces are determined.\nIn the special case of 2+1d TQFT, every (invertible and non-invertible) 0-form\nglobal symmetry, including the $\\mathbb{Z}_2$ electromagnetic symmetry of the\n$\\mathbb{Z}_2$ gauge theory, is realized from higher gauging. We further\ncompute the fusion rules between the surfaces, the bulk lines, and lines that\nonly live on the surfaces, determining some of the most basic data for the\nunderlying fusion 2-category. We emphasize that the fusion ""coefficients"" in\nthese non-invertible fusion rules are generally not numbers, but rather 1+1d\nTQFTs. Finally, we discuss examples of non-invertible symmetries in\nnon-topological 2+1d QFTs such as the free $U(1)$ Maxwell theory and QED.\n']","[('topological phases matter', 0.6067975163459778), ('symmetry topological', 0.5943744778633118), ('symmetry protected topological', 0.5859113931655884), ('topological phases', 0.5685414671897888), ('generalized symmetries', 0.563668966293335), ('global symmetry', 0.5357531905174255), ('topological field theory', 0.5302693843841553), ('protected topological phases', 0.5172156691551208), ('topological defects', 0.5170701742172241), ('topological quantum field', 0.5120477676391602)]" 65,65,328,65_finite element methods_elliptic interface problems_virtual element methods_elliptic interface,"['finite element methods', 'elliptic interface problems', 'virtual element methods', 'elliptic interface', 'immersed finite element', 'galerkin finite element', 'element methods', 'discontinuous galerkin', 'galerkin finite', 'adaptive finite element']","['An immersed Raviart-Thomas mixed finite element method for elliptic\n interface problems on unfitted meshes This paper presents a lowest-order immersed Raviart-Thomas mixed triangular\nfinite element method for solving elliptic interface problems on unfitted\nmeshes independent of the interface. In order to achieve the optimal\nconvergence rates on unfitted meshes, an immersed finite element finite (IFE)\nis constructed by modifying the traditional Raviart-Thomas element. Some\nimportant properties are derived including the unisolvence of IFE basis\nfunctions, the optimal approximation capabilities of the IFE space and the\ncorresponding commuting digram. Optimal error estimates are rigorously proved\nfor the mixed IFE method and some numerical examples are also provided to\nvalidate the theoretical analysis.\n', 'Virtual Element Methods Without Extrinsic Stabilization Virtual element methods (VEMs) without extrinsic stabilization in arbitrary\ndegree of polynomial are developed for second order elliptic problems,\nincluding a nonconforming VEM and a conforming VEM in arbitrary dimension. The\nkey is to construct local $H(\\textrm{div})$-conforming macro finite element\nspaces such that the associated $L^2$ projection of the gradient of virtual\nelement functions is computable, and the $L^2$ projector has a uniform lower\nbound on the gradient of virtual element function spaces in $L^2$ norm. Optimal\nerror estimates are derived for these VEMs. Numerical experiments are provided\nto test the VEMs without extrinsic stabilization.\n', 'Nonconforming virtual elements for the biharmonic equation with Morley\n degrees of freedom on polygonal meshes The lowest-order nonconforming virtual element extends the Morley triangular\nelement to polygons for the approximation of the weak solution $u\\in\nV:=H^2_0(\\Omega)$ to the biharmonic equation. The abstract framework allows\n(even a mixture of) two examples of the local discrete spaces $V_h(P)$ and a\nsmoother allows rough source terms $F\\in V^*=H^{-2}(\\Omega)$. The a priori and\na posteriori error analysis in this paper circumvents any trace of second\nderivatives by some computable conforming companion operator $J:V_h\\to V$ from\nthe nonconforming virtual element space $V_h$. The operator $J$ is a\nright-inverse of the interpolation operator and leads to optimal error\nestimates in piecewise Sobolev norms without any additional regularity\nassumptions on $u\\in V$. As a smoother the companion operator modifies the\ndiscrete right-hand side and then allows a quasi-best approximation. An\nexplicit residual-based a posteriori error estimator is reliable and efficient\nup to data oscillations. Numerical examples display the predicted empirical\nconvergence rates for uniform and optimal convergence rates for adaptive\nmesh-refinement.\n']","[('finite element methods', 0.681123673915863), ('elliptic interface problems', 0.6197921633720398), ('virtual element methods', 0.5843571424484253), ('elliptic interface', 0.5816698670387268), ('immersed finite element', 0.5724597573280334), ('galerkin finite element', 0.570099949836731), ('element methods', 0.5088618993759155), ('discontinuous galerkin', 0.4943977892398834), ('galerkin finite', 0.4883657395839691), ('adaptive finite element', 0.47028234601020813)]" 66,66,328,66_cohen macaulay modules_macaulay modules_maximal cohen macaulay_cohen macaulay ring,"['cohen macaulay modules', 'macaulay modules', 'maximal cohen macaulay', 'cohen macaulay ring', 'macaulay rings', 'gorenstein rings', 'macaulay ring', 'local rings', 'associated graded ring', 'noetherian local ring']","['Remarks on the Small Cohen-Macaulay conjecture and new instances of\n maximal Cohen-Macaulay modules We show that any quasi-Gorenstein deformation of a $3$-dimensional\nquasi-Gorenstein Buchsbaum local ring with $I$-invariant $1$ admits a maximal\nCohen-Macaulay module, provided it is a quotient of a Gorenstein ring. Such a\nclass of rings includes two instances of unique factorization domains\nconstructed by Marcel-Schenzel and by Imtiaz-Schenzel, respectively. Apart from\nthis result, motivated by the small Cohen-Macaulay conjecture in prime\ncharacteristic, we examine a question about when the Frobenius pushforward\n$F^e_*(M)$ of an $R$-module $M$ comprises a maximal Cohen-Macaulay direct\nsummand in both local and graded cases.\n', 'Some properties of ideals in Cohen-Macaulay local rings For a Cohen-Macaulay local ring $(R,\\mathfrak{m})$ with canonical module, we\nstudy how relations between $\\text{index}(R)$ and $\\text{g}\\ell\\ell(R)$ and\nbetween $\\text{index}(R)$ and $e(R)$ are preserved when factoring out regular\nsequences and localizing at prime ideals. We then give conditions for when\nideals in a one-dimensional Cohen-Macaulay local ring are Elias and Burch, and\nuse these conditions to study the relationship between Elias, Burch, and Ulrich\nideals.\n', 'Representation-theoretic properties of balanced big Cohen-Macaulay\n modules Let $(R, \\m, k)$ be a complete Cohen-Macaulay local ring. In this paper, we\nassign a numerical invariant, for any balanced big Cohen-Macaulay module,\ncalled $\\uh$-length. Among other results, it is proved that, for a given\nbalanced big Cohen-Macaulay $R$-module $M$ with an $\\m$-primary cohomological\nannihilator, if there is a bound on the $\\uh$-length of all modules appearing\nin $\\CM$-support of $M$, then it is fully decomposable, i.e. it is a direct sum\nof finitely generated modules. While the first Brauer-Thrall conjecture fails\nin general by a counterexample of Dieterich dealing with multiplicities to\nmeasure the size of maximal Cohen-Macaulay modules, our formalism establishes\nthe validity of the conjecture for complete Cohen-Macaulay local rings. In\naddition, the pure-semisimplicity of a subcategory of balanced big\nCohen-Macaulay modules is settled. Namely, it is shown that $R$ is of finite\n$\\CM$-type if and only if the category of all fully decomposable balanced big\nCohen-Macaulay modules is closed under kernels of epimorphisms. Finally, we\nexamine the mentioned results in the context of Cohen-Macaulay artin algebras\nadmitting a dualizing bimodule $\\omega$, as defined by Auslander and Reiten. It\nwill turn out that, $\\omega$-Gorenstein projective modules with bounded\n$\\CM$-support are fully decomposable. In particular, a Cohen-Macaulay algebra\n$\\Lambda$ is of finite $\\CM$-type if and only if every $\\omega$-Gorenstein\nprojective module is of finite $\\CM$-type, which generalizes a result of Chen\nfor Gorenstein algebras. Our main tool in the proof of results is\nGabriel-Roiter (co)measure, an invariant assigned to modules of finite length,\nand defined by Gabriel and Ringel. This, in fact, provides an application of\nthe Gabriel-Roiter (co)measure in the category of maximal Cohen-Macaulay\nmodules.\n']","[('cohen macaulay modules', 0.7622952461242676), ('macaulay modules', 0.7202548384666443), ('maximal cohen macaulay', 0.7034443616867065), ('cohen macaulay ring', 0.6679750084877014), ('macaulay rings', 0.6548298001289368), ('gorenstein rings', 0.6321535706520081), ('macaulay ring', 0.6214548945426941), ('local rings', 0.5760817527770996), ('associated graded ring', 0.573706865310669), ('noetherian local ring', 0.548713207244873)]" 67,67,328,67_solutions reaction diffusion_reaction diffusion equations_reaction diffusion systems_reaction diffusion advection,"['solutions reaction diffusion', 'reaction diffusion equations', 'reaction diffusion systems', 'reaction diffusion advection', 'reaction diffusion', 'diffusion equations', 'reaction diffusion system', 'bistable reaction diffusion', 'nonlocal diffusion', 'nonlinear diffusion']","[""Front location determines convergence rate to traveling waves We propose a novel method for establishing the convergence rates of solutions\nto reaction-diffusion equations to traveling waves. The analysis is based on\nthe study of the traveling wave shape defect function introduced in [2]. It\nturns out that the convergence rate is controlled by the distance between the\n``phantom front location'' for the shape defect function and the true front\nlocation of the solution. Curiously, the convergence to a traveling wave itself\nhas a pulled nature, regardless of whether the traveling wave is of pushed,\npulled, or pushmi-pullyu type. In addition to providing new results, this\napproach simplifies dramatically the proof in the Fisher-KPP case and gives a\nunified, succinct explanation for the known algebraic rates of convergence in\nthe Fisher-KPP case and the exponential rates in the pushed case.\n"", 'Asymptotic spreading for Fisher-KPP reaction-diffusion equations with\n heterogeneous shifting diffusivity We determine the asymptotic spreading speed of the solutions of a Fisher-KPP\nreaction-diffusion equation, starting from compactly supported initial data,\nwhen the diffusion coefficient is a fixed bounded monotone profile that is\nshifted at a given forcing speed and satisfies a general uniform ellipticity\ncondition. Depending on the monotony of the profile, we are able to\ncharacterize this spreading speed as a function of the forcing speed and the\ntwo linear spreading speeds associated to the asymptotic problems. Most\nnotably, when the profile of the coefficient diffusion is increasing we show\nthat there is an intermediate range for the forcing speed where spreading\nactually occurs at a speed which is larger than the linear speed associated\nwith the homogeneous state around the position of the front. We complement our\nstudy with the construction of strictly monotone traveling front solutions with\nstrong exponential decay near the unstable state when the profile of the\ncoefficient diffusion is decreasing and in the regime where the forcing speed\nis precisely the selected spreading speed.\n', 'Curved fronts of bistable reaction-diffusion equations in spatially\n periodic media In this paper, curved fronts are constructed for spatially periodic bistable\nreaction-diffusion equations under the a priori assumption that there exist\npulsating fronts in every direction. Some sufficient and some necessary\nconditions of the existence of curved fronts are given. Furthermore, the curved\nfront is proved to be unique and stable. Finally, a curved front with varying\ninterfaces is also constructed. Despite the effect of the spatial\nheterogeneity, the result shows the existence of curved fronts for spatially\nperiodic bistable reaction-diffusion equations which is known for the\nhomogeneous case.\n']","[('solutions reaction diffusion', 0.6905477643013), ('reaction diffusion equations', 0.6872763633728027), ('reaction diffusion systems', 0.6498636603355408), ('reaction diffusion advection', 0.6437410712242126), ('reaction diffusion', 0.6425260305404663), ('diffusion equations', 0.6250498294830322), ('reaction diffusion system', 0.6106491088867188), ('bistable reaction diffusion', 0.6090099811553955), ('nonlocal diffusion', 0.5994901061058044), ('nonlinear diffusion', 0.5994324088096619)]" 68,68,321,68_theory matroids_oriented matroids_matroid theory_matroids matroids,"['theory matroids', 'oriented matroids', 'matroid theory', 'matroids matroids', 'oriented matroid', 'regular matroids', 'valuated matroids', 'class matroids', 'matroids', 'matroidal']","['On the circuits of splitting matroids representable over GF(p) We extend the splitting operation from binary matroids (Raghunathan et al.,\n1998) to $p$- matroids, where $p$-matroids refer to matroids representable over\n$GF(p).$ We also characterize circuits, bases, and independent sets of the\nresulting matroid. Sufficient conditions to yield Eulerian $p$-matroids from\nEulerian and non-Eulerian $p$-matroids by applying the splitting operation are\nobtained. A class of connected $p$-matroids that gives connected $p$-matroids\nunder the splitting operation is characterized.\n', 'Orientable arithmetic matroids The theory of matroids has been generalized to oriented matroids and,\nrecently, to arithmetic matroids. We want to give a definition of ""oriented\narithmetic matroid"" and prove some properties like the ""uniqueness of\norientation"".\n', 'Generalized Splitting and element splitting operations on $p$-matroids In this paper, we define generalized splitting and element splitting\noperations on $p$-matroids. $p$-matroids are the matroids representable over\n$GF(p).$ The circuits and the bases of the new matroid are characterized in\nterms of circuits and bases of the original matroid, respectively. A class of\n$n$-connected $p$-matroids which gives n-connected $p$- matroids using the\ngeneralized splitting operation is also characterized. We also prove that\nconnectivity of $p$-matroid is preserved under element splitting operation.\nSufficient conditions to obtain Eulerian $p$-matroid from Eulerian $p$-matroid\nunder splitting and element splitting operations are provided.\n']","[('theory matroids', 0.7655490636825562), ('oriented matroids', 0.7105458378791809), ('matroid theory', 0.7103597521781921), ('matroids matroids', 0.6962224245071411), ('oriented matroid', 0.6881923079490662), ('regular matroids', 0.6753185391426086), ('valuated matroids', 0.658841073513031), ('class matroids', 0.6515287756919861), ('matroids', 0.6335408091545105), ('matroidal', 0.6334044933319092)]" 69,69,318,69_lasso estimator_lasso_group lasso_sparse linear regression,"['lasso estimator', 'lasso', 'group lasso', 'sparse linear regression', 'high dimensional regression', 'generalized linear models', 'sparse linear', 'inference high dimensional', 'dimensional linear regression', 'least squares estimator']","['A Comparison of Hamming Errors of Representative Variable Selection\n Methods Lasso is a celebrated method for variable selection in linear models, but it\nfaces challenges when the variables are moderately or strongly correlated. This\nmotivates alternative approaches such as using a non-convex penalty, adding a\nridge regularization, or conducting a post-Lasso thresholding. In this paper,\nwe compare Lasso with 5 other methods: Elastic net, SCAD, forward selection,\nthresholded Lasso, and forward backward selection. We measure their\nperformances theoretically by the expected Hamming error, assuming that the\nregression coefficients are iid drawn from a two-point mixture and that the\nGram matrix is block-wise diagonal. By deriving the rates of convergence of\nHamming errors and the phase diagrams, we obtain useful conclusions about the\npros and cons of different methods.\n', 'High-dimensional Linear Regression for Dependent Data with Applications\n to Nowcasting Recent research has focused on $\\ell_1$ penalized least squares (Lasso)\nestimators for high-dimensional linear regressions in which the number of\ncovariates $p$ is considerably larger than the sample size $n$. However, few\nstudies have examined the properties of the estimators when the errors and/or\nthe covariates are serially dependent. In this study, we investigate the\ntheoretical properties of the Lasso estimator for a linear regression with a\nrandom design and weak sparsity under serially dependent and/or nonsubGaussian\nerrors and covariates. In contrast to the traditional case, in which the errors\nare independent and identically distributed and have finite exponential\nmoments, we show that $p$ can be at most a power of $n$ if the errors have only\nfinite polynomial moments. In addition, the rate of convergence becomes slower\nowing to the serial dependence in the errors and the covariates. We also\nconsider the sign consistency of the model selection using the Lasso estimator\nwhen there are serial correlations in the errors or the covariates, or both.\nAdopting the framework of a functional dependence measure, we describe how the\nrates of convergence and the selection consistency of the estimators depend on\nthe dependence measures and moment conditions of the errors and the covariates.\nSimulation results show that a Lasso regression can be significantly more\npowerful than a mixed-frequency data sampling regression (MIDAS) and a Dantzig\nselector in the presence of irrelevant variables. We apply the results obtained\nfor the Lasso method to nowcasting with mixed-frequency data, in which serially\ncorrelated errors and a large number of covariates are common. The empirical\nresults show that the Lasso procedure outperforms the MIDAS regression and the\nautoregressive model with exogenous variables in terms of both forecasting and\nnowcasting.\n', 'Adaptive Lasso, Transfer Lasso, and Beyond: An Asymptotic Perspective This paper presents a comprehensive exploration of the theoretical properties\ninherent in the Adaptive Lasso and the Transfer Lasso. The Adaptive Lasso, a\nwell-established method, employs regularization divided by initial estimators\nand is characterized by asymptotic normality and variable selection\nconsistency. In contrast, the recently proposed Transfer Lasso employs\nregularization subtracted by initial estimators with the demonstrated capacity\nto curtail non-asymptotic estimation errors. A pivotal question thus emerges:\nGiven the distinct ways the Adaptive Lasso and the Transfer Lasso employ\ninitial estimators, what benefits or drawbacks does this disparity confer upon\neach method? This paper conducts a theoretical examination of the asymptotic\nproperties of the Transfer Lasso, thereby elucidating its differentiation from\nthe Adaptive Lasso. Informed by the findings of this analysis, we introduce a\nnovel method, one that amalgamates the strengths and compensates for the\nweaknesses of both methods. The paper concludes with validations of our theory\nand comparisons of the methods via simulation experiments.\n']","[('lasso estimator', 0.7003738284111023), ('lasso', 0.6722121834754944), ('group lasso', 0.5882463455200195), ('sparse linear regression', 0.4979754090309143), ('high dimensional regression', 0.41421636939048767), ('generalized linear models', 0.4057607650756836), ('sparse linear', 0.4018625020980835), ('inference high dimensional', 0.38101375102996826), ('dimensional linear regression', 0.3553524315357208), ('least squares estimator', 0.35059869289398193)]" 70,70,311,70_binary optimization qubo_optimization quantum_optimization qubo_quantum algorithms,"['binary optimization qubo', 'optimization quantum', 'optimization qubo', 'quantum algorithms', 'quantum computing', 'variational quantum algorithms', 'quantum computers', 'quantum computation', 'unconstrained binary optimization', 'quantum computer']","['Five Starter Problems: Solving Quadratic Unconstrained Binary\n Optimization Models on Quantum Computers This tutorial offers a quick hands-on introduction to solving Quadratic\nUnconstrained Binary Optimization (QUBO) problems on currently available\nquantum computers. We cover both IBM and D-Wave machines: IBM utilizes a\ngate/circuit architecture, and D-Wave is a quantum annealer. We provide\nexamples of three canonical problems and two models from practical\napplications. An associated GitHub repository provides the implementations in\nfive companion notebooks. In addition to undergraduate and graduate students in\ncomputationally intensive disciplines, this article aims to reach working\nindustry professionals seeking to explore the potential of near-term quantum\napplications.\n', 'QUBO.jl: A Julia Ecosystem for Quadratic Unconstrained Binary\n Optimization We present QUBO.jl, an end-to-end Julia package for working with QUBO\n(Quadratic Unconstrained Binary Optimization) instances. This tool aims to\nconvert a broad range of JuMP problems for straightforward application in many\nphysics and physics-inspired solution methods whose standard optimization form\nis equivalent to the QUBO. These methods include quantum annealing, quantum\ngate-circuit optimization algorithms (Quantum Optimization Alternating Ansatz,\nVariational Quantum Eigensolver), other hardware-accelerated platforms, such as\nCoherent Ising Machines and Simulated Bifurcation Machines, and more\ntraditional methods such as simulated annealing. Besides working with\nreformulations, QUBO.jl allows its users to interface with the aforementioned\nhardware, sending QUBO models in various file formats and retrieving results\nfor subsequent analysis. QUBO.jl was written as a JuMP / MathOptInterface (MOI)\nlayer that automatically maps between the input and output frames, thus\nproviding a smooth modeling experience.\n', 'Constraint Programming to Discover One-Flip Local Optima of Quadratic\n Unconstrained Binary Optimization Problems The broad applicability of Quadratic Unconstrained Binary Optimization (QUBO)\nconstitutes a general-purpose modeling framework for combinatorial optimization\nproblems and are a required format for gate array and quantum annealing\ncomputers. QUBO annealers as well as other solution approaches benefit from\nstarting with a diverse set of solutions with local optimality an additional\nbenefit. This paper presents a new method for generating a set of one-flip\nlocal optima leveraging constraint programming. Further, as demonstrated in\nexperimental testing, analysis of the solution set allows the generation of\nsoft constraints to help guide the optimization process.\n']","[('binary optimization qubo', 0.7562940716743469), ('optimization quantum', 0.7056757211685181), ('optimization qubo', 0.6867221593856812), ('quantum algorithms', 0.6568174958229065), ('quantum computing', 0.6185250878334045), ('variational quantum algorithms', 0.6060352325439453), ('quantum computers', 0.6008895635604858), ('quantum computation', 0.5920795202255249), ('unconstrained binary optimization', 0.5917913317680359), ('quantum computer', 0.583516001701355)]" 71,71,302,71_sensing communications isac_sensing communication isac_transmit beamforming_radar communication,"['sensing communications isac', 'sensing communication isac', 'transmit beamforming', 'radar communication', 'integrated sensing communications', 'communication radar', 'radar sensing', 'integrated sensing communication', 'sensing communications', 'mimo radar']","[""Cram\\'er-Rao Bound Minimization for IRS-Enabled Multiuser Integrated\n Sensing and Communications This paper investigates an intelligent reflecting surface (IRS) enabled\nmultiuser integrated sensing and communications (ISAC) system, which consists\nof one multi-antenna base station (BS), one IRS, multiple single-antenna\ncommunication users (CUs), and one target at the non-line-of-sight (NLoS)\nregion of the BS. The IRS is deployed to not only assist the communication from\nthe BS to the CUs, but also enable the BS's NLoS target sensing based on the\necho signals from the BS-IRS-target-IRS-BS link. We consider two types of\ntargets, namely the extended and point targets, for which the BS aims to\nestimate the complete target response matrix and the target\ndirection-of-arrival (DoA) with respect to the IRS, respectively. To provide\nfull degrees of freedom for sensing, we consider that the BS sends dedicated\nsensing signals in addition to the communication signals. Accordingly, we model\ntwo types of CU receivers, namely Type-I and Type-II CU receivers, which do not\nhave and have the capability of canceling the interference from the sensing\nsignals, respectively. Under each setup, we jointly optimize the transmit\nbeamforming at the BS and the reflective beamforming at the IRS to minimize the\nCram\\'er-Rao bound (CRB) for target estimation, subject to the minimum\nsignal-to-interference-plus-noise ratio (SINR) constraints at the CUs and the\nmaximum transmit power constraint at the BS. We present efficient algorithms to\nsolve the highly non-convex SINR-constrained CRB minimization problems, by\nusing the techniques of alternating optimization, semi-definite relaxation, and\nsuccessive convex approximation. Numerical results show that the proposed\ndesign achieves lower estimation CRB than other benchmark schemes, and the\nsensing signal interference cancellation at Type-II CU receivers is beneficial\nwhen the number of CUs is greater than one.\n"", ""Cram\\'er-Rao Bound Minimization for IRS-Enabled Multiuser Integrated\n Sensing and Communication with Extended Target This paper investigates an intelligent reflecting surface (IRS) enabled\nmultiuser integrated sensing and communication (ISAC) system, which consists of\none multi-antenna base station (BS), one IRS, multiple single-antenna\ncommunication users (CUs), and one extended target at the non-line-of-sight\n(NLoS) region of the BS. The IRS is deployed to not only assist the\ncommunication from the BS to the CUs, but also enable the BS's NLoS target\nsensing based on the echo signals from the BS-IRS-target-IRS-BS link. To\nprovide full degrees of freedom for sensing, we suppose that the BS sends\nadditional dedicated sensing signals combined with the information signals.\nAccordingly, we consider two types of CU receivers, namely Type-I and Type-II\nreceivers, which do not have and have the capability of cancelling the\ninterference from the sensing signals, respectively. Under this setup, we\njointly optimize the transmit beamforming at the BS and the reflective\nbeamforming at the IRS to minimize the Cram\\'er-Rao bound (CRB) for estimating\nthe target response matrix with respect to the IRS, subject to the minimum\nsignal-to-interference-plus-noise ratio (SINR) constraints at the CUs and the\nmaximum transmit power constraint at the BS. We present efficient algorithms to\nsolve the highly non-convex SINR-constrained CRB minimization problems, by\nusing the techniques of alternating optimization and semi-definite relaxation.\nNumerical results show that the proposed design achieves lower estimation CRB\nthan other benchmark schemes, and the sensing signal interference\npre-cancellation is beneficial when the number of CUs is greater than one.\n"", ""Integrated Sensing and Communication with Millimeter Wave Full Duplex\n Hybrid Beamforming Integrated Sensing and Communication (ISAC) has attracted substantial\nattraction in recent years for spectral efficiency improvement, enabling\nhardware and spectrum sharing for simultaneous sensing and signaling\noperations. In-band Full Duplex (FD) is being considered as a key enabling\ntechnology for ISAC applications due to its simultaneous transmission and\nreception capability. In this paper, we present an FD-based ISAC system\noperating at millimeter Wave (mmWave) frequencies, where a massive\nMultiple-Input Multiple-Output (MIMO) Base Station (BS) node employing hybrid\nAnalog and Digital (A/D) beamforming is communicating with a DownLink (DL)\nmulti-antenna user and the same waveform is utilized at the BS receiver for\nsensing the radar targets in its coverage environment. We develop a sensing\nalgorithm that is capable of estimating Direction of Arrival (DoA), range, and\nrelative velocity of the radar targets. A joint optimization framework for\ndesigning the A/D transmit and receive beamformers as well as the\nSelf-Interference (SI) cancellation is presented with the objective to maximize\nthe achievable DL rate and the accuracy of the radar target sensing\nperformance. Our simulation results, considering fifth Generation (5G)\nOrthogonal Frequency Division Multiplexing (OFDM) waveforms, verify our\napproach's high precision in estimating DoA, range, and velocity of multiple\nradar targets, while maximizing the DL communication rate.\n""]","[('sensing communications isac', 0.5745238661766052), ('sensing communication isac', 0.5547556281089783), ('transmit beamforming', 0.5161911845207214), ('radar communication', 0.5016705989837646), ('integrated sensing communications', 0.5016067624092102), ('communication radar', 0.497994989156723), ('radar sensing', 0.49150776863098145), ('integrated sensing communication', 0.477567583322525), ('sensing communications', 0.47511205077171326), ('mimo radar', 0.4638367295265198)]" 72,72,302,72_secrecy capacity_secrecy outage probability_secrecy performance_secrecy rate,"['secrecy capacity', 'secrecy outage probability', 'secrecy performance', 'secrecy rate', 'achievable secrecy', 'secrecy outage', 'secrecy', 'secure communication', 'secure transmission', 'physical layer security']","['Massive MIMO-NOMA Systems Secrecy in the Presence of Active\n Eavesdroppers Non-orthogonal multiple access (NOMA) and massive multiple-input\nmultiple-output (MIMO) systems are highly efficient. Massive MIMO systems are\ninherently resistant to passive attackers (eavesdroppers), thanks to\ntransmissions directed to the desired users. However, active attackers can\ntransmit a combination of legitimate user pilot signals during the channel\nestimation phase. This way they can mislead the base station (BS) to rotate the\ntransmission in their direction, and allow them to eavesdrop during the\ndownlink data transmission phase. In this paper, we analyse this vulnerability\nin an improved system model and stronger adversary assumptions, and investigate\nhow physical layer security can mitigate such attacks and ensure secure\n(confidential) communication. We derive the secrecy outage probability (SOP)\nand a lower bound on the ergodic secrecy capacity, using stochastic geometry\ntools when the number of antennas in the BSs tends to infinity. We adapt the\nresult to evaluate the secrecy performance in massive orthogonal multiple\naccess (OMA). We find that appropriate power allocation allows NOMA to\noutperform OMA in terms of ergodic secrecy rate and SOP.\n', ""Minimization of Secrecy Outage Probability in Reconfigurable Intelligent\n Surface-Assisted MIMOME System This article investigates physical layer security (PLS) in reconfigurable\nintelligent surface (RIS)-assisted multiple-input multiple-output\nmultiple-antenna-eavesdropper (MIMOME) channels. Existing researches ignore the\nproblem that secrecy rate can not be calculated if the eavesdropper's\ninstantaneous channel state information (CSI) is unknown. Furthermore, without\nthe secrecy rate expression, beamforming and phase shifter optimization with\nthe purpose of PLS enhancement is not available. To address these problems, we\nfirst give the expression of secrecy outage probability for any beamforming\nvector and phase shifter matrix as the RIS-assisted PLS metric, which is\nmeasured based on the eavesdropper's statistical CSI. Then, with the aid of the\nexpression, we formulate the minimization problem of secrecy outage probability\nthat is solved via alternately optimizing beamforming vectors and phase shift\nmatrices. In the case of single-antenna transmitter or single-antenna\nlegitimate receiver, the proposed alternating optimization (AO) scheme can be\nsimplified to reduce computational complexity. Finally, it is demonstrated that\nthe secrecy outage probability is significantly reduced with the proposed\nmethods compared to current RIS-assisted PLS systems.\n"", 'Secrecy Performance Analysis of Multi-Functional RIS-Assisted NOMA\n Networks Although reconfigurable intelligent surface (RIS) can improve the secrecy\ncommunication performance of wireless users, it still faces challenges such as\nlimited coverage and double-fading effect. To address these issues, in this\npaper, we utilize a novel multi-functional RIS (MF-RIS) to enhance the secrecy\nperformance of wireless users, and investigate the physical layer secrecy\nproblem in non-orthogonal multiple access (NOMA) networks. Specifically, we\nderive the secrecy outage probability (SOP) and secrecy throughput expressions\nof users in MF-RIS-assisted NOMA networks with external and internal\neavesdroppers. The asymptotic expressions for SOP and secrecy diversity order\nare also analyzed under high signal-to-noise ratio (SNR) conditions.\nAdditionally, we examine the impact of receiver hardware limitations and error\ntransmission-induced imperfect successive interference cancellation (SIC) on\nthe secrecy performance. Numerical results indicate that: i) under the same\npower budget, the secrecy performance achieved by MF-RIS significantly\noutperforms active RIS and simultaneously transmitting and reflecting RIS; ii)\nwith increasing power budget, residual interference caused by imperfect SIC\nsurpasses thermal noise as the primary factor affecting secrecy capacity; and\niii) deploying additional elements at the MF-RIS brings significant secrecy\nenhancements for the external eavesdropping scenario, in contrast to the\ninternal eavesdropping case.\n']","[('secrecy capacity', 0.6166078448295593), ('secrecy outage probability', 0.6094948053359985), ('secrecy performance', 0.6071178913116455), ('secrecy rate', 0.5950509309768677), ('achievable secrecy', 0.5493327379226685), ('secrecy outage', 0.539665162563324), ('secrecy', 0.5194307565689087), ('secure communication', 0.5036075115203857), ('secure transmission', 0.4942816197872162), ('physical layer security', 0.44134849309921265)]" 73,73,299,73_topological insulators_topological phases_topological phase_fractional quantum hall,"['topological insulators', 'topological phases', 'topological phase', 'fractional quantum hall', 'quantum hall', 'quantum hall effect', 'topological invariants', 'boundary states', 'insulators', 'hyperbolic lattices']","['Bulk-Boundary Correspondence for Topological Insulators with Quantized\n Magneto-Electric Effect We study bulk-boundary correspondences and related surface phenomena\nstabilized by the second Chern number in three-dimensional insulators driven in\nadiabatic cycles. Magnetic fields and disorder effects are incorporated in our\nanalysis using operator algebraic methods. We use the connecting maps between\nthe $K$-theories of bulk and boundary algebras as engines for the bulk-boundary\ncorrespondences. We discovered that both the exponential and the index\nconnecting maps are relevant for the context considered here as they lead to\ndistinct experimentally observable surface phenomena, such as pumping and\ntransfer of quantum surface Hall states or proximity induced Hall effect. The\nsurface Hall physics of time-reversal symmetric topological insulators is also\ninvestigated using the new tools, which can model irrational magnetic fluxes\nand arbitrary large surface disorder.\n', 'Non-Hermitian Hopf insulators Hopf insulators represent a unique class of topological insulators that exist\nexclusively in two-band systems and are inherently unstable upon the inclusion\nof additional bands. Meanwhile, recent studies have shown that non-Hermiticity\ngives rise to distinctive complex-energy gap structures, known as point gaps,\nand associated topological phases with no analogs in Hermitian systems.\nHowever, non-Hermitian counterparts of Hopf insulators have remained largely\nelusive. Here, we generally classify topological phases of two-band\nnon-Hermitian systems based on the homotopy theory and uncover Hopf-type\npoint-gap topology present only for two bands. Specifically, we reveal such\nHopf-type point-gap topology for three-dimensional systems with chiral symmetry\n(class AIII) and four-dimensional systems with no symmetry (class A).\nExplicitly constructing prototypical models from the Hermitian Hopf insulator,\nwe further demonstrate that these non-Hermitian topological phases lead to\nanomalous point-gapless boundary states spectrally detachable from the bulk\nbands.\n', 'Multicellularity of delicate topological insulators Being Wannierizable is not the end of the story for topological insulators.\nWe introduce a family of topological insulators that would be considered\ntrivial in the paradigm set by the tenfold way, topological quantum chemistry,\nand the method of symmetry-based indicators. Despite having a symmetric,\nexponentially-localized Wannier representation, each Wannier function cannot be\ncompletely localized to a single primitive unit cell in the bulk. Such\nmulticellular topology is shown to be neither stable, nor fragile, but\ndelicate, i.e., the topology can be nullified by adding trivial bands to either\nvalence or conduction band.\n']","[('topological insulators', 0.7248303294181824), ('topological phases', 0.5982376933097839), ('topological phase', 0.5543565154075623), ('fractional quantum hall', 0.5525529980659485), ('quantum hall', 0.5403799414634705), ('quantum hall effect', 0.5173443555831909), ('topological invariants', 0.4605960249900818), ('boundary states', 0.44470369815826416), ('insulators', 0.41901880502700806), ('hyperbolic lattices', 0.4069638252258301)]" 74,74,299,74_brunn minkowski inequality_symmetric convex bodies_convex bodies_symmetric convex body,"['brunn minkowski inequality', 'symmetric convex bodies', 'convex bodies', 'symmetric convex body', 'convex body', 'convex body mathbb', 'minkowski inequality', 'isoperimetric inequality', 'brunn minkowski theory', 'isoperimetric inequalities']","['Log-Brunn-Minkowski inequality under symmetry We prove the log-Brunn-Minkowski conjecture for convex bodies with symmetries\nto $n$ independent hyperplanes, and discuss the equality case and the\nuniqueness of the solution of the related case of the logarithmic Minkowski\nproblem. We also clarify a small gap in the known argument classifying the\nequality case of the log-Brunn-Minkowski conjecture for unconditional convex\nbodies.\n', ""Dual Brunn-Minkowski inequality for C-star bodies In this paper, we consider the concept of $C$-star body in a fixed pointed\nclosed convex cone $C$ and study the dual mixed volume for $C$-star bodies. For\n$C$-star bodies, we establish the corresponding dual Brunn-Minkowski\ninequality, the dual Minkowski inequality and the dual Aleksandrov-Fenchel\ninequality. Our dual Brunn-Minkowski inequality for $C$-star bodies strengthens\nSchneider's Brunn-Minkowski inequality for $C$-coconvex sets.\n"", ""Brunn-Minkowski and Reverse Isoperimetric Inequalities for Dual Quermassintegrals This paper establishes two new geometric inequalities in the dual Brunn-Minkowski theory. The first, originally conjectured by Lutwak, is the Brunn-Minkowski inequality for dual quermassintegrals of origin-symmetric convex bodies. The second, generalizing Ball's volume ratio inequality, is a reverse isoperimetric inequality: among all origin-symmetric convex bodies in John's position, the cube maximizes the dual quermassintegrals.""]","[('brunn minkowski inequality', 0.7012479305267334), ('symmetric convex bodies', 0.6867337822914124), ('convex bodies', 0.6772520542144775), ('symmetric convex body', 0.6428438425064087), ('convex body', 0.6295404434204102), ('convex body mathbb', 0.6184282898902893), ('minkowski inequality', 0.6006996035575867), ('isoperimetric inequality', 0.5860062837600708), ('brunn minkowski theory', 0.5859560966491699), ('isoperimetric inequalities', 0.5789101719856262)]" 75,75,299,75_edge ideals_ideals graphs_edge ideal_monomial ideals,"['edge ideals', 'ideals graphs', 'edge ideal', 'monomial ideals', 'monomial ideal', 'cohen macaulayness', 'ideal polynomial ring', 'ideals associated', 'chordal graphs', 'macaulayness']","['On the symbolic $F$-splitness of binomial edge ideals We study the symbolic $F$-splitness of families of binomial edge ideals. We\nalso study the strong $F$-regularity of the symbolic blowup algebras of\nfamilies of binomial edge ideals. We make use of Fedder-like criteria and\ncombinatorial properties of the graphs associated to the binomial edge ideals\nin order to approach the aforementioned scenarios.\n', 'Regularity of parity binomial edge ideals Let $G$ be a simple graph on $n$ vertices and $\\mathcal{I}_G$ denotes parity\nbinomial edge ideal of $G$ in the polynomial ring $S = \\mathbb{K}[x_1,\\ldots,\nx_n, y_1, \\ldots, y_n].$ We obtain a lower bound for the regularity of parity\nbinomial edge ideals of graphs. We then classify all graphs whose parity\nbinomial edge ideals have regularity $3$. We classify graphs whose parity\nbinomial edge ideals have pure resolution.\n', 'Generalized binomial edge ideals of bipartite graphs Connected bipartite graphs whose binomial edge ideals are Cohen--Macaulay\nhave been classified by Bolognini et al. In this paper, we compute the depth,\nCastelnuovo--Mumford regularity, and dimension of the generalized binomial edge\nideals of these graphs.\n']","[('edge ideals', 0.7250354290008545), ('ideals graphs', 0.6963003873825073), ('edge ideal', 0.6602331399917603), ('monomial ideals', 0.586272120475769), ('monomial ideal', 0.5451591610908508), ('cohen macaulayness', 0.501245379447937), ('ideal polynomial ring', 0.4888550043106079), ('ideals associated', 0.48427021503448486), ('chordal graphs', 0.4578983187675476), ('macaulayness', 0.4464033842086792)]" 76,76,298,76_opinion dynamics_opinion formation_influence maximization_social network,"['opinion dynamics', 'opinion formation', 'influence maximization', 'social network', 'social networks', 'consensus formation', 'social influence', 'bounded confidence', 'dynamics networks', 'networks']","['A Bounded-Confidence Model of Opinion Dynamics with Heterogeneous\n Node-Activity Levels Agent-based models of opinion dynamics allow one to examine the spread of\nopinions between entities and to study phenomena such as consensus,\npolarization, and fragmentation. By studying a model of opinion dynamics on a\nsocial network, one can explore the effects of network structure on these\nphenomena. In social networks, some individuals share their ideas and opinions\nmore frequently than others. These disparities can arise from heterogeneous\nsociabilities, heterogeneous activity levels, different prevalences to share\nopinions when engaging in a social-media platform, or something else. To\nexamine the impact of such heterogeneities on opinion dynamics, we generalize\nthe Deffuant--Weisbuch (DW) bounded-confidence model (BCM) of opinion dynamics\nby incorporating node weights. The node weights allow us to model agents with\ndifferent probabilities of interacting. Using numerical simulations, we\nsystematically investigate (using a variety of network structures and\nnode-weight distributions) the effects of node weights, which we assign\nuniformly at random to the nodes. We demonstrate that introducing heterogeneous\nnode weights results in longer convergence times and more opinion fragmentation\nthan in a baseline DW model. The node weights in our BCM allow one to consider\na variety of sociological scenarios in which agents have heterogeneous\nprobabilities of interacting with other agents.\n', ""Bounded-Confidence Models of Multi-Dimensional Opinions with\n Topic-Weighted Discordance People's opinions on a wide range of topics often evolve over time through\ntheir interactions with others. Models of opinion dynamics primarily focus on\none-dimensional opinions which represent opinions on one topic. However,\nopinions on various topics are rarely isolated; instead, they can be\ninterdependent and exhibit correlations. In a bounded-confidence model (BCM) of\nopinion dynamics, agents influence each other's opinions only if their opinions\nare sufficiently similar. We extend classical agent-based BCMs -- namely, the\nHegeselmann--Krause BCM, which has synchronous interactions, and the\nDeffuant--Weisbuch BCM, which has asynchronous interactions -- to a\nmultidimensional setting, in which the opinions are multidimensional vectors\nrepresenting opinions of different topics and opinions on different topics are\ninterdependent. To measure opinion differences between agents, we introduce\ntopic-weighted discordance functions that account for opinion differences in\nall topics. We use the regions of receptiveness to characterize the\nsteady-state opinion clusters and provide an analytical approach to compute\nthese regions. In addition, we numerically simulate our models on various\nnetworks with initial opinions drawn from a variety of distributions. When\ninitial opinions are correlated across different topics, our topic-weighted\nBCMs yield significantly different results in both transient and steady states\ncompared to baseline models, where the dynamics of each opinion topic are\nindependent.\n"", 'A Weighted-Median Model of Opinion Dynamics on Networks Social interactions influence people\'s opinions. In some situations, these\ninteractions result in a consensus opinion; in others, they result in opinion\nfragmentation and the formation of different opinion groups in the form of\n""echo chambers"". Consider a social network of individuals, who hold\ncontinuous-valued scalar opinions and change their opinions when they interact\nwith each other. In such an opinion model, it is common for an opinion-update\nrule to depend on the mean opinion of interacting individuals. However, we\nconsider an alternative update rule - which may be more realistic in some\nsituations - that instead depends on a weighted median opinion of interacting\nindividuals. Through numerical simulations of our opinion model, we investigate\nhow the limit opinion distribution depends on network structure. For\nconfiguration-model networks, we also derive a mean-field approximation for the\nasymptotic dynamics of the opinion distribution when there are infinitely many\nindividuals in a network.\n']","[('opinion dynamics', 0.6247344017028809), ('opinion formation', 0.5066361427307129), ('influence maximization', 0.4459257125854492), ('social network', 0.4257231652736664), ('social networks', 0.4053698182106018), ('consensus formation', 0.3966580629348755), ('social influence', 0.3954768776893616), ('bounded confidence', 0.3948301672935486), ('dynamics networks', 0.3888550102710724), ('networks', 0.3634338676929474)]" 77,77,292,77_number partitions_number partitions parts_integer partitions_partitions odd parts,"['number partitions', 'number partitions parts', 'integer partitions', 'partitions odd parts', 'integer partition', 'ramanujan like congruences', 'partitions odd', 'partitions distinct parts', 'partitions distinct', 'partitions']","['A conjecture of Baruah and Begum on the smallest parts function of\n restricted overpartitions In 2017, Andrews, Dixit, Schultz and Yee introduced the function\n$\\overline{\\textrm{spt}}_\\omega(n)$, which denotes the number of smallest parts\nin the overpartitions of $n$ in which the smallest part is always overlined and\nall odd parts are less than twice the smallest part. Recently, Baruah and Begum\nestablished several internal congruences and congruences modulo small powers of\n$5$ for $\\overline{\\textrm{spt}}_\\omega(n)$. Moreover, they conjectured a\nfamily of internal congruences modulo any powers of $5$ and two families of\ncongruences modulo any even powers of $5$. In this paper, we confirm three\nfamilies of congruences due to Baruah and Begum.\n', 'New congruences for partitions where the even parts are distinct We denote the number of partitions of $n$ wherein the even parts are distinct\n(and the odd parts are unrestricted) by $ped(n)$. In this paper, we will use\ngenerating function manipulations to obtain new congruences for $ped(n)$ modulo\n$24$.\n', 'Congruences and density results for partitions into distinct even parts In this paper, we consider the set of partitions $ped(n)$ which counts the\nnumber of partitions of $n$ wherein the even parts are distinct (and the odd\nparts are unrestricted). Using an algorithm developed by Radu, we prove\ncongruences modulo 192 which were conjectured by Nath. Further, we prove a few\ninfinite families of congruences modulo 24 by using a result of Newman. Also,\nwe prove that $ped(9n+7)$ is lacunary modulo $2^{k+2}\\cdot 3$ and $3^{k+1}\\cdot\n4$ for all positive integers $k\\geq0$. We further prove an infinite family of\ncongruences for $ped(n)$ modulo arbitrary powers of 2 by employing a result of\nOno and Taguchi on the nilpotency of Hecke operators.\n']","[('number partitions', 0.5987563133239746), ('number partitions parts', 0.5934842824935913), ('integer partitions', 0.5894445180892944), ('partitions odd parts', 0.5388807654380798), ('integer partition', 0.5296327471733093), ('ramanujan like congruences', 0.5196102857589722), ('partitions odd', 0.5112177729606628), ('partitions distinct parts', 0.4977954924106598), ('partitions distinct', 0.479521244764328), ('partitions', 0.4665648639202118)]" 78,78,290,78_eigenvalue laplacian_eigenvalues laplacian_dirichlet neumann eigenvalues_robin boundary conditions,"['eigenvalue laplacian', 'eigenvalues laplacian', 'dirichlet neumann eigenvalues', 'robin boundary conditions', 'neumann eigenvalues', 'neumann laplacian', 'laplacian bounded', 'eigenvalues neumann', 'neumann eigenvalue', 'dirichlet eigenvalues']","['Nodal sets of Robin and Neumann eigenfunctions We investigate the measure of nodal sets for Robin and Neumann eigenfunctions\nin the domain and on the boundary of the domain. A polynomial upper bound for\nthe interior nodal sets is obtained for Robin eigenfunctions in the smooth\ndomain. For the analytic domain, the sharp upper bounds of the interior nodal\nsets was shown for Robin eigenfunctions. More importantly, we obtain the sharp\nupper bounds for the boundary nodal sets of Neumann eigenfunctions with new\nquantitative global Carleman estimates. Furthermore, the sharp doubling\ninequality and vanishing order of Robin eigenfunctions on the boundary of the\ndomain are obtained.\n', 'Geometric Optimization of the First Robin Eigenvalue in Exterior Domains This paper addresses the geometric optimization problem of the first Robin\neigenvalue in exterior domains, specifically the lowest point of the spectrum\nof the Laplace operator under Robin boundary conditions in the complement of a\nbounded domain. In contrast to the Laplace operator on bounded domains, the\nspectrum of this operator is not purely discrete. The discrete nature of the\nfirst eigenvalue depends on the parameter of the Robin boundary condition. In\ntwo dimensions, D. Krejcirik and V. Lotoreichik show that the ball maximizes\nthe first Robin eigenvalue among all smooth, bounded, simply connected sets\nwith given perimeter or given area, provided the eigenvalue is discrete.\n We extend these findings to higher dimensions. The discrete spectrum of the\nLaplace operator under Robin boundary conditions can be characterized through\nthe Steklov eigenvalue problem in exterior domains, a topic studied by G.\nAuchmuty and Q. Han. Assuming that the lowest point of the spectrum is a\ndiscrete eigenvalue, we show that the ball is a local maximizer among nearly\nspherical domains with prescribed measure. However, in general, the ball does\nnot emerge as the global maximizer for the first Robin eigenvalue under either\nprescribed measure or prescribed perimeter.\n', 'Bounds for higher Steklov and mixed Steklov Neumann eigenvalues on\n domains with holes In this article, we study Steklov eigenvalues and mixed Steklov Neumann\neigenvalues on a smooth bounded domain in $\\mathbb{R}^{n}$, $n \\geq 2$, having\na spherical hole. We focus on two main results related to Steklov eigenvalues.\nFirst, we obtain explicit expression for the second nonzero Steklov eigenvalue\non concentric annular domain. Secondly, we derive a sharp upper bound of the\nfirst $n$ nonzero Steklov eigenvalues on a domain $\\Omega \\subset\n\\mathbb{R}^{n}$ having symmetry of order $4$ and a ball removed from its\ncenter. This bound is given in terms of the corresponding Steklov eigenvalues\non a concentric annular domain of the same volume as $\\Omega$. Next, we\nconsider the mixed Steklov Neumann eigenvalue problem on $4^{\\text{th}}$ order\nsymmetric domains in $\\mathbb{R}^{n}$ having a spherical hole and obtain upper\nbound of the first $n$ nonzero eigenvalues. We also provide some examples to\nillustrate that symmetry assumption in our results is crucial. Finally, We make\nsome numerical observations about these eigenvalues using FreeFEM++ and state\nthem as conjectures.\n']","[('eigenvalue laplacian', 0.6139245629310608), ('eigenvalues laplacian', 0.6070164442062378), ('dirichlet neumann eigenvalues', 0.6057596802711487), ('robin boundary conditions', 0.5745633840560913), ('neumann eigenvalues', 0.5566800832748413), ('neumann laplacian', 0.5542556047439575), ('laplacian bounded', 0.5467641949653625), ('eigenvalues neumann', 0.5452121496200562), ('neumann eigenvalue', 0.5305745005607605), ('dirichlet eigenvalues', 0.519262969493866)]" 79,79,290,79_manifolds nonnegative ricci_ricci curvature bounds_ricci curvature bound_ricci curvature bounded,"['manifolds nonnegative ricci', 'ricci curvature bounds', 'ricci curvature bound', 'ricci curvature bounded', 'nonnegative ricci curvature', 'riemannian manifolds nonnegative', 'lower ricci curvature', 'curvature lower bounds', 'curvature lower bound', 'ricci curvature lower']","['Glued spaces and lower Ricci curvature bounds We consider Riemannian manifolds $M_i$, ${i=0,1}$, with boundary and\n$\\Phi_i\\in C^{\\infty}(M_i)$ non-negative such that the pair $(M_i, \\Phi_i)$\nadmits Bakry-Emery $N$-Ricci curvature bounded from below by $K$. Let $Y_0$ and\n$Y_1$ be isometric, compact components of the boundary of $M_0$ and $M_1$\nrespectively and assume $\\Phi_0=\\Phi_1$ on $Y_0\\simeq Y_1$. We assume that\n$\\Pi_0+\\Pi_1=\\Pi \\geq 0$ (*), and $d\\Phi_0(\\nu_0)+ d\\Phi_1(\\nu_1)\\leq\n\\mbox{tr}\\Pi$ on $Y_0\\simeq Y_1$ (**) where $\\Pi_i$ is the second fundamental\nform and $\\nu_i$ is inner unit normal field along $\\partial M_i$. We show that\nthe metric glued space $M=M_0\\cup_{\\mathcal I}M_1$ together with the measure\n$\\Phi d\\mathcal H^n$ satisfies the curvature-dimension condition $CD(K,\\lceil N\n\\rceil)$ where $\\Phi: M\\rightarrow [0,\\infty)$ arises tautologically from\n$\\Phi_1$ and $\\Phi_2$. Moreover, $(M, \\Phi d\\mathcal H^n)$ is the collapsed\nGromov-Hausdorff limit of smooth, $\\lceil N \\rceil$-dimensional Riemannian\nmanifolds with Ricci curvature bounded from below by $K- \\epsilon$ and is also\nthe measured Gromov-Hausdorff limit of smooth, weighted Riemannian manifolds\nsuch that the Bakry-Emery $\\lceil N \\rceil$-Ricci curvature is bounded from\nbelow by $K-\\epsilon$. On the other hand we show that given a glued manifold as\ndescribed it satisfies the curvature-dimension condition $CD(K,N)$ only if the\ncondition (*) and (**) hold. The latter statement generalizes a theorem of\nKosovski\\u{\\i} for sectional lower curvature bounds and especially applies for\nthe unweighted case where a lower Ricci curvature bound and $\\dim_{M_i}\\leq N$\nreplaces a lower Bakry-Emery $N$-Ricci curvature bound.\n', 'On the existence of isoperimetric regions in manifolds with nonnegative\n Ricci curvature and Euclidean volume growth In this paper we provide new existence results for isoperimetric sets of\nlarge volume in Riemannian manifolds with nonnegative Ricci curvature and\nEuclidean volume growth. We find sufficient conditions for their existence in\nterms of the geometry at infinity of the manifold. As a byproduct we show that\nisoperimetric sets of big volume always exist on manifolds with nonnegative\nsectional curvature and Euclidean volume growth. Our method combines an\nasymptotic mass decomposition result for minimizing sequences, a sharp\nisoperimetric inequality on nonsmooth spaces, and the concavity property of the\nisoperimetric profile. The latter is new in the generality of noncollapsed\nmanifolds with Ricci curvature bounded below.\n', 'Optimal asymptotic volume ratio for noncompact 3-manifolds with\n asymptotically nonnegative Ricci curvature and a uniformly positive scalar\n curvature lower bound In this paper, we study 3-dimensional complete non-compact Riemannian\nmanifolds with asymptotically nonnegative Ricci curvature and a uniformly\npositive scalar curvature lower bound. Our main result is that, if this\nmanifold has $k$ ends and finite first Betti number, then it has at most linear\nvolume growth, and furthermore, if the negative part of Ricci curvature decays\nsufficiently fast at infinity, then we have an optimal asymptotic volume ratio\n$\\limsup_{r\\rightarrow\\infty}\\frac{\\mathrm{Vol}(B(p, r))}{r}\\leq4k\\pi$. In\nparticular, our results apply to 3-dimensional complete non-compact Riemannian\nmanifolds with nonnegative Ricci curvature and a uniformly positive scalar\ncurvature lower bound.\n']","[('manifolds nonnegative ricci', 0.7157226800918579), ('ricci curvature bounds', 0.7110186815261841), ('ricci curvature bound', 0.7048435211181641), ('ricci curvature bounded', 0.7006486654281616), ('nonnegative ricci curvature', 0.693658173084259), ('riemannian manifolds nonnegative', 0.6675887107849121), ('lower ricci curvature', 0.6424309611320496), ('curvature lower bounds', 0.6341511607170105), ('curvature lower bound', 0.6302054524421692), ('ricci curvature lower', 0.6219433546066284)]" 80,80,286,80_billiard trajectories_billiards_billiard_convex bodies,"['billiard trajectories', 'billiards', 'billiard', 'convex bodies', 'hyperbolic plane', 'polygonal', 'conics', 'elliptic', 'periodic orbits', 'invariant curves']","[""On projective billiards with open subsets of triangular orbits Ivrii's Conjecture states that in every billiard in Euclidean space the set\nof periodic orbits has measure zero. It implies that for every $k\\geq2$ there\nare no k-reflective billiards, i.e., billiards having an open set of k-periodic\norbits. This conjecture is open in Euclidean spaces, with just few partial\nresults. It is known that in the two-dimensional sphere there exist\n3-reflective billiards (Yu.M.Baryshnikov). All the 3-reflective spherical\nbilliards were classified in a paper by V.Blumen, K.Kim, J.Nance, V.Zharnitsky:\nthe boundary of each of them lies in three orthogonal big circles. In the\npresent paper we study the analogue of Ivrii's Conjecture for projective\nbilliards introduced by S.Tabachnikov. In two dimensions there exists a\n3-reflective projective billiard, the so-called right-spherical billiard, which\nis the projection of a spherical 3-reflective billiard. We show that the only\n3-reflective planar projective billiard with piecewise smooth boundary is the\nabove-mentioned right-spherical billiard. In higher dimensions, we prove the\nnon-existence of 3-reflective projective billiards with piecewise smooth\nboundary, and also the non-existence of projective billiards with piecewise\nsmooth boundary having a subset of triangular orbits of non-zero measure in the\nphase space.\n"", ""Isometric Billiards in Ellipses and Focal Billiards in Ellipsoids Billiards in ellipses have a confocal ellipse or hyperbola as caustic. The\ngoal of this paper is to prove that for each billiard of one type there exists\nan isometric counterpart of the other type. Isometry means here that the\nlengths of corresponding sides are equal. The transition between these two\nisometric billiard can be carried out continuosly via isometric focal billiards\nin a fixed ellipsoid. The extended sides of these particular billiards in an\nellipsoid are focal axes, i.e., generators of confocal hyperboloids. This\ntransition enables to transfer properties of planar billiards to focal\nbilliards, in particular billiard motions and canonical parametrizations. A\nperiodic planar billiard and its associated Poncelet grid give rise to periodic\nfocal billiards and spatial Poncelet grids. If the sides of a focal billiard\nare materialized as thin rods with spherical joints at the vertices and other\ncrossing points between different sides, then we obtain Henrici's hyperboloid,\nwhich is flexible between the two planar limits.\n"", 'Back to Boundaries in Billiards We prove Poisson limit laws for open billiards where the holes are on the\nboundaries of billiard tables (rather than some abstract holes in the phase\nspace of a billiard). Such holes are of the main interest for billiard systems,\nespecially for applications. Sinai billiards with or without a finite horizon,\ndiamond billiards, and semi-dispersing billiards, as well as focusing billiards\nwith slow decay of correlations, are considered.\n']","[('billiard trajectories', 0.733683705329895), ('billiards', 0.7180870771408081), ('billiard', 0.6883042454719543), ('convex bodies', 0.430026650428772), ('hyperbolic plane', 0.3771071434020996), ('polygonal', 0.36239156126976013), ('conics', 0.354881227016449), ('elliptic', 0.3504323959350586), ('periodic orbits', 0.34215378761291504), ('invariant curves', 0.340550035238266)]" 81,81,284,81_harmonic sums_multiple harmonic sums_zeta functions_harmonic numbers,"['harmonic sums', 'multiple harmonic sums', 'zeta functions', 'harmonic numbers', 'zeta values', 'harmonic number', 'multiple zeta values', 'values riemann zeta', 'riemann zeta', 'multiple zeta']","['On connection between values of Riemann zeta function at integers and\n generalized harmonic numbers Using Euler transformation of series we relate values of Hurwitz zeta\nfunction at integer and rational values of arguments to certain rapidly\nconverging series where some generalized harmonic numbers appear. The form of\nthese generalized harmonic numbers carries information about the values of the\narguments of Hurwitz function. In particular we prove: $\\forall k\\in\n\\mathbb{N}:$ $\\zeta (k,1)\\allowbreak =\\allowbreak \\frac{2^{k-1}}{2^{k-1}-1}%\n\\sum_{n=1}^{\\infty }\\frac{H_{n}^{(k-1)}}{n2^{n}},$ where $H_{n}^{(k)}$ are\ndefined below generalized harmonic numbers. Further we find generating function\nof the numbers $\\hat{\\zeta}(k)=\\sum_{j=1}^{\\infty }(-1)^{j-1}/j^{k}. $\n', 'Some identities on degenerate harmonic and degenerate higher-order\n harmonic numbers The harmonic numbers and higher-order harmonic numbers appear frequently in\nseveral areas which are related to combinatorial identities, many expressions\ninvolving special functions in analytic number theory, and analysis of\nalgorithms. The aim of this paper is to study the degenerate harmonic and\ndegenerate higher-order harmonic numbers, which are respectively degenerate\nversions of the harmonic and higher-order harmonic numbers, in connection with\nthe degenerate zeta and degenerate Hurwitz zeta function. Here the degenerate\nzeta and degenerate Hurwitz zeta function are respectively degenerate versions\nof the Riemann zeta and Hurwitz zeta function. We show that several infinite\nsums involving the degenerate higher-order harmonic numbers can be expressed in\nterms of the degenerate zeta function. Furthermore, we demonstrate that an\ninfinite sum involving finite sums of products of the degenerate harmonic\nnumbers can be represented by using the degenerate Hurwitz zeta function.\n', 'Some Evaluations of Parametric Euler Type Sums of Harmonic Numbers We establish some identities of Euler related sums. By using these\nidentities, we discuss the closed form representations of sums of harmonic\nnumbers and reciprocal parametric binomial coefficients through parametric\nharmonic numbers, shifted harmonic numbers and Riemann zeta function with\npositive integer arguments. In particular we investigate products of quadratic\nand cubic harmonic numbers and reciprocal parametric binomial coefficients.\nSome illustrative special cases as well as immediate consequences of the main\nresults are also considered.\n']","[('harmonic sums', 0.631974995136261), ('multiple harmonic sums', 0.6304380297660828), ('zeta functions', 0.6047370433807373), ('harmonic numbers', 0.5844323039054871), ('zeta values', 0.5561501383781433), ('harmonic number', 0.5403225421905518), ('multiple zeta values', 0.5293399691581726), ('values riemann zeta', 0.52386075258255), ('riemann zeta', 0.5237631797790527), ('multiple zeta', 0.49006736278533936)]" 82,82,284,82_magnetohydrodynamic mhd equations_magnetohydrodynamics mhd equations_magnetohydrodynamics mhd_magnetohydrodynamic mhd,"['magnetohydrodynamic mhd equations', 'magnetohydrodynamics mhd equations', 'magnetohydrodynamics mhd', 'magnetohydrodynamic mhd', 'magnetohydrodynamics equations', 'magnetohydrodynamic equations', 'magnetohydrodynamics', 'ideal magnetohydrodynamics', 'magnetohydrodynamic', 'resistive mhd equations']","['On Magnetic Inhibition Theory in Non-resistive Magnetohydrodynamic\n Fluids: Existence of Solutions in Some Classes of Large Data This paper is concerned with existence of solutions to the incompressible\nnon-resistive viscous magnetohydrodynamic (MHD) equations with large initial\nperturbations in there-dimensional (3D) periodic domains (in Lagrangian\ncoordinates). Motivated by the Diophantine condition imposed by the approximate\ntheory of non-resistive MHD equations in \\cite{BCSCSPLL}, Chen--Zhang--Zhou in\n\\cite{chen2021} and the magnetic inhibition mechanism of Lagrangian coordinates\nversion in our previous paper \\cite{JFJSOMITIN}, we prove the existence of\nunique classical solutions under some class of large initial perturbations,\nwhere the intensity of impressive magnetic fields depends increasingly on the $\nH^{17}\\times H^{21}$-norm of the initial perturbation of both the velocity and\nmagnetic field. Our result not only mathematically verifies that magnetic\nfields prevent the singularity formation of solutions with large initial\nvelocity in the viscous case, but also provide a starting point for the\nexistence theory of large perturbation solutions of the 3D non-resistive\nviscous MHD equations. In addition, we further rigorously prove that, for large\ntime or strong magnetic field, the MHD equations reduce to the corresponding\nlinearized equations by providing the error estimates, which enjoy the types of\nalgebraic decay with respect to the both of time and field intensity, between\nthe solutions of both the nonlinear and linear equations.\n', 'On non-resistive limit of 1D MHD equations with no vacuum at infinity In this paper, we consider the Cauchy problem for the one-dimensional\ncompressible isentropic magnetohydrodynamic (MHD) equations with no vacuum at\ninfinity, but the initial vacuum can be permitted inside the region. By\nderiving a priori $\\nu $ (resistivity coefficient)-independent estimates, we\nestablish the non-resistive limit of the global strong solutions with large\ninitial data. Moreover, as a by-product, the global well-posedness of strong\nsolutions for both the compressible resistive MHD equations and non-resistive\nMHD equations are also established, respectively.\n', 'On some Liouville type Theorems for the stationary MHD and Hall-MHD\n equations We prove several Liouville type results for the stationary MHD and Hall-MHD\nequations. In particular, we show that the velocity and magnetic field,\nbelonging to some Lorentz spaces or satisfying a priori decay assumption, must\nbe zero.\n']","[('magnetohydrodynamic mhd equations', 0.681038498878479), ('magnetohydrodynamics mhd equations', 0.6717129349708557), ('magnetohydrodynamics mhd', 0.6019619107246399), ('magnetohydrodynamic mhd', 0.5977572798728943), ('magnetohydrodynamics equations', 0.591821014881134), ('magnetohydrodynamic equations', 0.5869717001914978), ('magnetohydrodynamics', 0.535041093826294), ('ideal magnetohydrodynamics', 0.5342715978622437), ('magnetohydrodynamic', 0.5196254253387451), ('resistive mhd equations', 0.5176082849502563)]" 83,83,280,83_semidefinite programming_constrained optimization problems_constrained optimization_cone programming,"['semidefinite programming', 'constrained optimization problems', 'constrained optimization', 'cone programming', 'nonlinear programming', 'constraint qualification', 'optimality conditions', 'necessary optimality conditions', 'order optimality conditions', 'second order optimality']","['On second-order Karush--Kuhn--Tucker optimality conditions for $C^{1,1}$\n vector optimization problems This paper focuses on optimality conditions for $C^{1,1}$ vector optimization\nproblems with inequality constraints. By employing the limiting second-order\nsubdifferential and the second-order tangent set, we introduce a new type of\nsecond-order constraint qualification in the sense of Abadie. Then we establish\nsome second-order necessary optimality conditions of Karush--Kuhn--Tucker-type\nfor local (weak) efficient solutions of the considered problem. In addition, we\nprovide some sufficient conditions for a local efficient solution of the such\nproblem. The obtained results improve existing ones in the literature.\n', ""Sequential constant rank constraint qualifications for nonlinear\n semidefinite programming with applications We present new constraint qualification conditions for nonlinear semidefinite\nprogramming that extend some of the constant rank-type conditions from\nnonlinear programming. As an application of these conditions, we provide a\nunified global convergence proof of a class of algorithms to stationary points\nwithout assuming neither uniqueness of the Lagrange multiplier nor boundedness\nof the Lagrange multipliers set. This class of algorithm includes, for\ninstance, general forms of augmented Lagrangian, sequential quadratic\nprogramming, and interior point methods. We also compare these new conditions\nwith some of the existing ones, including the nondegeneracy condition,\nRobinson's constraint qualification, and the metric subregularity constraint\nqualification.\n"", ""Naive constant rank-type constraint qualifications for multifold\n second-order cone programming and semidefinite programming The constant rank constraint qualification, introduced by Janin in 1984 for\nnonlinear programming, has been extensively used for sensitivity analysis,\nglobal convergence of first- and second-order algorithms, and for computing the\nderivative of the value function. In this paper we discuss naive extensions of\nconstant rank-type constraint qualifications to second-order cone programming\nand semidefinite programming, which are based on the\nApproximate-Karush-Kuhn-Tucker necessary optimality condition and on the\napplication of the reduction approach. Our definitions are strictly weaker than\nRobinson's constraint qualification, and an application to the global\nconvergence of an augmented Lagrangian algorithm is obtained.\n""]","[('semidefinite programming', 0.6127392649650574), ('constrained optimization problems', 0.5555292367935181), ('constrained optimization', 0.5464184284210205), ('cone programming', 0.5039575695991516), ('nonlinear programming', 0.5007531046867371), ('constraint qualification', 0.49323174357414246), ('optimality conditions', 0.4926885664463043), ('necessary optimality conditions', 0.4917795956134796), ('order optimality conditions', 0.4893471896648407), ('second order optimality', 0.48871850967407227)]" 84,84,279,84_quadratic number fields_galois groups_fields galois_galois extensions,"['quadratic number fields', 'galois groups', 'fields galois', 'galois extensions', 'mathbb _p extensions', 'extensions number fields', 'galois group', 'galois group maximal', 'quadratic fields', 'galois']","[""Stabilization on ideal class groups in potential cyclic towers Let $p$ be a prime and let $F$ be a number field. Consider a Galois extension $K/F$ with Galois group $H\\rtimes \\Delta$ where $H\\cong \\mathbb{Z}_p$ or $\\mathbb{Z}/p^d\\mathbb{Z}$, and $\\Delta$ is an arbitrary Galois group. The subfields fixed\n by $H^{p^n} \\rtimes \\Delta$ $(n=0,1,\\cdots)$ form a tower which we call it a potential cyclic $p$-tower in this paper. A radical $p$-tower is a typical example, say $\\mathbb{Z}\\subset \\mathbb{Z}(\\sqrt[p]{a})\\subset \\mathbb{Z}(\\sqrt[p^2]{a})\\subset \\cdots$ where $a\\in \\mathbb{Z}$.\n We extend the stabilization result of Fukuda in Iwasawa theory on $p$-class groups in cyclic $p$-towers to potential cyclic $p$-towers. We also extend Iwasawa's class number formula in $\\mathbb{Z}_p$-extensions to potential $\\mathbb{Z}_p$-extensions."", ""On the $p$-rationality of consecutive quadratic fields In 2016, in the work related to Galois representations, Greenberg conjectured\nthe existence of multi-quadratic $p$-rational number fields of degree $2^{t}$\nfor any odd prime number $p$ and any integer $t \\geq 1$. Using the criteria\nprovided by him to check $p$-rationality for abelian number fields, certain\ninfinite families of quadratic, biquadratic and triquadratic $p$-rational\nfields have been shown to exist in recent years. In this article, for any\ninteger $k \\geq 1$, we build upon the existing work and prove the existence of\ninfinitely many prime numbers $p$ for which the imaginary quadratic fields\n$\\mathbb{Q}(\\sqrt{-(p - 1)}),\\ldots,\\mathbb{Q}(\\sqrt{-(p - k)})$ and\n$\\mathbb{Q}(\\sqrt{-p(p - 1)}),\\ldots, \\mathbb{Q}(\\sqrt{-p(p - k)})$ are all\n$p$-rational. This can be construed as analogous results in the spirit of\nIizuka's conjecture on the divisibility of class numbers of consecutive\nquadratic fields. We also address a similar question of $p$-rationality for two\nconsecutive real quadratic fields by proving the existence of infinitely many\n$p$-rational fields of the form $\\mathbb{Q}(\\sqrt{p^{2} + 1})$ and\n$\\mathbb{Q}(\\sqrt{p^{2} + 2})$. The result for imaginary quadratic fields is\naccomplished by producing infinitely many primes for which the corresponding\nconsecutive discriminants have large square divisors and the same for real\nquadratic fields is proven using a result of Heath-Brown on the density of\nsquare-free values of polynomials at prime arguments.\n"", 'Theoretical and Experimental Approach to p-Class Field Towers of Cyclic\n Cubic Number Fields Cyclic number fields of odd prime degree are constructed as ray class fields\nover the rational number field. They are collected in multiplets sharing a\ncommon conductor and discriminant. The algorithms are implemented in Magma and\napplied to all cyclic quintic and cyclic cubic fields with conductors below\n100000. Our primary attention is devoted to the theory of cyclic cubic fields\nwith two or three prime divisors of the conductor. These fields form doublets\nand quartets. Theoretical techniques comprise cubic residue conditions between\nthe primes dividing the conductor, the structure of 3-class groups of all\ncomponents of doublets and quartets, Galois cohomology of unit groups and\nambiguous principal ideals, absolute genus fields and their bicyclic bicubic\nsubfields, class number relations, transfer kernels and abelian quotient\ninvariants of unramified cyclic cubic extensions and their impact on the class\nfield tower, pattern recognition via Artin transfers on descendant trees of\nfinite groups with order a power of 3, the Shafarevich Theorem on the relation\nrank of the 3-class field tower group, and the Galois action on the tower group\nand on its metabelianization. Rigorous proofs are given for the first\noccurrences of three-stage towers over cyclic cubic fields with elementary\nbicyclic or tricyclic or non-elementary bicyclic 3-class group. Experimentally,\nthe second p-class groups and the length of the p-class tower are determined\nfor all conductors below 100000 and for p=2,3,5, with the exception of the few\nintricate octets. An interesting application is able to identify and realize\nthe closed groups by Andozhskii and Tsvetkov.\n']","[('quadratic number fields', 0.565743088722229), ('galois groups', 0.5442380905151367), ('fields galois', 0.531828761100769), ('galois extensions', 0.5162577629089355), ('mathbb _p extensions', 0.5123005509376526), ('extensions number fields', 0.5075085759162903), ('galois group', 0.5030907392501831), ('galois group maximal', 0.4814697206020355), ('quadratic fields', 0.4791232645511627), ('galois', 0.47225701808929443)]" 85,85,276,85_mean curvature flows_mean curvature flow_curvature flows_solutions mean curvature,"['mean curvature flows', 'mean curvature flow', 'curvature flows', 'solutions mean curvature', 'curvature flow', 'mean curvature', 'curvature flow closed', 'inverse mean curvature', 'curvatures', 'principal curvatures']","['Singularity of mean curvature flow with bounded mean curvature and Morse\n index We study the multiplicity of the singularity of mean curvature flow with\nbounded mean curvature and Morse index. For $3\\leq n\\leq 6$, we show that\neither the mean curvature or the Morse index blows up at the first singular\ntime for a closed smooth embedded mean curvature flow in $\\mathbb{R}^{n+1}$.\n', 'Rotational symmetry of uniformly 3-convex translating solitons of mean\n curvature flow in higher dimensions In this paper, we generalize a previous result to higher dimension. We prove\nthat uniformly 3-convex translating solitons of mean curvature flow in\n$\\mathbb{R}^{n+1}$ which arise as blow up limit of embedded, mean convex mean\ncurvature flow must have $SO(n-1)$ symmetry.\n', '$SO(2)$ symmetry of the translating solitons of the mean curvature flow\n in $\\mathbb{R}^4$ In this paper, we prove that the translating solitons of the mean curvature\nflow in $\\mathbb{R}^4$ which arise as blow up limit of embedded, mean convex\nmean curvature flow must have $SO(2)$ symmetry.\n']","[('mean curvature flows', 0.7938017845153809), ('mean curvature flow', 0.7516584396362305), ('curvature flows', 0.7194390892982483), ('solutions mean curvature', 0.68611079454422), ('curvature flow', 0.673192024230957), ('mean curvature', 0.6568965315818787), ('curvature flow closed', 0.6525897979736328), ('inverse mean curvature', 0.6291971206665039), ('curvatures', 0.5913762450218201), ('principal curvatures', 0.5739877223968506)]" 86,86,272,86_vortex dynamics_euler flows_vortex sheets_incompressible euler equations,"['vortex dynamics', 'euler flows', 'vortex sheets', 'incompressible euler equations', 'vortex sheet', '2d euler equations', 'vortex system', '3d euler equations', 'dimensional euler equations', 'dimensional incompressible euler']","[""On concentrated vortices of 3D incompressible Euler equations under\n helical symmetry: with swirl In this paper, we consider the existence of concentrated helical vortices of\n3D incompressible Euler equations with swirl. First, without the assumption of\nthe orthogonality condition, we derive a 2D vorticity-stream formulation of 3D\nincompressible Euler equations under helical symmetry. Then based on this\nsystem, we deduce a non-autonomous second order semilinear elliptic equations\nin divergence form, whose solutions correspond to traveling-rotating invariant\nhelical vortices with non-zero helical swirl. Finally, by using Arnold's\nvariational method, that is, finding maximizers of a properly defined energy\nfunctional over a certain function space and proving the asymptotic behavior of\nmaximizers, we construct families of concentrated traveling-rotating helical\nvortices of 3D incompressible Euler equations with non-zero helical swirl in\ninfinite cylinders. As parameter $ \\varepsilon\\to0 $, the associated vorticity\nfields tend asymptotically to a singular helical vortex filament evolved by the\nbinormal curvature flow.\n"", 'Contour dynamics and global regularity for periodic vortex patches and\n layers We study vortex patches for the 2D incompressible Euler equations. Prior\nworks on this problem take the support of the vorticity (i.e., the vortex\npatch) to be a bounded region. We instead consider the horizontally periodic\nsetting. This includes both the case of a periodic array of bounded vortex\npatches and the case of vertically bounded vortex layers. We develop the\ncontour dynamics equation for the boundary of the patch in this horizontally\nperiodic setting, and demonstrate global $C^{1,\\epsilon}$ regularity of this\npatch boundary. In the process of formulating the problem, we consider\ndifferent notions of periodic solutions of the 2D incompressible Euler\nequations, and demonstrate equivalence of these.\n', 'Convergence of filtered weak solutions to the 2D Euler equations with\n vortex sheet initial data We study weak solutions of the two-dimensional (2D) filtered Euler equations\nwhose vorticity is a finite Radon measure and velocity has locally finite\nkinetic energy, which is called the vortex sheet solution. The filtered Euler\nequations are a regularized model based on a spatial filtering to the Euler\nequations. The 2D filtered Euler equations have a unique global weak solution\nfor measure valued initial vorticity, while the 2D Euler equations require\ninitial vorticity to be in the vortex sheet class with a distinguished sign for\nthe existence of global solutions. In this paper, we prove that vortex sheet\nsolutions of the 2D filtered Euler equations converge to those of the 2D Euler\nequations in the limit of the filtering parameter provided that initial vortex\nsheet has a distinguished sign. We also show that a simple application of our\nproof yields the convergence of the vortex blob method for vortex sheet\nsolutions. Moreover, we make it clear what kind of condition should be imposed\non the spatial filter to show the convergence results and, according to the\ncondition, these results are applicable to well-known regularized models like\nthe Euler-$\\alpha$ model and the vortex blob model.\n']","[('vortex dynamics', 0.6414027214050293), ('euler flows', 0.5929661989212036), ('vortex sheets', 0.5679395198822021), ('incompressible euler equations', 0.5597637295722961), ('vortex sheet', 0.5404634475708008), ('2d euler equations', 0.5338709950447083), ('vortex system', 0.5298762321472168), ('3d euler equations', 0.5253154635429382), ('dimensional euler equations', 0.5214244723320007), ('dimensional incompressible euler', 0.5210809111595154)]" 87,87,267,87_metrizable spaces_tychonoff space_separable metrizable_metrizable space,"['metrizable spaces', 'tychonoff space', 'separable metrizable', 'metrizable space', 'countable space', 'countably compact', 'hausdorff spaces', 'compact spaces', 'hausdorff space', 'generalized topological']","[""Topological properties of some function spaces Let $Y$ be a metrizable space containing at least two points, and let $X$ be\na $Y_{\\mathcal{I}}$-Tychonoff space for some ideal $\\mathcal{I}$ of compact\nsets of $X$. Denote by $C_{\\mathcal{I}}(X,Y)$ the space of continuous functions\nfrom $X$ to $Y$ endowed with the $\\mathcal{I}$-open topology. We prove that\n$C_{\\mathcal{I}}(X,Y)$ is Fr\\'{e}chet - Urysohn iff $X$ has the property\n$\\gamma_{\\mathcal{I}}$. We characterize zero - dimensional Tychonoff spaces $X$\nfor which the space $C_{\\mathcal{I}}(X,{\\bf 2})$ is sequential. Extending the\nclassical theorems of Gerlits, Nagy and Pytkeev we show that if $Y$ is not\ncompact, then $C_{p}(X,Y)$ is Fr\\'{e}chet - Urysohn iff it is sequential iff it\nis a $k$-space iff $X$ has the property $\\gamma$. An analogous result is\nobtained for the space of bounded continuous functions taking values in a\nmetrizable locally convex space. Denote by $B_{1}(X,Y)$ and $B(X,Y)$ the space\nof Baire one functions and the space of all Baire functions from $X$ to $Y$,\nrespectively. If $H$ is a subspace of $B(X,Y)$ containing $B_{1}(X,Y)$, then\n$H$ is metrizable iff it is a $\\sigma$ - space iff it has countable $cs^*$ -\ncharacter iff $X$ is countable. If additionally $Y$ is not compact, then $H$ is\nFr\\'{e}chet - Urysohn iff it is sequential iff it is a $k$ - space iff it has\ncountable tightness iff $X_{\\aleph_0}$ has the property $\\gamma$, where\n$X_{\\aleph_0}$ is the space $X$ with the Baire topology. We show that if $X$ is\na Polish space, then the space $B_{1}(X,\\mathbb{R})$ is normal iff $X$ is\ncountable.\n"", 'Baire property of some function spaces A compact space $X$ is called $\\pi$-monolithic if for any surjective\ncontinuous mapping $f:X\\rightarrow K$ where $K$ is a metrizable compact space\nthere exists a metrizable compact space $T\\subseteq X$ such that $f(T)=K$. A\ntopological space $X$ is Baire if the intersection of any sequence of open\ndense subsets of $X$ is dense in $X$. Let $C_p(X,Y)$ denote the space of all\ncontinuous $Y$- valued functions $C(X,Y)$ on a Tychonoff space $X$ with the\ntopology of pointwise convergence. In this paper we have proved that for a\ntotally disconnected space $X$ the space $C_p(X,\\{0,1\\})$ is Baire if, and only\nif, $C_p(X,K)$ is Baire for every $\\pi$-monolithic compact space $K$. For a\nTychonoff space $X$ the space $C_p(X)$ is Baire if, and only if, $C_p(X,L)$ is\nBaire for each Frechet space $L$. We construct a totally disconnected Tychonoff\nspace $T$ such that $C_p(T,M)$ is Baire for a separable metric space $M$ if,\nand only if, $M$ is a Peano continuum. Moreover, $C_p(T,[0,1])$ is Baire but\n$Cp(T,\\{0,1\\})$ is not.\n', 'Baire property of space of Baire-one functions A topological space $X$ is Baire if the Baire Category Theorem holds for $X$,\ni.e., the intersection of any sequence of open dense subsets of $X$ is dense in\n$X$. One of the interesting problems for the space $B_1(X)$ of all Baire-one\nreal-valued functions is characterization topological space $X$ for which the\nfunction space $B_1(X)$ is Baire. In this paper, we solve this problem, namely,\nwe have obtained a characterization when a function space $B_1(X)$ has the\nBaire property for any Tychonoff space $X$. Also we proved that $B_1(X)$ is\nBaire for any $\\gamma$-space $X$. This answers a question posed recently by T.\nBanakh and S. Gabriyelyan. We also conclude that, it is consistent there are no\nuncountable separable metrizable space $X$ such that $B_1(X)$ is countable\ndense homogeneous.\n']","[('metrizable spaces', 0.6194747090339661), ('tychonoff space', 0.5485701560974121), ('separable metrizable', 0.5417811274528503), ('metrizable space', 0.5363223552703857), ('countable space', 0.528065025806427), ('countably compact', 0.5270681977272034), ('hausdorff spaces', 0.5106580257415771), ('compact spaces', 0.5068575143814087), ('hausdorff space', 0.5045709609985352), ('generalized topological', 0.4913943409919739)]" 88,88,266,88_extriangulated category_triangulated categories_categories triangulated_triangulated category,"['extriangulated category', 'triangulated categories', 'categories triangulated', 'triangulated category', 'triangulated category mathcal', 'exact categories', 'angulated category', 'abelian categories', 'categories', 'additive category']","['Hearts of twin Cotorsion pairs on extriangulated categories In this article, we study the heart of a cotorsion pairs on an exact category\nand a triangulated category in a unified meathod, by means of the notion of an\nextriangulated category. We prove that the heart is abelian, and construct a\ncohomological functor to the heart. If the extriangulated category has enough\nprojectives, this functor gives an equivalence between the heart and the\ncategory of coherent functors over the coheart modulo projectives. We also show\nhow an n-cluster tilting subcategory of an extriangulated category gives rise\nto a family of cotorsion pairs with equivalent hearts.\n', 'Recollements of extriangulated categories We give a simultaneous generalization of recollements of abelian categories\nand triangulated categories, which we call recollements of extriangulated\ncategories. For a recollement $(\\mathcal{A}$, $\\mathcal{B}$, $\\mathcal{C})$ of\nextriangulated categories, we show that cotorsion pairs in $\\mathcal{A}$ and\n$\\mathcal{C}$ induce cotorsion pairs in $\\mathcal{B}$ under certain conditions.\nAs an application, our main result recovers a result given by Chen for\nrecollements of triangulated categories, and it also shows a new phenomena when\nit is applied to abelian categories.\n', 'Auslander-Buchweitz Approximation Theory for Extriangulated Categories Extriangulated categories were introduced by Nakaoka and Palu as a\nsimultaneous generalization of exact categories and triangulated categories. In\nthis paper, we introduce and develop an analogous theory of Auslander-Buchweitz\napproximations for extriangulated categories. We establish the existence of\nprecovers pand preenvelopesq and obtain characterizations of relative\nhomological dimensions, which are based on certain subcategories under\nfiniteness of resolutions. Finally, we give a description of cotorsion pairs on\nextriangulated categories under some conditions, and provide a characterization\nof silting subcategories on stable categories. Keywords: Extriangulated\ncategory; Homological dimension; Cogenerator; Cotorsion pair.\n']","[('extriangulated category', 0.7464921474456787), ('triangulated categories', 0.7418402433395386), ('categories triangulated', 0.720866858959198), ('triangulated category', 0.6953268051147461), ('triangulated category mathcal', 0.6687672138214111), ('exact categories', 0.6244263052940369), ('angulated category', 0.6020929217338562), ('abelian categories', 0.5959756970405579), ('categories', 0.5676780939102173), ('additive category', 0.5550919771194458)]" 89,89,263,89_siegel modular forms_hilbert modular forms_eisenstein series_holomorphic modular forms,"['siegel modular forms', 'hilbert modular forms', 'eisenstein series', 'holomorphic modular forms', 'modular forms', 'valued modular forms', 'siegel modular', 'weight modular forms', 'modular forms weight', 'quasi modular forms']","['Harmonic weak Maass forms and periods II In this paper we investigate the Fourier coefficients of harmonic Maass forms\nof negative half-integral weight. We relate the algebraicity of these\ncoefficients to the algebraicity of the coefficients of certain canonical\nmeromorphic modular forms of positive even weight with poles at Heegner\ndivisors. Moreover, we give an explicit formula for the coefficients of\nharmonic Maass forms in terms of periods of certain meromorphic modular forms\nwith algebraic coefficients.\n', 'Maass lifts of half-integral weight Eisenstein series and theta powers In this paper, we explicitly construct mock modular forms whose shadows are\nEisenstein series of arbitrary integral and half-integral weight, level and\ncharacter at the cusps $\\infty$ and $0$. As an application, we give explicit\nconstruction of harmonic weak Maass forms which are Hecke eigenforms and are\nthe preimages of $\\Theta^k, k \\in \\{ 3, 5, 7\\}$ under the shadow operator,\nwhere $\\Theta$ is the classical Jacobi theta function.\n', ""A remark on $p$-adic Siegel Eisenstein series A generalization of Serre's $p$-adic Eisenstein series in the case of Siegel\nmodular forms is studied and a coincidence between a $p$-adic Siegel Eisenstein\nseries and a genus theta series associated with a quaternary quadratic form is\nproved.\n""]","[('siegel modular forms', 0.7476714253425598), ('hilbert modular forms', 0.6601201891899109), ('eisenstein series', 0.6585590839385986), ('holomorphic modular forms', 0.6557342410087585), ('modular forms', 0.645485520362854), ('valued modular forms', 0.6452688574790955), ('siegel modular', 0.6184440851211548), ('weight modular forms', 0.6157535910606384), ('modular forms weight', 0.6040919423103333), ('quasi modular forms', 0.602994978427887)]" 90,90,262,90_bethe ansatz equations_bethe equations_bethe ansatz_quantum spin chains,"['bethe ansatz equations', 'bethe equations', 'bethe ansatz', 'quantum spin chains', 'quantum spin chain', 'quantum chains', 'spin chains', 'xxz spin chain', 'heisenberg spin', 'bethe']","['Phantom Bethe roots in the integrable open spin $1/2$ $XXZ$ chain We investigate special solutions to the Bethe Ansatz equations (BAE) for open\nintegrable $XXZ$ Heisenberg spin chains containing phantom (infinite) Bethe\nroots. The phantom Bethe roots do not contribute to the energy of the Bethe\nstate, so the energy is determined exclusively by the remaining regular\nexcitations. We rederive the phantom Bethe roots criterion and focus on BAE\nsolutions for mixtures of phantom roots and regular (finite) Bethe roots. We\nprove that in the presence of phantom Bethe roots, all eigenstates are split\nbetween two invariant subspaces, spanned by chiral shock states. Bethe\neigenstates are described by two complementary sets of Bethe Ansatz equations\nfor regular roots, one for each invariant subspace. The respective\n""semi-phantom"" Bethe vectors are states of chiral nature, with chirality\nproperties getting less pronounced when more regular Bethe roots are added. For\nthe easy plane case ""semi-phantom"" Bethe states carry nonzero magnetic current,\nand are characterized by quasi-periodic modulation of the magnetization\nprofile, the most prominent example being the spin helix states (SHS). We\nillustrate our results investigating ""semi-phantom"" Bethe states generated by\none regular Bethe root (the other Bethe roots being phantom), with simple\nstructure of the invariant subspace, in all details. We obtain the explicit\nexpressions for Bethe vectors, and calculate the simplest correlation\nfunctions, including the spin-current for all the states in the single particle\nmultiplet.\n', 'Bethe Ansatz, Quantum Circuits, and the F-basis The Bethe Ansatz is a method for constructing exact eigenstates of quantum-integrable spin chains. Recently, deterministic quantum algorithms, referred to as ""algebraic Bethe circuits"", have been developed to prepare Bethe states for the spin-1/2 XXZ model. These circuits represent a unitary formulation of the standard algebraic Bethe Ansatz, expressed using matrix-product states that act on both the spin chain and an auxiliary space. In this work, we systematize these previous results, and show that algebraic Bethe circuits can be derived by a change of basis in the auxiliary space. The new basis, identical to the ""F-basis"" known from the theory of quantum-integrable models, generates the linear superposition of plane waves that is characteristic of the coordinate Bethe Ansatz. We explain this connection, highlighting that certain properties of the F-basis (namely, the exchange symmetry of the spins) are crucial for the construction of algebraic Bethe circuits. We demonstrate our approach by presenting new quantum circuits for the inhomogeneous spin-1/2 XXZ model.', 'Nested algebraic Bethe ansatz for orthogonal and symplectic open spin\n chains We present a nested algebraic Bethe ansatz for one-dimensional open so(2n)-\nand sp(2n)-symmetric spin chains with diagonal boundary conditions and\ndescribed by the extended twisted Yangian. We use a generalization of the Bethe\nansatz introduced by De Vega and Karowski which allows us to relate the\nspectral problem of a so(2n)- or sp(2n)-symmetric open spin chain to that of a\ngl(n)-symmetric open spin chain. We explicitly derive the structure of Bethe\nvectors and the nested Bethe equations.\n']","[('bethe ansatz equations', 0.7015261650085449), ('bethe equations', 0.6371603608131409), ('bethe ansatz', 0.5803810358047485), ('quantum spin chains', 0.5750341415405273), ('quantum spin chain', 0.5360403656959534), ('quantum chains', 0.5173208117485046), ('spin chains', 0.5068432092666626), ('xxz spin chain', 0.47932904958724976), ('heisenberg spin', 0.4690430462360382), ('bethe', 0.46574804186820984)]" 91,91,261,91_coded caching_caching_cache_caches,"['coded caching', 'caching', 'cache', 'caches', 'local cache', 'cache enabled', 'cached', 'scheme proposed', 'index coding', 'proposed scheme']","['Three-user D2D Coded Caching with Two Random Requesters and One Sender In device-to-device (D2D) coded caching problems, it is possible that not all\nusers will make file requests in the delivery phase. Hence, we propose a new\nD2D centralized coded caching problem, named the 3-user D2D coded caching with\ntwo random requesters and one sender (2RR1S), where in the delivery phase, any\ntwo of the three users will make file requests, and the user that does not make\nany file request is the designated sender. We find the optimal caching and\ndelivery scheme, denoted as the 2RRIS scheme, for any number of files N by\nproving matching converse and achievability results. It is shown that coded\ncache placement is needed to achieve the optimal performance. Furthermore, the\noptimal rate-memory tradeoff has a uniform expression for N>=4 and different\nexpressions for N=2 and 3.\n To examine the usefulness of the proposed model and scheme, we adapt the\n2RR1S scheme to three scenarios. The first one is the 3-user D2D coded caching\nmodel proposed by Ji et al. By characterizing the optimal rate-memory tradeoff\nfor the 3-user D2D coded caching when N=2, which was previously unknown, we\nshow that the adapted 2RR1S scheme is in fact optimal for the 3-user D2D coded\ncaching problem when N=2 and the cache size is medium. The benefit comes from\ncoded cache placement which is missing from existing D2D coded caching schemes.\nThe second scenario is where in the delivery phase, each user makes a file\nrequest randomly and independently with the same probability p. We call this\nmodel the request-random D2D coded caching problem. Adapting the 2RR1S scheme\nto this scenario, we show the superiority of our adapted scheme over other\nexisting D2D coded caching schemes for medium to large cache size. The third\nscenario is the K-user D2D coded caching with K-s random requesters and s\nsenders problem, for which an achievability result is obtained by generalizing\nthe 2RR1S scheme.\n', 'Improved Hotplug Caching Schemes Using PDAs and t-Designs We consider a coded caching system in which some users are offline at the\ntime of delivery. Such systems are called hotplug coded caching systems. A\nplacement delivery array (PDA) is a well-known tool for constructing a coded\ncaching scheme for dedicated caches. In this paper, we introduce the concept of\nPDAs for hotplug coded caching schemes and refer to it as a hotplug placement\ndelivery array (HpPDA). We give an algorithm to describe the placement and the\ndelivery phase of a hotplug coded caching scheme using HpPDA. We show that an\nexisting hotplug coded caching scheme given by Y. Ma and D. Tuninetti in 2022\ncorresponds to a class of HpPDAs and then propose a method to further improve\nthe rate of that scheme. Additionally, we construct a class of HpPDAs using\n$t$-designs, which corresponds to a scheme for hotplug coded caching systems.\nWe further improve the rate of this scheme and prove that the cut-set bound is\nachieved in some higher memory range for a hotplug coded caching system with\nthree active users.\n', 'A Novel Transformation Approach of Shared-link Coded Caching Schemes for\n Multiaccess Networks This paper considers the multiaccess coded caching systems formulated by\nHachem et al., including a central server containing $N$ files connected to $K$\ncache-less users through an error-free shared link, and $K$ cache-nodes, each\nequipped with a cache memory size of $M$ files. Each user has access to $L$\nneighbouring cache-nodes with a cyclic wrap-around topology. The coded caching\nscheme proposed by Hachem et al. suffers from the case that $L$ does not divide\n$K$, where the needed number of transmissions (a.k.a. load) is at most four\ntimes the load expression for the case where $L$ divides $K$.\n Our main contribution is to propose a novel {\\it transformation} approach to\nsmartly extend the schemes satisfying some conditions for the well known\nshared-link caching systems to the multiaccess caching systems. Then we can get\nmany coded caching schemes with different subpacketizations for multiaccess\ncoded caching system. These resulting schemes have the maximum local caching\ngain (i.e., the cached contents stored at any $L$ neighbouring cache-nodes are\ndifferent such that the number of retrieval packets by each user from the\nconnected cache-nodes is maximal) and the same coded caching gain as the\noriginal schemes. Applying the transformation approach to the well-known\nshared-link coded caching scheme proposed by Maddah-Ali and Niesen, we obtain a\nnew multiaccess coded caching scheme that achieves the same load as the scheme\nof Hachem et al. but for any system parameters. Under the constraint of the\ncache placement used in this new multiaccess coded caching scheme, our delivery\nstrategy is approximately optimal when $K$ is sufficiently large. Finally, we\nalso show that the transmission load of the proposed scheme can be further\nreduced by compressing the multicast message.\n']","[('coded caching', 0.7535286545753479), ('caching', 0.6457014083862305), ('cache', 0.6210858225822449), ('caches', 0.5804551839828491), ('local cache', 0.5669061541557312), ('cache enabled', 0.49716800451278687), ('cached', 0.42262202501296997), ('scheme proposed', 0.31702783703804016), ('index coding', 0.3131149411201477), ('proposed scheme', 0.31181076169013977)]" 92,92,256,92_pressure formulation_fluid structure interaction_flow porous media_mixed finite element,"['pressure formulation', 'fluid structure interaction', 'flow porous media', 'mixed finite element', 'poroelasticity', 'fluid structure', 'poroelastic', 'flow porous', 'field formulation', 'multiscale finite element']","['A mixed elasticity formulation for fluid-poroelastic structure\n interaction We develop a mixed finite element method for the coupled problem arising in\nthe interaction between a free fluid governed by the Stokes equations and flow\nin deformable porous medium modeled by the Biot system of poroelasticity. Mass\nconservation, balance of stress, and the Beavers--Joseph--Saffman condition are\nimposed on the interface. We consider a fully mixed Biot formulation based on a\nweakly symmetric stress-displacement-rotation elasticity system and Darcy\nvelocity-pressure flow formulation. A velocity-pressure formulation is used for\nthe Stokes equations. The interface conditions are incorporated through the\nintroduction of the traces of the structure velocity and the Darcy pressure as\nLagrange multipliers. Existence and uniqueness of a solution are established\nfor the continuous weak formulation. Stability and error estimates are derived\nfor the semi-discrete continuous-in-time mixed finite element approximation.\nNumerical experiments are presented to verify the theoretical results and\nillustrate the robustness of the method with respect to the physical\nparameters.\n', 'Domain decomposition and partitioning methods for mixed finite element\n discretizations of the Biot system of poroelasticity We develop non-overlapping domain decomposition methods for the Biot system\nof poroelasticity in a mixed form. The solid deformation is modeled with a\nmixed three-field formulation with weak stress symmetry. The fluid flow is\nmodeled with a mixed Darcy formulation. We introduce displacement and pressure\nLagrange multipliers on the subdomain interfaces to impose weakly continuity of\nnormal stress and normal velocity, respectively. The global problem is reduced\nto an interface problem for the Lagrange multipliers, which is solved by a\nKrylov space iterative method. We study both monolithic and split methods. In\nthe monolithic method, a coupled displacement-pressure interface problem is\nsolved, with each iteration requiring the solution of local Biot problems. We\nshow that the resulting interface operator is positive definite and analyze the\nconvergence of the iteration. We further study drained split and fixed stress\nBiot splittings, in which case we solve separate interface problems requiring\nelasticity and Darcy solves. We analyze the stability of the split\nformulations. Numerical experiments are presented to illustrate the convergence\nof the domain decomposition methods and compare their accuracy and efficiency.\n', 'A coupled multipoint stress -- multipoint flux mixed finite element\n method for the Biot system of poroelasticity We present a mixed finite element method for a five-field formulation of the\nBiot system of poroelasticity that reduces to a cell-centered\npressure-displacement system on simplicial and quadrilateral grids. A mixed\nstress-displacement-rotation formulation for elasticity with weak stress\nsymmetry is coupled with a mixed velocity-pressure Darcy formulation. The\nspatial discretization is based on combining the multipoint stress mixed finite\nelement (MSMFE) method for elasticity and the multipoint flux mixed finite\nelement (MFMFE) method for Darcy flow. It uses the lowest order\nBrezzi-Douglas-Marini mixed finite element spaces for the poroelastic stress\nand Darcy velocity, piecewise constant displacement and pressure, and\ncontinuous piecewise linear or bilinear rotation. A vertex quadrature rule is\napplied to the velocity, stress, and stress-rotation bilinear forms, which\nblock-diagonalizes the corresponding matrices and allows for local velocity,\nstress, and rotation elimination. This leads to a cell-centered\npositive-definite system for pressure and displacement at each time step. We\nperform error analysis for the semidiscrete and fully discrete formulations,\nestablishing first order convergence for all variables in their natural norms.\nThe numerical tests confirm the theoretical convergence rates and illustrate\nthe locking-free property of the method.\n']","[('pressure formulation', 0.42695096135139465), ('fluid structure interaction', 0.3812106251716614), ('flow porous media', 0.3785087764263153), ('mixed finite element', 0.3664292097091675), ('poroelasticity', 0.36236104369163513), ('fluid structure', 0.3464917838573456), ('poroelastic', 0.33886784315109253), ('flow porous', 0.33303532004356384), ('field formulation', 0.32862433791160583), ('multiscale finite element', 0.32195764780044556)]" 93,93,256,93_intersecting families_intersecting family_intersecting every_family mathcal subsets,"['intersecting families', 'intersecting family', 'intersecting every', 'family mathcal subsets', 'extremal families', 'families subsets', 'family sets', 'family subsets', 'intersections', 'intersecting']","['On a conjecture of Tokushige for cross-$t$-intersecting families Two families of sets $\\mathcal{A}$ and $\\mathcal{B}$ are called\ncross-$t$-intersecting if $|A\\cap B|\\ge t$ for all $A\\in \\mathcal{A}$, $B\\in\n\\mathcal{B}$. An active problem in extremal set theory is to determine the\nmaximum product of sizes of cross-$t$-intersecting families. This incorporates\nthe classical Erd\\H{o}s--Ko--Rado (EKR) problem. In the present paper, we prove\nthat if $\\mathcal{A}$ and $\\mathcal{B}$ are cross-$t$-intersecting families of\n$\\binom {[n]}k$ with $k\\ge t\\ge 3$ and $n\\ge (t+1)(k-t+1)$, then\n$|\\mathcal{A}||\\mathcal{B}|\\le {\\binom{n-t}{k-t}}^2$; moreover, if\n$n>(t+1)(k-t+1)$, then equality holds if and only if $\\mathcal{A}=\\mathcal{B}$\nis a maximum $t$-intersecting subfamily of $\\binom{[n]}{k}$. This confirms a\nconjecture of Tokushige for $t\\ge 3$.\n', 'A note on distinct differences in $t$-intersecting families For a family $\\mathcal{F}$ of subsets of $\\{1,2,\\ldots,n\\}$, let\n$\\mathcal{D}(\\mathcal{F}) = \\{F\\setminus G: F, G \\in \\mathcal{F}\\}$ be the\ncollection of all (setwise) differences of $\\mathcal{F}$. The family\n$\\mathcal{F}$ is called a $t$-intersecting family, if for some positive integer\n$t$ and any two members $F, G \\in \\mathcal{F}$ we have $|F\\cap G| \\geq t$. The\nfamily $\\mathcal{F}$ is simply called intersecting if $t=1$. Recently, Frankl\nproved an upper bound on the size of $\\mathcal{D}(\\mathcal{F})$ for the\nintersecting families $\\mathcal{F}$. In this note we extend the result of\nFrankl to $t$-intersecting families.\n', ""Stabilities of intersecting families revisited The well-known Erd\\H{o}s--Ko--Rado theorem states that for $n> 2k$, every\nintersecting family of $k$-sets of $[n]:=\\{1,\\ldots ,n\\}$ has at most $ {n-1\n\\choose k-1}$ sets, and the extremal family consists of all $k$-sets containing\na fixed element (called a full star). The Hilton--Milner theorem provides a\nstability result by determining the maximum size of a uniform intersecting\nfamily that is not a subfamily of a full star. The further stabilities were\nstudied by Han and Kohayakawa (2017) and Huang and Peng (2024). Two families\n$\\mathcal{F}$ and $\\mathcal{G}$ are called cross-intersecting if for every\n$F\\in \\mathcal{F}$ and $G\\in \\mathcal{G}$, the intersection $F\\cap G$ is\nnon-empty. Let $k \\geq 1, t\\ge 0$ and $n \\geq 2 k+t$ be integers. Frankl (2016)\nproved that if $\\mathcal{F} \\subseteq\\binom{[n]}{k+t}$ and $\\mathcal{G}\n\\subseteq\\binom{[n]}{k}$ are cross-intersecting families, and $\\mathcal{F}$ is\nnon-empty and $(t+1)$-intersecting, then $|\\mathcal{F}|+|\\mathcal{G}|\n\\leq\\binom{n}{k}-\\binom{n-k-t}{k}+1$. Recently, Wu (2023) sharpened Frankl's\nresult by establishing a stability variant. The aim of this paper is two-fold.\nInspired by the above results, we first prove a further stability variant that\ngeneralizes both Frankl's result and Wu's result. Secondly, as an interesting\napplication, we illustrate that the aforementioned results on\ncross-intersecting families could be used to establish the stability results of\nthe Erd\\H{o}s--Ko--Rado theorem. More precisely, we present new short proofs of\nthe Hilton--Milner theorem, the Han--Kohayakawa theorem and the Huang--Peng\ntheorem. Our arguments are more straightforward, and it may be of independent\ninterest.\n""]","[('intersecting families', 0.6255097389221191), ('intersecting family', 0.5681121349334717), ('intersecting every', 0.4647175371646881), ('family mathcal subsets', 0.45719388127326965), ('extremal families', 0.44907423853874207), ('families subsets', 0.44405701756477356), ('family sets', 0.4158506691455841), ('family subsets', 0.4139929711818695), ('intersections', 0.4130651652812958), ('intersecting', 0.39788901805877686)]" 94,94,254,94_ensemble kalman filter_ensemble kalman_kalman filtering_kalman filters,"['ensemble kalman filter', 'ensemble kalman', 'kalman filtering', 'kalman filters', 'kalman filter', 'ensemble gaussian', 'state estimation', 'ensemble particles', 'ensemble based', 'kalman']","['Balanced data assimilation for highly-oscillatory mechanical systems Data assimilation algorithms are used to estimate the states of a dynamical\nsystem using partial and noisy observations. The ensemble Kalman filter has\nbecome a popular data assimilation scheme due to its simplicity and robustness\nfor a wide range of application areas. Nevertheless, the ensemble Kalman filter\nalso has limitations due to its inherent Gaussian and linearity assumptions.\nThese limitations can manifest themselves in dynamically inconsistent state\nestimates. We investigate this issue in this paper for highly oscillatory\nHamiltonian systems with a dynamical behavior which satisfies certain balance\nrelations. We first demonstrate that the standard ensemble Kalman filter can\nlead to estimates which do not satisfy those balance relations, ultimately\nleading to filter divergence. We also propose two remedies for this phenomenon\nin terms of blended time-stepping schemes and ensemble-based penalty methods.\nThe effect of these modifications to the standard ensemble Kalman filter are\ndiscussed and demonstrated numerically for two model scenarios. First, we\nconsider balanced motion for highly oscillatory Hamiltonian systems and,\nsecond, we investigate thermally embedded highly oscillatory Hamiltonian\nsystems. The first scenario is relevant for applications from meteorology while\nthe second scenario is relevant for applications of data assimilation to\nmolecular dynamics.\n', 'The Mean Field Ensemble Kalman Filter: Near-Gaussian Setting The ensemble Kalman filter is widely used in applications because, for high\ndimensional filtering problems, it has a robustness that is not shared for\nexample by the particle filter; in particular it does not suffer from weight\ncollapse. However, there is no theory which quantifies its accuracy as an\napproximation of the true filtering distribution, except in the Gaussian\nsetting. To address this issue we provide the first analysis of the accuracy of\nthe ensemble Kalman filter beyond the Gaussian setting. We prove two types of\nresults: the first type comprise a stability estimate controlling the error\nmade by the ensemble Kalman filter in terms of the difference between the true\nfiltering distribution and a nearby Gaussian; and the second type use this\nstability result to show that, in a neighbourhood of Gaussian problems, the\nensemble Kalman filter makes a small error, in comparison with the true\nfiltering distribution. Our analysis is developed for the mean field ensemble\nKalman filter. We rewrite the update equations for this filter, and for the\ntrue filtering distribution, in terms of maps on probability measures. We\nintroduce a weighted total variation metric to estimate the distance between\nthe two filters and we prove various stability estimates for the maps defining\nthe evolution of the two filters, in this metric. Using these stability\nestimates we prove results of the first and second types, in the weighted total\nvariation metric. We also provide a generalization of these results to the\nGaussian projected filter, which can be viewed as a mean field description of\nthe unscented Kalman filter.\n', 'An Explicit Probabilistic Derivation of Inflation in a Scalar Ensemble\n Kalman Filter for Finite Step, Finite Ensemble Convergence This paper uses a probabilistic approach to analyze the converge of an\nensemble Kalman filter solution to an exact Kalman filter solution in the\nsimplest possible setting, the scalar case, as it allows us to build upon a\nrich literature of scalar probability distributions and non-elementary\nfunctions. To this end we introduce the bare-bones Scalar Pedagogical Ensemble\nKalman Filter (SPEnKF). We show that in the asymptotic case of ensemble size,\nthe expected value of both the analysis mean and variance estimate of the\nSPEnKF converges to that of the true Kalman filter, and that the variances of\nboth tend towards zero, at each time moment. We also show that the ensemble\nconverges in probability in the complementary case, when the ensemble is\nfinite, and time is taken to infinity. Moreover, we show that in the\nfinite-ensemble, finite-time case, variance inflation and mean correction can\nbe leveraged to coerce the SPEnKF converge to its scalar Kalman filter\ncounterpart. We then apply this framework to analyze perturbed observations and\nexplain why perturbed observations ensemble Kalman filters underperform their\ndeterministic counterparts.\n']","[('ensemble kalman filter', 0.797838568687439), ('ensemble kalman', 0.749117374420166), ('kalman filtering', 0.6704036593437195), ('kalman filters', 0.6418724060058594), ('kalman filter', 0.6280379891395569), ('ensemble gaussian', 0.5951093435287476), ('state estimation', 0.5144817233085632), ('ensemble particles', 0.48629873991012573), ('ensemble based', 0.4655638635158539), ('kalman', 0.46028628945350647)]" 95,95,252,95_julia sets_filled julia_meromorphic functions_julia,"['julia sets', 'filled julia', 'meromorphic functions', 'julia', 'rational maps', 'finite rational maps', 'meromorphic', 'rational map', 'hausdorff dimension', 'entire functions']","['Local connectivity of Julia sets of some transcendental entire functions\n with Siegel disks Based on the weak expansion property of a long iteration of a family of\nquasi-Blaschke products near the unit circle established recently, we prove\nthat the Julia sets of a number of transcendental entire functions with bounded\ntype Siegel disks are locally connected. In particular, if $\\theta$ is of\nbounded type, then the Julia set of the sine function $S_\\theta(z)=e^{2\\pi\ni\\theta}\\sin(z)$ is locally connected. Moreover, we prove the existence of\ntranscendental entire functions having Siegel disks and locally connected Julia\nsets with asymptotic values.\n', 'The Hausdorff dimension of Julia sets of meromorphic functions in the\n Speiser class We show that for each $d\\in (0,2]$ there exists a meromorphic function $f$\nsuch that the inverse function of $f$ has three singularities and the Julia set\nof $f$ has Hausdorff dimension $d$.\n', ""Rational maps whose Julia sets are generalized Sierpi\\'{n}ski gaskets It has been shown that the Sierpi\\'nski gasket-like sets can appear as the\nJulia sets of some geometrically finite rational maps. In this paper we prove\nthat such type of Julia sets can also appear in the rational maps containing\nSiegel disks, Cremer points or which are infinitely renormalizable. Based on\nthis, we prove the existence of gasket Julia sets with positive area. Moreover,\nwe present a criterion which guarantees the existence of gasket Julia sets in\nsome rational maps having exactly one fixed attracting or parabolic basin.\n""]","[('julia sets', 0.688570499420166), ('filled julia', 0.4997982978820801), ('meromorphic functions', 0.4935820996761322), ('julia', 0.47910454869270325), ('rational maps', 0.453568696975708), ('finite rational maps', 0.44018736481666565), ('meromorphic', 0.4392971098423004), ('rational map', 0.40769538283348083), ('hausdorff dimension', 0.39689067006111145), ('entire functions', 0.3946845233440399)]" 96,96,252,96_aerial vehicles uavs_aerial vehicle uav_multi uav_uav based,"['aerial vehicles uavs', 'aerial vehicle uav', 'multi uav', 'uav based', 'design uav', 'uav aided', 'unmanned aerial', 'uav', 'vehicles uavs', 'unmanned aerial vehicles']","['UAV-Sensing-Assisted Cellular Interference Coordination: A Cognitive\n Radio Approach Aerial-ground interference mitigation has been deemed as the main challenge\nin realizing cellular-connected unmanned aerial vehicle (UAV) communications.\nDue to the line-of-sight (LoS)-dominant air-ground channels, the UAV\ngenerates/suffers much stronger interference to/from cellular base stations\n(BSs) over a much larger region in its uplink/downlink communication, as\ncompared to the terrestrial users. As a result, conventional inter-cell\ninterference coordination (ICIC) techniques catered for terrestrial networks\nbecome ineffective in mitigating the more severe UAV-induced interference. To\ndeal with this new challenge, this letter introduces a cognitive radio based\nsolution by treating the UAV and terrestrial users as secondary and primary\nusers in the network, respectively. In particular, the LoS channels with\nterrestrial BSs/users endow the UAV with a powerful spectrum sensing capability\nfor detecting the terrestrial signals over a much larger region than its\nserving BS. By exploiting this unique feature, we propose a new\nUAV-sensing-assisted ICIC design for both the UAV downlink and uplink\ncommunications. Specifically, the UAV senses its received interference and the\ntransmissions of terrestrial users in the downlink and uplink, respectively,\nover the resource blocks (RBs) available at its serving BS to assist its RB\nallocation to the UAV for avoiding the interference with co-channel terrestrial\ncommunications. Numerical results demonstrate that the proposed UAV-assisted\nICIC outperforms the conventional terrestrial ICIC by engaging the neighboring\nBSs for cooperation only.\n', 'Access Points in the Air: Modeling and Optimization of Fixed-Wing UAV\n Network Fixed-wing unmanned aerial vehicles (UAVs) are of great potential to serve as\naerial access points (APs) owing to better aerodynamic performance and longer\nflight endurance. However, the inherent hovering feature of fixed-wing UAVs may\nresult in discontinuity of connections and frequent handover of ground users\n(GUs). In this work, we model and evaluate the performance of a fixed-wing UAV\nnetwork, where UAV APs provide coverage to GUs with millimeter wave backhaul.\nFirstly, it reveals that network spatial throughput (ST) is independent of the\nhover radius under real-time closest-UAV association, while linearly decreases\nwith the hover radius if GUs are associated with the UAVs, whose hover center\nis the closest. Secondly, network ST is shown to be greatly degraded with the\nover-deployment of UAV APs due to the growing air-to-ground interference under\nexcessive overlap of UAV cells. Finally, aiming to alleviate the interference,\na projection area equivalence (PAE) rule is designed to tune the UAV beamwidth.\nEspecially, network ST can be sustainably increased with growing UAV density\nand independent of UAV flight altitude if UAV beamwidth inversely grows with\nthe square of UAV density under PAE.\n', 'A Survey of Prototype and Experiment for UAV Communications Unmanned aerial vehicle (UAV) communications have attracted significant\nattention from both academia and industry. To facilitate the large-scale usage\nof UAVs for various applications in practice, we provide a comprehensive survey\non the prototype and experiment for UAV communications. To this end, we first\nprovide an overview on the general architecture of the prototype and experiment\nfor UAV communications, and then present experimental verification for\nair-to-ground channel models and UAV energy consumption models. Next, we\ndiscuss measurement experiments on two promising paradigms of UAV\ncommunications, namely cellular-connected UAVs and UAV-enabled aerial\ncommunication platforms. For the former, we focus on the feasibility study and\naddress the interference mitigation issue. For UAV-enabled aerial communication\nplatforms, we present three scenarios, namely UAV-enabled aerial base stations,\nUAV-enabled aerial relays and UAV-enabled aerial data collection/dissemination.\nFinally, we point out some promising future directions for prototype and\nexperimental measurements for UAV communications.\n']","[('aerial vehicles uavs', 0.6711192727088928), ('aerial vehicle uav', 0.6530693173408508), ('multi uav', 0.6187604665756226), ('uav based', 0.6082590222358704), ('design uav', 0.6052718162536621), ('uav aided', 0.6043688654899597), ('unmanned aerial', 0.5971550345420837), ('uav', 0.5941479802131653), ('vehicles uavs', 0.5926380753517151), ('unmanned aerial vehicles', 0.5906161665916443)]" 97,97,252,97_sparse signal recovery_sparse recovery_compressed sensing_bit compressed sensing,"['sparse signal recovery', 'sparse recovery', 'compressed sensing', 'bit compressed sensing', 'recovering sparse', 'compressive sensing', 'recovery sparse', 'sparse signal', 'sparse signals', 'signals sparse']","['Improved Support Recovery in Universal One-bit Compressed Sensing One-bit compressed sensing (1bCS) is an extremely quantized signal\nacquisition method that has been proposed and studied rigorously in the past\ndecade. In 1bCS, linear samples of a high dimensional signal are quantized to\nonly one bit per sample (sign of the measurement). Assuming the original signal\nvector to be sparse, existing results in 1bCS either aim to find the support of\nthe vector, or approximate the signal allowing a small error. The focus of this\npaper is support recovery, which often also computationally facilitate\napproximate signal recovery. A {\\em universal} measurement matrix for 1bCS\nrefers to one set of measurements that work for all sparse signals. With\nuniversality, it is known that $\\tilde{\\Theta}(k^2)$ 1bCS measurements are\nnecessary and sufficient for support recovery (where $k$ denotes the sparsity).\nTo improve the dependence on sparsity from quadratic to linear, in this work we\npropose approximate support recovery (allowing $\\epsilon>0$ proportion of\nerrors), and superset recovery (allowing $\\epsilon$ proportion of false\npositives). We show that the first type of recovery is possible with\n$\\tilde{O}(k/\\epsilon)$ measurements, while the later type of recovery, more\nchallenging, is possible with $\\tilde{O}(\\max\\{k/\\epsilon,k^{3/2}\\})$\nmeasurements. We also show that in both cases $\\Omega(k/\\epsilon)$ measurements\nwould be necessary for universal recovery.\n Improved results are possible if we consider universal recovery within a\nrestricted class of signals, such as rational signals, or signals with bounded\ndynamic range. In both cases superset recovery is possible with only\n$\\tilde{O}(k/\\epsilon)$ measurements. Other results on universal but\napproximate support recovery are also provided in this paper. All of our main\nrecovery algorithms are simple and polynomial-time.\n', 'Binary Iterative Hard Thresholding Converges with Optimal Number of\n Measurements for 1-Bit Compressed Sensing Compressed sensing has been a very successful high-dimensional signal\nacquisition and recovery technique that relies on linear operations. However,\nthe actual measurements of signals have to be quantized before storing or\nprocessing. 1(One)-bit compressed sensing is a heavily quantized version of\ncompressed sensing, where each linear measurement of a signal is reduced to\njust one bit: the sign of the measurement. Once enough of such measurements are\ncollected, the recovery problem in 1-bit compressed sensing aims to find the\noriginal signal with as much accuracy as possible. The recovery problem is\nrelated to the traditional ""halfspace-learning"" problem in learning theory.\n For recovery of sparse vectors, a popular reconstruction method from 1-bit\nmeasurements is the binary iterative hard thresholding (BIHT) algorithm. The\nalgorithm is a simple projected sub-gradient descent method, and is known to\nconverge well empirically, despite the nonconvexity of the problem. The\nconvergence property of BIHT was not theoretically justified, except with an\nexorbitantly large number of measurements (i.e., a number of measurement\ngreater than $\\max\\{k^{10}, 24^{48}, k^{3.5}/\\epsilon\\}$, where $k$ is the\nsparsity, $\\epsilon$ denotes the approximation error, and even this expression\nhides other factors). In this paper we show that the BIHT algorithm converges\nwith only $\\tilde{O}(\\frac{k}{\\epsilon})$ measurements. Note that, this\ndependence on $k$ and $\\epsilon$ is optimal for any recovery method in 1-bit\ncompressed sensing. With this result, to the best of our knowledge, BIHT is the\nonly practical and efficient (polynomial time) algorithm that requires the\noptimal number of measurements in all parameters (both $k$ and $\\epsilon$).\nThis is also an example of a gradient descent algorithm converging to the\ncorrect solution for a nonconvex problem, under suitable structural conditions.\n', 'Newton-Step-Based Hard Thresholding Algorithms for Sparse Signal\n Recovery Sparse signal recovery or compressed sensing can be formulated as certain\nsparse optimization problems. The classic optimization theory indicates that\nthe Newton-like method often has a numerical advantage over the gradient method\nfor nonlinear optimization problems. In this paper, we propose the so-called\nNewton-step-based iterative hard thresholding (NSIHT) and the Newton-step-based\nhard thresholding pursuit (NSHTP) algorithms for sparse signal recovery and\nsignal approximation. Different from the traditional iterative hard\nthresholding (IHT) and hard thresholding pursuit (HTP), the proposed algorithms\nadopts the Newton-like search direction instead of the steepest descent\ndirection.\n A theoretical analysis for the proposed algorithms is carried out, and some\nsufficient conditions for the guaranteed success of sparse signal recovery via\nthese algorithms are established. Our results are shown under the restricted\nisometry property which is one of the standard assumptions widely used in the\nfield of compressed sensing and signal approximation. The empirical results\nobtained from synthetic data recovery indicate that the proposed algorithms are\nefficient signal recovery methods. The numerical stability of our algorithms in\nterms of the residual reduction is also investigated through simulations.\n']","[('sparse signal recovery', 0.8079383969306946), ('sparse recovery', 0.7543007731437683), ('compressed sensing', 0.7517628073692322), ('bit compressed sensing', 0.7241107821464539), ('recovering sparse', 0.7069054245948792), ('compressive sensing', 0.7041333913803101), ('recovery sparse', 0.6957337856292725), ('sparse signal', 0.6519076824188232), ('sparse signals', 0.6486606001853943), ('signals sparse', 0.6414875388145447)]" 98,98,251,98_boundary controllability_exact boundary controllability_controllability nonlinear_global approximate controllability,"['boundary controllability', 'exact boundary controllability', 'controllability nonlinear', 'global approximate controllability', 'approximate controllability', 'controllability linear', 'controllability properties', 'local controllability', 'controllability semilinear', 'null controllability']","['Local null controllability of a cubic Ginzburg-Landau equation with\n dynamic boundary conditions This paper deals with controllability properties of a cubic Ginzburg-Landau\nequation with dynamic boundary conditions. More precisely, we prove a local\nnull controllability result by using a single control supported in a small\nsubset of the domain. In order to achieve this result, we firstly linearize the\nsystem around the origin and we analyze it by the duality approach and an\nappropriate Carleman estimate. Then, by using an inverse function theorem, the\nlocal null controllability of the nonlinear system is proven.\n', ""Null controllability for degenerate parabolic equations with a nonlocal\n space term We consider two degenerate heat equations with a nonlocal space term,\nstudying, in particular, their null controllability property. To this aim, we\nfirst consider the associated nonhomogeneous degenerate heat equations: we\nstudy their well posedness, the Carleman estimates for the associated adjoint\nproblems and, finally, the null controllability. Then, as a consequence, using\nthe Kakutani's fixed point Theorem, we deduce the null controllability property\nfor the initial nonlocal problems.\n"", ""Null controllability for the singular heat equation with a memory term In this paper we focus on the null controllability problem for the heat\nequation with the so-called inverse square potential and a memory term. To this\naim, we first establish the null controllability for a nonhomogeneous singular\nheat equation by a new Carleman inequality with weights which do not blow up at\nt=0. Then the null controllability property is proved for the singular heat\nequation with memory under a condition on the kernel, by means of Kakutani's\nfixed-point Theorem.\n""]","[('boundary controllability', 0.6627573370933533), ('exact boundary controllability', 0.6605948209762573), ('controllability nonlinear', 0.6540324687957764), ('global approximate controllability', 0.6318470239639282), ('approximate controllability', 0.6277977824211121), ('controllability linear', 0.6189098954200745), ('controllability properties', 0.6183149814605713), ('local controllability', 0.6151559352874756), ('controllability semilinear', 0.6101210117340088), ('null controllability', 0.5835803151130676)]" 99,99,250,99_theory continued fractions_continued fraction algorithms_continued fractions_continued fraction expansions,"['theory continued fractions', 'continued fraction algorithms', 'continued fractions', 'continued fraction expansions', 'regular continued fraction', 'continued fraction', 'continued fraction expansion', 'generalized continued', 'regular continued', 'fraction algorithms']","['Finiteness and periodicity of continued fractions over quadratic number\n fields We consider continued fractions with partial quotients in the ring of\nintegers of a quadratic number field $K$ and we prove a generalization to such\ncontinued fractions of the classical theorem of Lagrange. A particular example\nof these continued fractions is the $\\beta$-continued fraction introduced by\nBernat. As a corollary of our theorem we show that for any quadratic Perron\nnumber $\\beta$, the $\\beta$-continued fraction expansion of elements in\n$\\mathbb Q(\\beta)$ is either finite of eventually periodic. The same holds for\n$\\beta$ being a square root of an integer. We also show that for certain 4\nquadratic Perron numbers $\\beta$, the $\\beta$-continued fraction represents\nfinitely all elements of the quadratic field $\\mathbb Q(\\beta)$, thus answering\nquestions of Rosen and Bernat. Based on the validity of a conjecture of Mercat,\nthese are all quadratic Perron numbers with this feature.\n', 'On Euler polynomial continued fractions In this paper, we introduce the polynomial continued fraction, a close\nrelative of the well-known simple continued fraction expansions which are\nwidely used in number theory and in general. While they may not possess all the\nintriguing properties of simple continued fractions, polynomial continued\nfractions have many interesting patterns which can be exploited. Specifically,\nwe explore the Euler continued fractions within this framework and present an\nalgorithm for their identification\n', 'Necessary and sufficient conditions for convergence of integer continued\n fractions Fundamental to the theory of continued fractions is the fact that every\ninfinite continued fraction with positive integer coefficients converges;\nhowever, it is unknown precisely which continued fractions with integer\ncoefficients (not necessarily positive) converge. Here we present a simple test\nthat determines whether an integer continued fraction converges or diverges. In\naddition, for convergent continued fractions the test specifies whether the\nlimit is rational or irrational.\n An attractive way to visualise integer continued fractions is to model them\nas paths on the Farey graph, which is a graph embedded in the hyperbolic plane\nthat induces a tessellation of the hyperbolic plane by ideal triangles. With\nthis geometric representation of continued fractions our test for convergence\ncan be interpreted in a particularly elegant manner, giving deeper insight into\nthe nature of continued fraction convergence.\n']","[('theory continued fractions', 0.7622321248054504), ('continued fraction algorithms', 0.7606253027915955), ('continued fractions', 0.708773136138916), ('continued fraction expansions', 0.6918637752532959), ('regular continued fraction', 0.6836463809013367), ('continued fraction', 0.6663771271705627), ('continued fraction expansion', 0.6571727395057678), ('generalized continued', 0.5299197435379028), ('regular continued', 0.5029188394546509), ('fraction algorithms', 0.501265287399292)]" 100,100,247,100_domination graphs_graph dominating_dominating graph_domination number graph,"['domination graphs', 'graph dominating', 'dominating graph', 'domination number graph', 'dominating every vertex', 'dominating sets', 'total domination number', 'domination numbers', 'minimum dominating', 'connected domination number']","['Some results on the super domination number of a graph II Let $G=(V,E)$ be a simple graph. A dominating set of $G$ is a subset\n$S\\subseteq V$ such that every vertex not in $S$ is adjacent to at least one\nvertex in $S$. The cardinality of a smallest dominating set of $G$, denoted by\n$\\gamma(G)$, is the domination number of $G$. A dominating set $S$ is called a\nsuper dominating set of $G$, if for every vertex $u\\in \\overline{S}=V-S$, there\nexists $v\\in S$ such that $N(v)\\cap \\overline{S}=\\{u\\}$. The cardinality of a\nsmallest super dominating set of $G$, denoted by $\\gamma_{sp}(G)$, is the super\ndomination number of $G$. In this paper, we obtain more results on the super\ndomination number of graphs which is modified by an operation on vertices.\nAlso, we present some sharp bounds for super domination number of chain and\nbouquet of pairwise disjoint connected graphs.\n', 'Semitotal domination in trees In this paper, we study a parameter that is squeezed between arguably the two\nimportant domination parameters, namely the domination number, $\\gamma(G)$, and\nthe total domination number, $\\gamma_t(G)$. A set $S$ of vertices in $G$ is a\nsemitotal dominating set of $G$ if it is a dominating set of $G$ and every\nvertex in S is within distance $2$ of another vertex of $S$. The semitotal\ndomination number, $\\gamma_{t2}(G)$, is the minimum cardinality of a semitotal\ndominating set of $G$. We observe that $\\gamma(G)\\leq \\gamma_{t2}(G)\\leq\n\\gamma_t(G)$. In this paper, we give a lower bound for the semitotal domination\nnumber of trees and we characterize the extremal trees. In addition, we\ncharacterize trees with equal domination and semitotal domination numbers.\n', 'On accurate domination in graphs A dominating set of a graph $G$ is a subset $D \\subseteq V_G$ such that every\nvertex not in $D$ is adjacent to at least one vertex in $D$. The cardinality of\na smallest dominating set of $G$, denoted by $\\gamma(G)$, is the domination\nnumber of $G$. The accurate domination number of $G$, denoted by $\\gamma_{\\rm\na}(G)$, is the cardinality of a smallest set $D$ that is a dominating set of\n$G$ and no $|D|$-element subset of $V_G \\setminus D$ is a dominating set of\n$G$. We study graphs for which the accurate domination number is equal to the\ndomination number. In particular, all trees $G$ for which $\\gamma_{\\rm a}(G) =\n\\gamma(G)$ are characterized. Furthermore, we compare the accurate domination\nnumber with the domination number of different coronas of a graph.\n']","[('domination graphs', 0.6942005753517151), ('graph dominating', 0.6576057076454163), ('dominating graph', 0.6521196365356445), ('domination number graph', 0.6513927578926086), ('dominating every vertex', 0.6432438492774963), ('dominating sets', 0.5506104826927185), ('total domination number', 0.5395416617393494), ('domination numbers', 0.5363888740539551), ('minimum dominating', 0.532594621181488), ('connected domination number', 0.5284194946289062)]" 101,101,246,101_schr odinger operators_schr odinger operator_eigenvalues schr odinger_odinger operators,"['schr odinger operators', 'schr odinger operator', 'eigenvalues schr odinger', 'odinger operators', 'odinger operator', 'schrodinger operators', 'dimensional schr odinger', 'schroedinger operators', 'odinger operators delta', 'discrete schr odinger']","['Perturbation determinant and Levinson\'s formula for Schr\\""odinger\n operators with generalized point interaction We consider the one dimensional Schr\\""odinger operator with properly\nconnecting generalized point interaction at the origin. We derive a trace\nformula for trace of difference of resolvents of perturbed and unperturbed\nSchr\\""odinger operators in terms of a Wronskian which results into an explicit\nexpression for perturbation determinant. Using the estimate for large time real\nargument on the trace norm of the resolvent difference of the perturbed and\nunperturbed Schr\\""odinger operators we express the spectral shift function in\nterms of perturbation determinant. Under certain integrability condition on the\npotential function, we calculate low energy asymptotics for the perturbation\ndeterminant and prove an analog of Levinson\'s formula.\n', 'Exactly solvable Schr\\""odinger operators related to the confluent\n equation Our paper investigates one-dimensional Schr\\""odinger operators defined as\nclosed operators on $L^2(\\mathbb{R})$ or $L^2(\\mathbb{R}_+)$ that are exactly\nsolvable in terms of confluent functions (or, equivalently, Whittaker\nfunctions). We allow the potentials to be complex. They fall into three\nfamilies: Whittaker operators (or radial Coulomb Hamiltonians), Schr\\""odinger\noperators with Morse potentials and isotonic oscillators. For each of them, we\ndiscuss the corresponding basic holomorphic family of closed operators and the\nintegral kernel of their resolvents. We also describe transmutation identities\nthat relate these resolvents. These identities interchange spectral parameters\nwith coupling constants across different operator families.\n A similar analysis is performed for one-dimensional Schr\\""odinger operators\nsolvable in terms of Bessel functions (which are reducible to special cases of\nWhittaker functions). They fall into two families: Bessel operators and\nSchr\\""odinger operators with exponential potentials.\n To make our presentation self-contained, we include a short summary of the\ntheory of closed one-dimensional Schr\\""odinger operators with singular boundary\nconditions. We also provide a concise review of special functions that we use.\n', 'One dimensional discrete Schr\\""odinger operators with resonant embedded\n eigenvalues In this paper, we introduce a new family of functions to construct\nSchr\\""odinger operators with embedded eigenvalues. This particularly allows us\nto construct discrete Schr\\""odinger operators with arbitrary prescribed sets of\neigenvalues.\n']","[('schr odinger operators', 0.7784305810928345), ('schr odinger operator', 0.7468805313110352), ('eigenvalues schr odinger', 0.7370734214782715), ('odinger operators', 0.6960021257400513), ('odinger operator', 0.6587184071540833), ('schrodinger operators', 0.6413707733154297), ('dimensional schr odinger', 0.6390368342399597), ('schroedinger operators', 0.6369979977607727), ('odinger operators delta', 0.6176550984382629), ('discrete schr odinger', 0.6119822263717651)]" 102,102,243,102_bandit algorithms_multi armed bandits_bandit problems_armed bandit problems,"['bandit algorithms', 'multi armed bandits', 'bandit problems', 'armed bandit problems', 'linear bandits', 'contextual bandits', 'multi armed bandit', 'contextual bandit', 'bandit feedback', 'armed bandits']","[""Optimal Best Arm Identification with Fixed Confidence in Restless\n Bandits We study best arm identification in a restless multi-armed bandit setting\nwith finitely many arms. The discrete-time data generated by each arm forms a\nhomogeneous Markov chain taking values in a common, finite state space. The\nstate transitions in each arm are captured by an ergodic transition probability\nmatrix (TPM) that is a member of a single-parameter exponential family of TPMs.\nThe real-valued parameters of the arm TPMs are unknown and belong to a given\nspace. Given a function $f$ defined on the common state space of the arms, the\ngoal is to identify the best arm -- the arm with the largest average value of\n$f$ evaluated under the arm's stationary distribution -- with the fewest number\nof samples, subject to an upper bound on the decision's error probability\n(i.e., the fixed-confidence regime). A lower bound on the growth rate of the\nexpected stopping time is established in the asymptote of a vanishing error\nprobability. Furthermore, a policy for best arm identification is proposed, and\nits expected stopping time is proved to have an asymptotic growth rate that\nmatches the lower bound. It is demonstrated that tracking the long-term\nbehavior of a certain Markov decision process and its state-action visitation\nproportions are the key ingredients in analyzing the converse and achievability\nbounds. It is shown that under every policy, the state-action visitation\nproportions satisfy a specific approximate flow conservation constraint and\nthat these proportions match the optimal proportions dictated by the lower\nbound under any asymptotically optimal policy. The prior studies on best arm\nidentification in restless bandits focus on independent observations from the\narms, rested Markov arms, and restless Markov arms with known arm TPMs. In\ncontrast, this work is the first to study best arm identification in restless\nbandits with unknown arm TPMs.\n"", ""Best Arm Identification in Restless Markov Multi-Armed Bandits We study the problem of identifying the best arm in a multi-armed bandit\nenvironment when each arm is a time-homogeneous and ergodic discrete-time\nMarkov process on a common, finite state space. The state evolution on each arm\nis governed by the arm's transition probability matrix (TPM). A decision entity\nthat knows the set of arm TPMs but not the exact mapping of the TPMs to the\narms, wishes to find the index of the best arm as quickly as possible, subject\nto an upper bound on the error probability. The decision entity selects one arm\nat a time sequentially, and all the unselected arms continue to undergo state\nevolution ({\\em restless} arms). For this problem, we derive the first-known\nproblem instance-dependent asymptotic lower bound on the growth rate of the\nexpected time required to find the index of the best arm, where the asymptotics\nis as the error probability vanishes. Further, we propose a sequential policy\nthat, for an input parameter $R$, forcibly selects an arm that has not been\nselected for $R$ consecutive time instants. We show that this policy achieves\nan upper bound that depends on $R$ and is monotonically non-increasing as\n$R\\to\\infty$. The question of whether, in general, the limiting value of the\nupper bound as $R\\to\\infty$ matches with the lower bound, remains open. We\nidentify a special case in which the upper and the lower bounds match. Prior\nworks on best arm identification have dealt with (a) independent and\nidentically distributed observations from the arms, and (b) rested Markov arms,\nwhereas our work deals with the more difficult setting of restless Markov arms.\n"", 'Streaming Algorithms for Stochastic Multi-armed Bandits We study the Stochastic Multi-armed Bandit problem under bounded arm-memory.\nIn this setting, the arms arrive in a stream, and the number of arms that can\nbe stored in the memory at any time, is bounded. The decision-maker can only\npull arms that are present in the memory. We address the problem from the\nperspective of two standard objectives: 1) regret minimization, and 2) best-arm\nidentification. For regret minimization, we settle an important open question\nby showing an almost tight hardness. We show {\\Omega}(T^{2/3}) cumulative\nregret in expectation for arm-memory size of (n-1), where n is the number of\narms. For best-arm identification, we study two algorithms. First, we present\nan O(r) arm-memory r-round adaptive streaming algorithm to find an\n{\\epsilon}-best arm. In r-round adaptive streaming algorithm for best-arm\nidentification, the arm pulls in each round are decided based on the observed\noutcomes in the earlier rounds. The best-arm is the output at the end of r\nrounds. The upper bound on the sample complexity of our algorithm matches with\nthe lower bound for any r-round adaptive streaming algorithm. Secondly, we\npresent a heuristic to find the {\\epsilon}-best arm with optimal sample\ncomplexity, by storing only one extra arm in the memory.\n']","[('bandit algorithms', 0.6933765411376953), ('multi armed bandits', 0.6537439823150635), ('bandit problems', 0.6371288895606995), ('armed bandit problems', 0.6269973516464233), ('linear bandits', 0.6118636131286621), ('contextual bandits', 0.6000877618789673), ('multi armed bandit', 0.5957125425338745), ('contextual bandit', 0.5884591937065125), ('bandit feedback', 0.5670821666717529), ('armed bandits', 0.5449606776237488)]" 103,103,241,103_phylogenetic trees_phylogenetics_phylogenetic_binary trees,"['phylogenetic trees', 'phylogenetics', 'phylogenetic', 'binary trees', 'networks tree', 'trees', 'tree topology', 'rooted trees', 'binary tree', 'two trees']","['Phylogenetic diversity indices from an affine and projective viewpoint Phylogenetic diversity indices are commonly used to rank the elements in a\ncollection of species or populations for conservation purposes. The derivation\nof these indices is typically based on some quantitative description of the\nevolutionary history of the species in question, which is often given in terms\nof a phylogenetic tree. Both rooted and unrooted phylogenetic trees can be\nemployed, and there are close connections between the indices that are derived\nin these two different ways. In this paper, we introduce more general\nphylogenetic diversity indices that can be derived from collections of subsets\n(clusters) and collections of bipartitions (splits) of the given set of\nspecies. Such indices could be useful, for example, in case there is some\nuncertainty in the topology of the tree being used to derive a phylogenetic\ndiversity index. As well as characterizing some of the indices that we\nintroduce in terms of their special properties, we provide a link between\ncluster-based and split-based phylogenetic diversity indices that uses a\ndiscrete analogue of the classical link between affine and projective geometry.\nThis provides a unified framework for many of the various phylogenetic\ndiversity indices used in the literature based on rooted and unrooted\nphylogenetic trees, generalizations and new proofs for previous results\nconcerning tree-based indices, and a way to define some new phylogenetic\ndiversity indices that naturally arise as affine or projective variants of each\nother.\n', 'Displaying trees across two phylogenetic networks Phylogenetic networks are a generalization of phylogenetic trees to\nleaf-labeled directed acyclic graphs that represent ancestral relationships\nbetween species whose past includes non-tree-like events such as hybridization\nand horizontal gene transfer. Indeed, each phylogenetic network embeds a\ncollection of phylogenetic trees. Referring to the collection of trees that a\ngiven phylogenetic network $N$ embeds as the display set of $N$, several\nquestions in the context of the display set of $N$ have recently been analyzed.\nFor example, the widely studied Tree-Containment problem asks if a given\nphylogenetic tree is contained in the display set of a given network. The focus\nof this paper are two questions that naturally arise in comparing the display\nsets of two phylogenetic networks. First, we analyze the problem of deciding if\nthe display sets of two phylogenetic networks have a tree in common.\nSurprisingly, this problem turns out to be NP-complete even for two temporal\nnormal networks. Second, we investigate the question of whether or not the\ndisplay sets of two phylogenetic networks are equal. While we recently showed\nthat this problem is polynomial-time solvable for a normal and a tree-child\nnetwork, it is computationally hard in the general case. In establishing\nhardness, we show that the problem is contained in the second level of the\npolynomial-time hierarchy. Specifically, it is $\\Pi_2^P$-complete. Along the\nway, we show that two other problems are also $\\Pi_2^P$-complete, one of which\nbeing a generalization of Tree-Containment.\n', 'Hypercubes and Hamilton cycles of display sets of rooted phylogenetic\n networks In the context of reconstructing phylogenetic networks from a collection of\nphylogenetic trees, several characterisations and subsequently algorithms have\nbeen established to reconstruct a phylogenetic network that collectively embeds\nall trees in the input in some minimum way. For many instances however, the\nresulting network also embeds additional phylogenetic trees that are not part\nof the input. However, little is known about these inferred trees. In this\npaper, we explore the relationships among all phylogenetic trees that are\nembedded in a given phylogenetic network. First, we investigate some\ncombinatorial properties of the collection P of all rooted binary phylogenetic\ntrees that are embedded in a rooted binary phylogenetic network N. To this end,\nwe associated a particular graph G, which we call rSPR graph, with the elements\nin P and show that, if |P|=2^k, where k is the number of vertices with\nin-degree two in N, then G has a Hamiltonian cycle. Second, by exploiting rSPR\ngraphs and properties of hypercubes, we turn to the well-studied class of\nrooted binary level-1 networks and give necessary and sufficient conditions for\nwhen a set of rooted binary phylogenetic trees can be embedded in a level-1\nnetwork without inferring any additional trees. Lastly, we show how these\nconditions translate into a polynomial-time algorithm to reconstruct such a\nnetwork if it exists.\n']","[('phylogenetic trees', 0.7501494288444519), ('phylogenetics', 0.6470094919204712), ('phylogenetic', 0.6377353072166443), ('binary trees', 0.5735158324241638), ('networks tree', 0.5174415111541748), ('trees', 0.5110283493995667), ('tree topology', 0.510705828666687), ('rooted trees', 0.4889962077140808), ('binary tree', 0.4882143437862396), ('two trees', 0.45909789204597473)]" 104,104,239,104_predictive control mpc_robust predictive control_stochastic predictive control_robust mpc,"['predictive control mpc', 'robust predictive control', 'stochastic predictive control', 'robust mpc', 'predictive control', 'nonlinear predictive control', 'control mpc', 'economic predictive control', 'based predictive control', 'linear mpc']","['Configuration-Constrained Tube MPC This paper is about robust Model Predictive Control (MPC) for linear systems\nwith additive and multiplicative uncertainty. A novel class of\nconfiguration-constrained polytopic robust forward invariant tubes is\nintroduced, which admit a joint parameterization of their facets and vertices.\nThey are the foundation for the development of novel Configuration-Constrained\nTube MPC (CCTMPC) controllers that freely optimize the shape of their polytopic\ntube, subject to conic vertex configuration constraints, as well as associated\nvertex control laws by solving convex optimization problems online. It is shown\nthat CCTMPC is -- under appropriate assumptions -- systematically less\nconservative than Rigid- and Homothetic- Tube MPC. Additionally, it is proven\nthat there exist control systems for which CCTMPC is less conservative than\nElastic Tube MPC, Disturbance Affine Feedback MPC, and Fully Parameterized Tube\nMPC.\n', 'Transient Performance of MPC for Tracking We analyse the closed-loop performance of a model predictive control (MPC)\nfor tracking formulation with artificial references. It has been shown that\nsuch a scheme guarantees closed-loop stability and recursive feasibility for\nany externally supplied reference, even if it is unreachable or time-varying.\nThe basic idea is to consider an artificial reference as an additional decision\nvariable and to formulate generalised terminal ingredients with respect to it.\nIn addition, its offset is penalised in the MPC optimisation problem, leading\nto closed-loop convergence to the best reachable reference. In this paper, we\nprovide a transient performance bound on the closed loop using MPC for\ntracking. We employ mild assumptions on the offset cost and scale it with the\nprediction horizon. In this case, an increasing horizon in MPC for tracking\nrecovers the infinite horizon optimal solution.\n', 'Computationally efficient robust MPC using optimized constraint\n tightening A robust model predictive control (MPC) method is presented for linear,\ntime-invariant systems affected by bounded additive disturbances. The main\ncontribution is the offline design of a disturbance-affine feedback gain\nwhereby the resulting constraint tightening is minimized. This is achieved by\nformulating the constraint tightening problem as a convex optimization problem\nwith the feedback term as a variable. The resulting MPC controller has the\ncomputational complexity of nominal MPC, and guarantees recursive feasibility,\nstability and constraint satisfaction. The advantages of the proposed approach\ncompared to existing robust MPC methods are demonstrated using numerical\nexamples.\n']","[('predictive control mpc', 0.7419878244400024), ('robust predictive control', 0.6509373188018799), ('stochastic predictive control', 0.5895362496376038), ('robust mpc', 0.5874357223510742), ('predictive control', 0.5856538414955139), ('nonlinear predictive control', 0.5827414393424988), ('control mpc', 0.5576879978179932), ('economic predictive control', 0.5525022149085999), ('based predictive control', 0.5489959120750427), ('linear mpc', 0.5372750163078308)]" 105,105,236,105_unitary dilation_pairs commuting_contractions_mathbb contraction,"['unitary dilation', 'pairs commuting', 'contractions', 'mathbb contraction', 'commutant', 'isometries', 'partial isometry', 'space operators', 'isometry', 'hilbert space operators']","['Minimal isometric dilations and operator models for the polydisc For commuting contractions $T_1,\\dots ,T_n$ acting on a Hilbert space\n$\\mathcal H$ with $T=\\prod_{i=1}^n T_i$, we find a necessary and sufficient\ncondition under which $(T_1,\\dots ,T_n)$ dilates to commuting isometries\n$(V_1,\\dots ,V_n)$ on the minimal isometric dilation space $T$, where\n$V=\\prod_{i=1}^nV_i$ is the minimal isometric dilation of $T$. We construct\nboth Sch$\\ddot{a}$ffer and Sz. Nagy-Foias type isometric dilations for\n$(T_1,\\dots ,T_n)$ on the minimal dilation spaces of $T$. Also, a different\ndilation is constructed when the product $T$ is a $C._0$ contraction, that is\n${T^*}^n \\rightarrow 0$ as $n \\rightarrow \\infty$. As a consequence of these\ndilation theorems we obtain different functional models for $(T_1,\\dots ,T_n)$\nin terms of multiplication operators on vectorial Hardy spaces. One notable\nfact about our models is that the multipliers are analytic functions in one\nvariable. The dilation, when $T$ is a $C._0$ contraction, leads to a\nconditional factorization of a $T$. Several examples have been constructed.\n', ""Theory of $q$-commuting contractions-II: Regular $q$-unitary dilation\n and Brehmer's positivity We generalize regular unitary dilation and Brehmer's positivity condition to\n$q$-commuting tuples of contractions.\n"", ""A generalization of Ando's dilation, and isometric dilations for a class\n of tuples of $q$-commuting contractions Given a bounded operator $Q$ on a Hilbert space $\\mathcal{H}$, a pair of\nbounded operators $(T_1, T_2)$ on $\\mathcal{H}$ is said to be $Q$-commuting if\none of the following holds:\n \\[\n T_1T_2=QT_2T_1 \\text{ or }T_1T_2=T_2QT_1 \\text{ or }T_1T_2=T_2T_1Q. \\] We\ngive an explicit construction of isometric dilations for pairs of $Q$-commuting\ncontractions for unitary $Q$, which generalizes the isometric dilation of Ando\n[2] for pairs of commuting contractions. In particular, for\n$Q=qI_{\\mathcal{H}}$, where $q$ is a complex number of modulus $1$, this gives,\nas a corollary, an explicit construction of isometric dilations for pairs of\n$q$-commuting contractions which are well studied. There is an extended notion\nof $q$-commutativity for general tuples of operators and it is known that\nisometric dilation does not hold, in general, for an $n$-tuple of $q$-commuting\ncontractions, where $n\\geq 3$. Generalizing the class of commuting contractions\nconsidered by Brehmer [8], we construct a class of $n$-tuples of $q$-commuting\ncontractions and find isometric dilations explicitly for the class.\n""]","[('unitary dilation', 0.469603031873703), ('pairs commuting', 0.4510009288787842), ('contractions', 0.44442424178123474), ('mathbb contraction', 0.442218542098999), ('commutant', 0.4261814057826996), ('isometries', 0.41689208149909973), ('partial isometry', 0.416047066450119), ('space operators', 0.4130862057209015), ('isometry', 0.406267374753952), ('hilbert space operators', 0.40623214840888977)]" 106,106,235,106_massive mimo_mimo channel_massive mimo systems_mimo csi,"['massive mimo', 'mimo channel', 'massive mimo systems', 'mimo csi', 'output mimo', 'output mimo systems', 'deep learning dl', 'channel prediction', 'mimo systems', 'multiple output mimo']","['CNN-based Analog CSI Feedback in FDD MIMO-OFDM Systems Massive multiple-input multiple-output (MIMO) systems require downlink\nchannel state information (CSI) at the base station (BS) to better utilize the\navailable spatial diversity and multiplexing gains. However, in a frequency\ndivision duplex (FDD) massive MIMO system, CSI feedback overhead degrades the\noverall spectral efficiency. Convolutional neural network (CNN)-based CSI\nfeedback compression schemes has received a lot of attention recently due to\nsignificant improvements in compression efficiency; however, they still require\nreliable feedback links to convey the compressed CSI information to the BS.\nInstead, we propose here a CNN-based analog feedback scheme, called\nAnalogDeepCMC, which directly maps the downlink CSI to uplink channel input.\nCorresponding noisy channel outputs are used by another CNN to reconstruct the\nDL channel estimate. Not only the proposed outperforms existing digital CSI\nfeedback schemes in terms of the achievable downlink rate, but also simplifies\nthe operation as it does not require explicit quantization, coding and\nmodulation, and provides a low-latency alternative particularly in rapidly\nchanging MIMO channels, where the CSI needs to be estimated and fed back\nperiodically.\n', 'Overview of Deep Learning-based CSI Feedback in Massive MIMO Systems Many performance gains achieved by massive multiple-input and multiple-output\ndepend on the accuracy of the downlink channel state information (CSI) at the\ntransmitter (base station), which is usually obtained by estimating at the\nreceiver (user terminal) and feeding back to the transmitter. The overhead of\nCSI feedback occupies substantial uplink bandwidth resources, especially when\nthe number of the transmit antennas is large. Deep learning (DL)-based CSI\nfeedback refers to CSI compression and reconstruction by a DL-based autoencoder\nand can greatly reduce feedback overhead. In this paper, a comprehensive\noverview of state-of-the-art research on this topic is provided, beginning with\nbasic DL concepts widely used in CSI feedback and then categorizing and\ndescribing some existing DL-based feedback works. The focus is on novel neural\nnetwork architectures and utilization of communication expert knowledge to\nimprove CSI feedback accuracy. Works on bit-level CSI feedback and joint design\nof CSI feedback with other communication modules are also introduced, and some\npractical issues, including training dataset collection, online training,\ncomplexity, generalization, and standardization effect, are discussed. At the\nend of the paper, some challenges and potential research directions associated\nwith DL-based CSI feedback in future wireless communication systems are\nidentified.\n', 'Deep Learning-Based CSI Feedback for Beamforming in Single- and\n Multi-cell Massive MIMO Systems The potentials of massive multiple-input multiple-output (MIMO) are all based\non the available instantaneous channel state information (CSI) at the base\nstation (BS). Therefore, the user in frequency-division duplexing (FDD) systems\nhas to keep on feeding back the CSI to the BS, thereby occupying large uplink\ntransmission resources. Recently, deep learning (DL) has achieved great success\nin the CSI feedback. However, the existing works just focus on improving the\nfeedback accuracy and ignore the effects on the following modules, e.g.,\nbeamforming (BF). In this paper, we propose a DL-based CSI feedback framework\nfor BF design, called CsiFBnet. The key idea of the CsiFBnet is to maximize the\nBF performance gain rather than the feedback accuracy. We apply it to two\nrepresentative scenarios: single- and multi-cell systems. The CsiFBnet-s in the\nsingle-cell system is based on the autoencoder architecture, where the encoder\nat the user compresses the CSI and the decoder at the BS generates the BF\nvector. The CsiFBnet-m in the multicell system has to feed back two kinds of\nCSI: the desired and the interfering CSI. The entire neural networks are\ntrained by an unsupervised learning strategy. Simulation results show the great\nperformance improvement and complexity reduction of the CsiFBnet compared with\nthe conventional DL-based CSI feedback methods.\n']","[('massive mimo', 0.5400211215019226), ('mimo channel', 0.5200569033622742), ('massive mimo systems', 0.5072139501571655), ('mimo csi', 0.48126113414764404), ('output mimo', 0.47141727805137634), ('output mimo systems', 0.4709135890007019), ('deep learning dl', 0.4434564411640167), ('channel prediction', 0.4392489194869995), ('mimo systems', 0.42581674456596375), ('multiple output mimo', 0.4254796504974365)]" 107,107,235,107_characters finite group_irreducible characters finite_irreducible characters_irreducible character,"['characters finite group', 'irreducible characters finite', 'irreducible characters', 'irreducible character', 'finite simple groups', 'characters finite', 'character theory', 'character table', 'finite groups', 'character chi']","[""Normal $p$-complements and irreducible character codegrees Let $G$ be a finite group and $p\\in \\pi(G)$, and let Irr$(G)$ be the set of\nall irreducible complex characters of $G$. Let $\\chi \\in {\\rm Irr}(G)$, we\nwrite ${\\rm cod}(\\chi)=|G:{\\rm ker} \\chi|/\\chi(1)$, and called it the codegree\nof the irreducible character $\\chi$. Let $N\\unlhd G$, write ${\\rm\nIrr}(G|N)=\\{\\chi \\in {\\rm Irr}(G)~|~N\\nsubseteq {\\rm ker}\\chi\\}$, and ${\\rm\ncod}(G|N)=\\{ {\\rm cod}(\\chi) ~|~\\chi\\in{\\rm Irr}(G|N)\\}.$ In this Ipaper, we\nprove that if $N\\unlhd G$ and every member of ${\\rm cod}(G|N')$ is not\ndivisible by some fixed prime $p\\in \\pi(G)$, then $N$ has a normal\n$p$-complement and $N$ is solvable.\n"", 'Groups in which the co-degrees of the irreducible characters are\n distinct Let $G$ be a finite group and let $\\rm{Irr}(G)$ be the set of all irreducible\ncomplex characters of $G$. For a character $\\chi \\in \\rm{Irr}(G)$, the number\n$\\rm{cod}(\\chi):=|G:\\rm{ker}\\chi|/\\chi(1)$ is called the co-degree of $\\chi$.\nThe set of co-degrees of all irreducible characters of $G$ is denoted by\n$\\rm{cod}(G)$. In this paper, we show that for a non-trivial finite group $G$,\n$|\\rm{Irr}(G)|=|\\rm{cod}(G)|$ if and only if $G$ is isomorphic to the cyclic\ngroup $\\mathbb{Z}_2$ or the symmetric group $S_3$.\n', ""On the multiplicities of the character codegrees Let G be a finite group and ? be an irreducible character of G, the number\ncod(?) = jG :\n Let $ G $ be a finite group and $ \\chi $ be an irreducible character of $ G\n$, the number $ \\cod(\\chi) = |G: \\kernel(\\chi)|/\\chi(1) $ is called the\ncodegree of $ \\chi $. Also, $ \\cod(G) = \\{ \\cod(\\chi) \\ | \\ \\chi \\in \\Irr(G) \\}\n$. For $d\\in\\cod(G)$, the multiplicity of $d$ in $G$, denoted by $m'_G(d)$, is\nthe number of irreducible characters of $G$ having codegree $d$. A finite group\n$G$ is called a $T'_k$-group for some integer $k\\geq 1$, if there exists\n$d_0\\in\\cod(G)$ such that $m'_G(d_0)=k$ and for every $d\\in\\cod(G)-\\{d_0\\}$, we\nhave $m'_G(d)=1$. In this note we characterize finite $T'_k$-groups completely,\nwhere $k\\geq 1$ is an integer.\n""]","[('characters finite group', 0.6607100963592529), ('irreducible characters finite', 0.6255673170089722), ('irreducible characters', 0.5768141150474548), ('irreducible character', 0.5388258695602417), ('finite simple groups', 0.4547386169433594), ('characters finite', 0.44616803526878357), ('character theory', 0.4254554212093353), ('character table', 0.42518365383148193), ('finite groups', 0.41769105195999146), ('character chi', 0.41445767879486084)]" 108,108,235,108_lie superalgebras_lie super algebras_nilpotent lie algebras_lie superalgebra,"['lie superalgebras', 'lie super algebras', 'nilpotent lie algebras', 'lie superalgebra', 'nilpotent lie algebra', 'lie algebras dimension', 'dimensional nilpotent lie', 'superalgebras', 'dimensional lie algebras', 'lie algebras']","['On the Schur multiplier of nilpotent Lie superalgebra Let $L$ be an $(m\\vert n)$-dimensional nilpotent Lie superalgebra where $m +\nn \\geq 4$ and $n \\geq 1$. This paper classifies such nilpotent Lie\nsuperalgebras $L$ with a derived subsuperalgebra of dimension $m+n-2$ such that\n$\\gamma(L) = m + 2n - 2 - \\dim \\mathcal{M}(L)$, where $\\gamma(L) \\in \\{0, 1,\n2\\}$ and $\\mathcal{M}(L)$ denotes the Schur multiplier of $L$. Furthermore, we\nshow that all these superalgebras are capable.\n', 'On $2$-Nilpotent Multiplier of Lie Superalgebras In this article we define the $c$-nilpotent multiplier of a finite\ndimensional Lie suepralgebra. We characterize the structure of $2$-nilpotent\nmultiplier of finite dimensional nilpotent Lie superalgebras whose derived\nsubalgebras have dimension at most one. Then we give an upper bound on the\ndimension of $2$-nilpotent multiplier of any finite dimensional nilpotent Lie\nsuperalgebra. Moreover, we discuses the $2$-capability of special as well as\nodd Heisenberg Lie superalgebras and abelian Lie superalgebras.\n', 'On the nilpotent Lie superalgebras of small superbreadth In this paper, we classify finite-dimensional nilpotent Lie superalgebras of\nsuperbreadth at most two.\n']","[('lie superalgebras', 0.7531046867370605), ('lie super algebras', 0.7350338101387024), ('nilpotent lie algebras', 0.7072482109069824), ('lie superalgebra', 0.7032214999198914), ('nilpotent lie algebra', 0.6762458086013794), ('lie algebras dimension', 0.6334843039512634), ('dimensional nilpotent lie', 0.6322513818740845), ('superalgebras', 0.6297616958618164), ('dimensional lie algebras', 0.6275506019592285), ('lie algebras', 0.6092092990875244)]" 109,109,234,109_shimura varieties_shimura variety_unitary shimura varieties_shimura curves,"['shimura varieties', 'shimura variety', 'unitary shimura varieties', 'shimura curves', 'cohomology shimura', 'shimura curve', 'shimura', 'unitary shimura', 'eichler shimura', 'modular varieties']","['Igusa Stacks and the Cohomology of Shimura Varieties We construct functorial Igusa stacks for all Hodge-type Shimura varieties,\nproving a conjecture of Scholze and extending earlier results of the\nfourth-named author for PEL-type Shimura varieties. Using the Igusa stack, we\nconstruct a sheaf on $\\mathrm{Bun}_G$ that controls the cohomology of the\ncorresponding Shimura variety. We use this sheaf and the spectral action of\nFargues-Scholze to prove a compatibility between the cohomology of Shimura\nvarieties of Hodge type and the semisimple local Langlands correspondence of\nFargues-Scholze, generalizing the Eichler-Shimura relation of Blasius-Rogawski\nto arbitrary level at $p$. When the given Shimura variety is proper, we show\nmoreover that the sheaf is perverse, which allows us to prove new torsion\nvanishing results for the cohomology of Shimura varieties.\n', 'On the Piatetski-Shapiro construction for integral models of Shimura\n varieties We study the Piatetski-Shapiro construction, which takes a totally real field\nF and a Shimura datum (G,X) and produces a new Shimura datum (H,Y). If F is\nGalois, then the Galois group Gamma of F acts on (H,Y), and we show that the\nGamma-fixed points of the Shimura varieties for (H,Y) recover the Shimura\nvarieties for (G,X) under some hypotheses. For Shimura varieties of Hodge type\nwith parahoric level, we show that the same is true for the p-adic integral\nmodels constructed by Pappas--Rapoport. We also study the Gamma-fixed points of\nthe Igusa stacks of Zhang for (H,Y) and prove optimal results.\n', 'Boundary structures of integral models of Hodge-type Shimura Varieties We compute the level groups associated with mixed Shimura varieties that\nappear at the boundaries of compactifications of Shimura varieties and show\nthat the boundaries of minimal compactifications of Pappas-Rapoport integral\nmodels are finite quotients of smaller Pappas-Rapoport integral models.\nAdditionally, we prove that the compactifications of integral models of\nHodge-type Shimura varieties with quasi-parahoric level structures are\nindependent of the choice of Siegel embedding, and use this to construct and\nanalyze the change-of-parahoric morphisms on these compactifications.\n']","[('shimura varieties', 0.8054560422897339), ('shimura variety', 0.7662268280982971), ('unitary shimura varieties', 0.7515984773635864), ('shimura curves', 0.7417166829109192), ('cohomology shimura', 0.7148319482803345), ('shimura curve', 0.6808704137802124), ('shimura', 0.6086057424545288), ('unitary shimura', 0.5880695581436157), ('eichler shimura', 0.5677005648612976), ('modular varieties', 0.5394902229309082)]" 110,110,231,110_groups elliptic curves_elliptic curves_elliptic curves mathbb_families elliptic curves,"['groups elliptic curves', 'elliptic curves', 'elliptic curves mathbb', 'families elliptic curves', 'family elliptic curves', 'elliptic curves let', 'elliptic curves defined', 'cm elliptic curves', 'elliptic curve mathbb', 'elliptic curve']","['On the quadratic twist of elliptic curves with full $2$-torsion Let $E: y^2=x(x-a^2)(x+b^2)$ be an elliptic curve with full $2$-torsion\ngroup, where $a$ and $b$ are coprime integers and $2(a^2+b^2)$ is a square.\nAssume that the $2$-Selmer group of $E$ has rank two. We characterize all\nquadratic twists of $E$ with Mordell-Weil rank zero and $2$-primary\nShafarevich-Tate groups $(\\mathbb Z/2\\mathbb Z)^2$, under certain conditions.\nWe also obtain a distribution result of these elliptic curves.\n', 'Uniform polynomial bounds on torsion from rational geometric isogeny\n classes In 1996, Merel showed there exists a function $B\\colon\n\\mathbb{Z}^+\\rightarrow \\mathbb{Z}^+$ such that for any elliptic curve $E/F$\ndefined over a number field of degree $d$, one has the torsion group bound $\\#\nE(F)[\\textrm{tors}]\\leq B(d)$. Based on subsequent work, it is conjectured that\none can choose $B$ to be polynomial in the degree $d$. In this paper, we show\nthat such bounds exist for torsion from the family $\\mathcal{I}_{\\mathbb{Q}}$\nof elliptic curves which are geometrically isogenous to at least one rational\nelliptic curve. More precisely, we show that for each $\\epsilon>0$, there\nexists $c_\\epsilon>0$ such that for any elliptic curve $E/F\\in\n\\mathcal{I}_{\\mathbb{Q}}$, one has \\[ E(F)[\\textrm{tors}]\\leq c_\\epsilon\\cdot\n[F:\\mathbb{Q}]^{3+\\epsilon}. \\] This generalizes work of the second author for\nelliptic curves within a fixed rational geometric isogeny class. For the family\nof elliptic curves with rational $j$-invariant, we also obtain bounds which\nimprove those of Clark and Pollack. In this case, our bounds on the exponent of\n$E(F)[\\textrm{tors}]$ are optimal if one does not exclude elliptic curves with\ncomplex multiplication.\n', 'Growth of torsion groups of elliptic curves upon base change We study how the torsion of elliptic curves over number fields grows upon\nbase change, and in particular prove various necessary conditions for torsion\ngrowth. For a number field $F$, we show that for a large set of number fields\n$L$, whose Galois group of their normal closure over $F$ has certain\nproperties, it will hold that $E(L)_{tors}=E(F)_{tors}$ for all elliptic curves\n$E$ defined over $F$.\n Our methods turn out to be particularly useful in studying the possible\ntorsion groups $E(K)_{tors}$, where $K$ is a number field and $E$ is a base\nchange of an elliptic curve defined over $\\mathbb Q$. Suppose that $E$ is a\nbase change of an elliptic curve over $\\mathbb Q$ for the remainder of the\nabstract. We prove that $E(K)_{tors}=E(\\mathbb Q)_{tors}$ for all elliptic\ncurves $E$ defined over $\\mathbb Q$ and all number fields $K$ of degree $d$,\nwhere $d$ is not divisible by a prime $\\leq 7$. Using this fact, we determine\nall the possible torsion groups $E(K)_{tors}$ over number fields $K$ of prime\ndegree $p\\geq 7$. We determine all the possible degrees of $[\\mathbb\nQ(P):\\mathbb Q]$, where $P$ is a point of prime order $p$ for all $p$ such that\n$p\\not\\equiv 8 \\pmod 9$ or $\\left( \\frac{-D}{p}\\right)=1$ for any $D\\in\n\\{1,2,7,11,19,43,67,163\\}$; this is true for a set of density\n$\\frac{1535}{1536}$ of all primes and in particular for all $p<3167$. Using\nthis result, we determine all the possible prime orders of a point $P\\in\nE(K)_{tors}$, where $[K:\\mathbb Q]=d$, for all $d\\leq 3342296$. Finally, we\ndetermine all the possible groups $E(K)_{tors}$, where $K$ is a quartic number\nfield and $E$ is an elliptic curve defined over $\\mathbb Q$ and show that no\nquartic sporadic point on a modular curves $X_1(m,n)$ comes from an elliptic\ncurve defined over $\\mathbb Q$.\n']","[('groups elliptic curves', 0.6767468452453613), ('elliptic curves', 0.6578449606895447), ('elliptic curves mathbb', 0.6440052390098572), ('families elliptic curves', 0.6410247683525085), ('family elliptic curves', 0.6248683929443359), ('elliptic curves let', 0.6100578308105469), ('elliptic curves defined', 0.6060531139373779), ('cm elliptic curves', 0.5993465185165405), ('elliptic curve mathbb', 0.586340606212616), ('elliptic curve', 0.5679534673690796)]" 111,111,230,111_meromorphic functions_meromorphic solutions_two meromorphic_meromorphic,"['meromorphic functions', 'meromorphic solutions', 'two meromorphic', 'meromorphic', 'entire functions', 'differential polynomials', 'differential difference equations', 'difference equations', 'solutions difference equations', 'transcendental entire']","['Value distribution and uniqueness for q-difference of meromorphic\n functions Sharing Two Sets In this paper, we investigate the value distribution for linear q-difference\npolynomials of transcendental meromorphic functions of zero order which\nimproves the results of Xu, Liu and Cao (\\cite{Xu & Liu & Cao & 2015}). We also\ninvestigate the uniqueness of zero order meromorphic function with its\nq-difference operator sharing two sets with finite weight. Some examples have\nbeen exhibited which are relevant to the content of the paper.\n', 'Meromorphic functions of finite $\\varphi$-order and linear\n $q$-difference equations The $\\varphi$-order was introduced in 2009 for meromorphic functions in the\nunit disc, and was used as a growth indicator for solutions of linear\ndifferential equations. In this paper, the properties of meromorphic functions\nin the complex plane are investigated in terms of the $\\varphi$-order, which\nmeasures the growth of functions between the classical order and the\nlogarithmic order. Several results on value distribution of meromorphic\nfunctions are discussed by using the $\\varphi$-order and the $\\varphi$-exponent\nof convergence. Instead of linear differential equations, the applications in\nthe complex plane lie in linear $q$-difference equations.\n', 'Meromorphic Solutions of Homogeneous and Non-homogeneous Higher Order\n Linear Difference Equations in Terms of (p,q)-Order In this paper we investigate the growth of meromorphic solutions of\nhomogeneous and non-homogeneous linear difference equations with entire or\nmeromorphic coefficients. We further extend and improve few results on the\norder of meromorphic solutions by using (p,q)-lower order and (p,q)-lower type\nfollowed by the investigation of Luo and Zheng (2016), Belaidi and Bellaama\n(2020).\n']","[('meromorphic functions', 0.6682156324386597), ('meromorphic solutions', 0.6157504320144653), ('two meromorphic', 0.542455792427063), ('meromorphic', 0.5040169954299927), ('entire functions', 0.44583216309547424), ('differential polynomials', 0.39659708738327026), ('differential difference equations', 0.38511979579925537), ('difference equations', 0.3720577657222748), ('solutions difference equations', 0.36563530564308167), ('transcendental entire', 0.3623711168766022)]" 112,112,226,112_quiver gauge theories_supersymmetric gauge theories_quiver gauge theory_mathcal gauge theories,"['quiver gauge theories', 'supersymmetric gauge theories', 'quiver gauge theory', 'mathcal gauge theories', 'gauge theories', 'superconformal field theories', 'supersymmetric gauge', 'gauge theory', 'quiver gauge', 'mathcal supersymmetric']","['Argyres-Douglas Theories, IR N-ality and Complete Graphs We show that for a large subclass of Argyres-Douglas-type theories, the Higgs\nbranch admits multiple hyperkahler quotient realizations as Higgs branches of\nthree dimensional $\\mathcal{N}=4$ quiver gauge theories, which are related by a\nsequence of Seiberg-like IR dualities. We refer to this phenomenon as the\nHyperkahler Quotient N-ality of the four dimensional Higgs branch. The\nassociated set of 3d theories contains a special subset of maximal unitary\nquivers: quiver gauge theories for which the resolution/deformation parameters\nof the Higgs branch are manifest in the Lagrangian as Fayet-Iliopoulas\nparameters. Starting from the Type IIB description for a given SCFT, we present\nan explicit construction to determine the aforementioned set of 3d quivers,\nincluding the subset of maximal unitary quivers. As a byproduct, we find a\nsimple method for constructing the three dimensional mirror associated with the\nSCFT. We demonstrate the construction for the $(A_k, A_k)$ theories of Cecotti,\nNeitzke and Vafa, focusing on the cases $k=3$ and $k=4$. The associated maximal\nunitary quiver is unique up to field redefinitions and turns out to be an\nAbelian quiver gauge theory. The three dimensional mirror obtained in this\nfashion reproduces the well-known complete graph. In the appendices to the main\npaper, we study the quotient N-ality in the closely related family of $D^b_p\n(SU(N))$ SCFTs, for which both the maximal unitary quiver as well as the 3d\nmirror turn out to be non-Abelian gauge theories generically\n', '5d SCFTs from Isolated Complete Intersection Singularities In this paper, we explore the zoo of 5d superconformal field theories (SCFTs)\nconstructed from M-theory on Isolated Complete Intersection Singularities\n(ICIS). We systematically investigate the crepant resolution of such\nsingularities, and obtain a classification of rank $\\leqslant 10$ models with a\nsmooth crepant resolution and smooth exceptional divisors, as well as a number\nof infinite sequences with the same smoothness properties. For these models, we\nstudy their Coulomb branch properties and compute the flavor symmetry algebra\nfrom the resolved CY3 and/or the magnetic quiver. We check the validity of the\nconjectures relating the properties of the 5d SCFT and the 4d $\\mathcal{N}=2$\nSCFT from IIB superstring on the same singularity. When the 4d $\\mathcal{N}=2$\nSCFT has a Lagrangian quiver gauge theory description, one can obtain the\nmagnetic quiver of the 5d theory by gauging flavor symmetry, which encodes the\n5d Higgs branch information. Regarding the smoothness of the crepant resolution\nand integrality of 4d Coulomb branch spectrum, we find examples with a smooth\nresolved CY3 and smooth exceptional divisors, but fractional 4d Coulomb branch\nspectrum. Moreover, we compute the discrete (higher)-symmetries of the 5d/4d\nSCFTs from the link topology for a few examples.\n', ""Mirror symmetry for circle compactified 4d $\\mathcal{N}=2$ SCFTs We propose a mirror symmetry for 4d $\\mathcal{N}=2$ superconformal field\ntheories (SCFTs) compactified on a circle with finite size. The mirror symmetry\ninvolves vertex operator algebra (VOA) describing the Schur sector (containing\nHiggs branch) of 4d theory, and the Coulomb branch of the effective 3d theory.\nThe basic feature of the mirror symmetry is that many representational\nproperties of VOA are matched with geometric properties of the Coulomb branch\nmoduli space. Our proposal is verified for a large class of Argyres-Douglas\n(AD) theories engineered from M5 branes, whose VOAs are W-algebras, and Coulomb\nbranches are the Hitchin moduli spaces. VOA data such as simple modules, Zhu's\nalgebra, and modular properties are matched with geometric properties like\n$\\mathbb{C}^*$-fixed varieties in Hitchin fibers, cohomologies, and some DAHA\nrepresentations. We also mention relationships to 3d symplectic duality.\n""]","[('quiver gauge theories', 0.6717501282691956), ('supersymmetric gauge theories', 0.6455905437469482), ('quiver gauge theory', 0.6209503412246704), ('mathcal gauge theories', 0.5910360217094421), ('gauge theories', 0.5909909009933472), ('superconformal field theories', 0.5742486119270325), ('supersymmetric gauge', 0.5332513451576233), ('gauge theory', 0.5082007646560669), ('quiver gauge', 0.49770402908325195), ('mathcal supersymmetric', 0.47452282905578613)]" 113,113,225,113_quadrilaterals_polygons inscribed_convex polyhedra_quadrilateral,"['quadrilaterals', 'polygons inscribed', 'convex polyhedra', 'quadrilateral', 'convex polyhedron', 'polyhedral', 'polyhedral surfaces', 'diagonals', 'polyhedron', 'polygons']","['A generalization of parallelograms involving inscribed ellipses,\n conjugate diameters, and tangency chords A convex quadrilateral, $Q$, is called a midpoint diagonal quadrilateral if\nthe intersection point of the diagonals of $Q$ coincides with the midpoint of\nat least one of the diagonals of $Q$. A parallelogram, P, is a special case of\na midpoint diagonal quadrilateral since the diagonals of P bisect one another.\nWe prove two results about ellipses inscribed in midpoint diagonal\nquadrilaterals, which generalize properties of ellipses inscribed in\nparallelograms involving convex quadrilaterals. First, $Q$ is a midpoint\ndiagonal quadrilateral if and only if each ellipse inscribed in $Q$ has\ntangency chords which are parallel to one of the diagonals of $Q$. Second, $Q$\nis a midpoint diagonal quadrilateral if and only if each ellipse inscribed in\n$Q$ has a pair of conjugate diameters parallel to the diagonals of $Q$.\nFinally, we show that there is a unique ellipse, $E_I$, of minimal eccentricity\nincribed in a midpoint diagonal quadrilateral, $Q$, and we show that the equal\nconjugate diameters of $E_I$ are parallel to the diagonals of $Q$.\n', 'On the Coherent Labelling Conjecture of a Polyhedron in Three Dimensions In this article we consider an open conjecture about coherently labelling a\npolyhedron in three dimensions. We exhibit all the forty eight possible\ncoherent labellings of a tetrahedron. We also exhibit that some simplicial\npolyhedra like bipyramids, Kleetopes, gyroelongated bipyramids are coherently\nlabellable. Also we prove that pyramids over $n$-gons for $n\\geq 4$, which are\nnot simplicial polyhedra, are coherently labellable. We prove that among\nplatonic solids, the cube and the dodecahedron are not coherently labellable,\neven though, the tetrahedron, the octahedron and the icosahedron are coherently\nlabellable. Unlike the case of a tetrahedron, in general for a polyhedron, we\nshow that a coherent labelling need not induce a coherent labelling at a\nvertex. We prove the main conjecture in the affirmative for a certain class of\npolyhedra which are constructible from tetrahedra through certain types of edge\nand face vanishing tetrahedron attachments. As a consequence we conclude that a\ncube cannot be obtained from only these type of tetrahedron attachments. We\nalso give an obstruction criterion for a polyhedron to be not coherently\nlabellable and consequentially show that any polyhedron obtained from a pyramid\nwith its apex chopped off is not coherently labellable. Finally with the\nsuggestion of the affirmative results we prove the main theorem that any\nsimplicial polyhedron is coherently labellable.\n', ""Non-simplicial Delaunay meshing via approximation by radical partitions We consider the construction of a polyhedral Delaunay partition as a limit of\nthe sequence of power diagrams (radical partitions). The dual Voronoi diagram\nis obtained as a limit of the sequence of weighted Delaunay partitions. The\nproblem is reduced to the construction of two dual convex polyhedra, inscribed\nand superscribed around a circular paraboloid, as a limit of the sequence of\npairs of general dual convex polyhedra. The sequence of primal polyhedra should\nconverge to the superscribed polyhedron and the sequence of the dual polyhedra\nconverges to the inscribed polyhedron.\n We are interested in the case when the vertices of primal polyhedra can move\nor merge together, i.e., no new faces are allowed for dual polyhedra. These\nrules define the transformation of the set of initial spheres into the set of\nDelaunay spheres using radius variation and sphere movement and elimination.\nExistence theorems are still unavailable but we suggest a functional measuring\nthe deviation of the convex polyhedron from the one inscribed into the\nparaboloid. It is the discrete Dirichlet functional for the power function\nwhich is a linear interpolant of the vertical distance of the dual vertices\nfrom the paraboloid. The functional's absolute minimizer is attained on the\nconstant power field, meaning that the inscribed polyhedron can be obtained by\na simple translation. This formulation of the functional for the dual surface\nis not quadratic since the unknowns are the vertices of the primal polyhedron,\nhence, the transformation of the set of spheres into Delaunay spheres is not\nunique.\n We concentrate on the experimental confirmation of the approach viability and\nput aside mesh quality problems. The zero value of the gradient of the proposed\nfunctional defines a manifold describing the evolution of Delaunay spheres.\nHence, Delaunay-Voronoi meshes can be optimized using the manifold as a\nconstraint.\n""]","[('quadrilaterals', 0.5720642805099487), ('polygons inscribed', 0.5525200366973877), ('convex polyhedra', 0.5356132388114929), ('quadrilateral', 0.5281274914741516), ('convex polyhedron', 0.4961888790130615), ('polyhedral', 0.48507317900657654), ('polyhedral surfaces', 0.4839359521865845), ('diagonals', 0.4649105966091156), ('polyhedron', 0.4578579366207123), ('polygons', 0.45581182837486267)]" 114,114,225,114_semantic communications_semantic communication_semantic aware_encoder,"['semantic communications', 'semantic communication', 'semantic aware', 'encoder', 'autoencoder', 'decoder', 'encoder decoder', 'channel coding', 'source channel coding', 'semantic features']","['Wireless Image Transmission with Semantic and Security Awareness Semantic communication is an increasingly popular framework for wireless\nimage transmission due to its high communication efficiency. With the aid of\nthe joint-source-and-channel (JSC) encoder implemented by neural network,\nsemantic communication directly maps original images into symbol sequences\ncontaining semantic information. Compared with the traditional separate source\nand channel coding design used in bitlevel communication systems, semantic\ncommunication systems are known to be more efficient and accurate especially in\nthe low signal-to-the-noise ratio (SNR) regime. This thus prompts an critical\nwhile yet to be tackled issue of security in semantic communication: it makes\nthe eavesdropper more easier to crack the semantic information as it can be\ndecoded even in a quite noisy channel. In this letter, we develop a semantic\ncommunication framework that accounts for both semantic meaning decoding\nefficiency and its risk of privacy leakage. To achieve this, targeting wireless\nimage transmission, we on the one hand propose an JSC autoencoder featuring\nresidual for efficient semantic meaning extraction and transmission, and on the\nother hand, propose a data-driven scheme that balances the efficiency-privacy\ntradeoff. Extensive experimental results are provided to show the effectiveness\nand robustness of the proposed scheme.\n', 'Variational Source-Channel Coding for Semantic Communication Semantic communication technology emerges as a pivotal bridge connecting AI with classical communication. The current semantic communication systems are generally modeled as an Auto-Encoder (AE). AE lacks a deep integration of AI principles with communication strategies due to its inability to effectively capture channel dynamics. This gap makes it difficult to justify the need for joint source-channel coding (JSCC) and to explain why performance improves. This paper begins by exploring lossless and lossy communication, highlighting that the inclusion of data distortion distinguishes semantic communication from classical communication. It breaks the conditions for the separation theorem to hold and explains why the amount of data transferred by semantic communication is less. Therefore, employing JSCC becomes imperative for achieving optimal semantic communication. Moreover, a Variational Source-Channel Coding (VSCC) method is proposed for constructing semantic communication systems based on data distortion theory, integrating variational inference and channel characteristics. Using a deep learning network, we develop a semantic communication system employing the VSCC method and demonstrate its capability for semantic transmission. We also establish semantic communication systems of equivalent complexity employing the AE method and the VAE method. Experimental results reveal that the VSCC model offers superior interpretability compared to AE model, as it clearly captures the semantic features of the transmitted data, represented as the variance of latent variables in our experiments. In addition, VSCC model exhibits superior semantic transmission capabilities compared to VAE model. At the same level of data distortion evaluated by PSNR, VSCC model exhibits stronger human interpretability, which can be partially assessed by SSIM.', 'Robust Semantic Communications Against Semantic Noise Although the semantic communications have exhibited satisfactory performance\nin a large number of tasks, the impact of semantic noise and the robustness of\nthe systems have not been well investigated. Semantic noise is a particular\nkind of noise in semantic communication systems, which refers to the misleading\nbetween the intended semantic symbols and received ones. In this paper, we\nfirst propose a framework for the robust end-to-end semantic communication\nsystems to combat the semantic noise. Particularly, we analyze the causes of\nsemantic noise and propose a practical method to generate it. To remove the\neffect of semantic noise, adversarial training is proposed to incorporate the\nsamples with semantic noise in the training dataset. Then, the masked\nautoencoder (MAE) is designed as the architecture of a robust semantic\ncommunication system, where a portion of the input is masked. To further\nimprove the robustness of semantic communication systems, we firstly employ the\nvector quantization-variational autoencoder (VQ-VAE) to design a discrete\ncodebook shared by the transmitter and the receiver for encoded feature\nrepresentation. Thus, the transmitter simply needs to transmit the indices of\nthese features in the codebook. Simulation results show that our proposed\nmethod significantly improves the robustness of semantic communication systems\nagainst semantic noise with significant reduction on the transmission overhead.\n']","[('semantic communications', 0.543390691280365), ('semantic communication', 0.4892060160636902), ('semantic aware', 0.4582371413707733), ('encoder', 0.43819570541381836), ('autoencoder', 0.4337078928947449), ('decoder', 0.43122735619544983), ('encoder decoder', 0.42921188473701477), ('channel coding', 0.42287570238113403), ('source channel coding', 0.4122207462787628), ('semantic features', 0.3979778587818146)]" 115,115,225,115_closed hyperbolic surfaces_hyperbolic surfaces_hyperbolic manifolds_geodesics hyperbolic,"['closed hyperbolic surfaces', 'hyperbolic surfaces', 'hyperbolic manifolds', 'geodesics hyperbolic', 'closed hyperbolic surface', 'hyperbolic manifold', 'compact hyperbolic', 'hyperbolic surface', 'closed geodesics', 'hyperbolic metric']","['Effective mapping class group dynamics II: Geometric intersection\n numbers We show that the action of the mapping class group on the space of closed\ncurves of a closed surface effectively tracks the corresponding action on\nTeichm\\""uller space in the following sense: for all but quantitatively few\nmapping classes, the information of how a mapping class moves a given point of\nTeichm\\""uller space determines, up to a power saving error term, how it changes\nthe geometric intersection numbers of a given closed curve with respect to\narbitrary geodesic currents. Applications include an effective estimate\ndescribing the speed of convergence of Teichm\\""uller geodesic rays to the\nboundary at infinity of Teichm\\""uller space, an effective estimate comparing\nthe Teichm\\""uller and Thurston metrics along mapping class group orbits of\nTeichm\\""uller space, and, in the sequel, effective estimates for countings of\nfilling closed geodesics on closed, negatively curved surfaces.\n', 'Local Rigidity of Teichm\\""uller space with Thurston metric We show that every $\\mathbb R$-linear surjective isometry between the\ncotangent spaces to the Teichm\\""uller space equipped with the Thurston norm is\ninduced by some isometry between the underlying hyperbolic surfaces, which is\nan analogue of Royden\'s theorem concerning the Teichm\\""uller metric.\n', 'Ray structures on Teichm\\""uller Space While there may be many Thurston metric geodesics between a pair of points in\nTeichm\\""uller space, we find that by imposing an additional energy minimization\nconstraint on the geodesics, thought of as limits of harmonic map rays, we\nselect a unique Thurston geodesic through those points. Extending the target\nsurface to the Thurston boundary yields, for each point $Y$ in Teichm\\""uller\nspace, an ""exponential map"" of rays from that point $Y$ onto Teichm\\""uller\nspace with visual boundary the Thurston boundary of Teichm\\""uller space.\n We first depict harmonic map ray structures on Teichm\\""uller space as a\ngeometric transition between Teichm\\""uller ray structures and Thurston geodesic\nray structures. In particular, by appropriately degenerating the source of a\nharmonic map between hyperbolic surfaces (along ""harmonic map dual rays""), the\nharmonic map rays through the target converge to a Thurston geodesic; by\nappropriately degenerating the target of the harmonic map, those harmonic map\ndual rays through the domain converge to Teichm\\""uller geodesics. We then\nextend this transition to one from Teichm\\""uller disks through Hopf\ndifferential disks to stretch-earthquake disks. These results apply to surfaces\nwith boundary, resolving a question on stretch maps between such surfaces.\n']","[('closed hyperbolic surfaces', 0.7042256593704224), ('hyperbolic surfaces', 0.6744956970214844), ('hyperbolic manifolds', 0.6548596620559692), ('geodesics hyperbolic', 0.6515372395515442), ('closed hyperbolic surface', 0.6494942903518677), ('hyperbolic manifold', 0.6227726936340332), ('compact hyperbolic', 0.6185656785964966), ('hyperbolic surface', 0.6084424257278442), ('closed geodesics', 0.5993683934211731), ('hyperbolic metric', 0.5958948731422424)]" 116,116,225,116_bounded pseudoconvex domains_bounded pseudoconvex domain_bergman metrics_strictly pseudoconvex domains,"['bounded pseudoconvex domains', 'bounded pseudoconvex domain', 'bergman metrics', 'strictly pseudoconvex domains', 'pseudoconvex domains', 'strongly pseudoconvex domain', 'pseudoconvex domains mathbb', 'bergman metric', 'strictly pseudoconvex domain', 'kobayashi metric']","['Some remarks on the Kobayashi--Fuks metric on strongly pseudoconvex\n domains The Ricci curvature of the Bergman metric on a bounded domain $D\\subset\n\\mathbb{C}^n$ is strictly bounded above by $n+1$ and consequently $\\log\n(K_D^{n+1}g_{B,D})$, where $K_D$ is the Bergman kernel for $D$ on the diagonal\nand $g_{B, D}$ is the Riemannian volume element of the Bergman metric on $D$,\nis the potential for a K\\""ahler metric on $D$ known as the Kobayashi--Fuks\nmetric. In this note we study the localization of this metric near holomorphic\npeak points and also show that this metric shares several properties with the\nBergman metric on strongly pseudoconvex domains.\n', 'Visibility domains that are not pseudoconvex The earliest examples of visibility domains, given by Bharali--Zimmer, are pseudoconvex. In fact, all known examples of visibility domains are pseudoconvex. We show that there exist non-pseudoconvex visibility domains. We supplement this proof by a general method to construct a wide range of non-pseudoconvex, hence non-Kobayashi-complete, visibility domains.', ""The Bergman-Fridman invariant on some classes of pseudoconvex domains We study the boundary behaviour of a variant of the Fridman's invariant\nfunction (defined in terms of the Bergman metric) on Levi corank one domains,\nstrongly pseudoconvex domains, smoothly bounded convex domains in $\n\\mathbb{C}^n $ and polyhedral domains in $ \\mathbb{C}^2 $.\n""]","[('bounded pseudoconvex domains', 0.6928473114967346), ('bounded pseudoconvex domain', 0.6547444462776184), ('bergman metrics', 0.6406670212745667), ('strictly pseudoconvex domains', 0.6333358287811279), ('pseudoconvex domains', 0.6199033856391907), ('strongly pseudoconvex domain', 0.5979572534561157), ('pseudoconvex domains mathbb', 0.5964627861976624), ('bergman metric', 0.5926737785339355), ('strictly pseudoconvex domain', 0.5914952158927917), ('kobayashi metric', 0.5796822905540466)]" 117,117,224,117_change point detection_change point estimation_change detection_detecting change,"['change point detection', 'change point estimation', 'change detection', 'detecting change', 'detection change', 'detecting changes', 'changepoints', 'changepoint', 'change point', 'change points']","['Adversarially robust change point detection Change point detection is becoming increasingly popular in many application\nareas. On one hand, most of the theoretically-justified methods are\ninvestigated in an ideal setting without model violations, or merely robust\nagainst identical heavy-tailed noise distribution across time and/or against\nisolate outliers; on the other hand, we are aware that there have been\nexponentially growing attacks from adversaries, who may pose systematic\ncontamination on data to purposely create spurious change points or disguise\ntrue change points. In light of the timely need for a change point detection\nmethod that is robust against adversaries, we start with, arguably, the\nsimplest univariate mean change point detection problem. The adversarial\nattacks are formulated through the Huber $\\varepsilon$-contamination framework,\nwhich in particular allows the contamination distributions to be different at\neach time point. In this paper, we demonstrate a phase transition phenomenon in\nchange point detection. This detection boundary is a function of the\ncontamination proportion $\\varepsilon$ and is the first time shown in the\nliterature. In addition, we derive the minimax-rate optimal localisation error\nrate, quantifying the cost of accuracy in terms of the contamination\nproportion. We propose a computationally feasible method, matching the minimax\nlower bound under certain conditions, saving for logarithmic factors. Extensive\nnumerical experiments are conducted with comparisons to robust change point\ndetection methods in the existing literature.\n', 'Optimal Change-Point Detection and Localization Given a times series ${\\bf Y}$ in $\\mathbb{R}^n$, with a piece-wise contant\nmean and independent components, the twin problems of change-point detection\nand change-point localization respectively amount to detecting the existence of\ntimes where the mean varies and estimating the positions of those\nchange-points. In this work, we tightly characterize optimal rates for both\nproblems and uncover the phase transition phenomenon from a global testing\nproblem to a local estimation problem. Introducing a suitable definition of the\nenergy of a change-point, we first establish in the single change-point setting\nthat the optimal detection threshold is $\\sqrt{2\\log\\log(n)}$. When the energy\nis just above the detection threshold, then the problem of localizing the\nchange-point becomes purely parametric: it only depends on the difference in\nmeans and not on the position of the change-point anymore. Interestingly, for\nmost change-point positions, it is possible to detect and localize them at a\nmuch smaller energy level. In the multiple change-point setting, we establish\nthe energy detection threshold and show similarly that the optimal localization\nerror of a specific change-point becomes purely parametric. Along the way,\ntight optimal rates for Hausdorff and $l_1$ estimation losses of the vector of\nall change-points positions are also established. Two procedures achieving\nthese optimal rates are introduced. The first one is a least-squares estimator\nwith a new multiscale penalty that favours well spread change-points. The\nsecond one is a two-step multiscale post-processing procedure whose\ncomputational complexity can be as low as $O(n\\log(n))$. Notably, these two\nprocedures accommodate with the presence of possibly many low-energy and\ntherefore undetectable change-points and are still able to detect and localize\nhigh-energy change-points even with the presence of those nuisance parameters.\n', 'Online change-point detection for a transient change We consider a popular online change-point problem of detecting a transient\nchange in distributions of i.i.d. random variables. For this change-point\nproblem, several change-point procedures are formulated and some advanced\nresults for a particular procedure are surveyed. Some new approximations for\nthe average run length to false alarm are offered and the power of these\nprocedures for detecting a transient change in mean of a sequence of normal\nrandom variables is compared.\n']","[('change point detection', 0.6986865997314453), ('change point estimation', 0.6946261525154114), ('change detection', 0.6465256810188293), ('detecting change', 0.6258073449134827), ('detection change', 0.6098940372467041), ('detecting changes', 0.5856846570968628), ('changepoints', 0.5252472162246704), ('changepoint', 0.4407447278499603), ('change point', 0.4350447952747345), ('change points', 0.42594078183174133)]" 118,118,222,118_smooth convex optimization_proximal gradient methods_convex optimization_nonsmooth optimization,"['smooth convex optimization', 'proximal gradient methods', 'convex optimization', 'nonsmooth optimization', 'convex optimization problems', 'gradient descent', 'proximal gradient', 'composite optimization', 'gradient methods', 'nonsmooth convex']","['Convergence of Nonmonotone Proximal Gradient Methods under the\n Kurdyka-Lojasiewicz Property without a Global Lipschitz Assumption We consider the composite minimization problem with the objective function\nbeing the sum of a continuously differentiable and a merely lower\nsemicontinuous and extended-valued function. The proximal gradient method is\nprobably the most popular solver for this class of problems. Its convergence\ntheory typically requires that either the gradient of the smooth part of the\nobjective function is globally Lipschitz continuous or the (implicit or\nexplicit) a priori assumption that the iterates generated by this method are\nbounded. Some recent results show that, without these assumptions, the proximal\ngradient method, combined with a monotone stepsize strategy, is still globally\nconvergent with a suitable rate-of-convergence under the Kurdyka-Lojasiewicz\nproperty. For a nonmonotone stepsize strategy, there exist some attempts to\nverify similar convergence results, but, so far, they need stronger\nassumptions. This paper is the first which shows that nonmonotone proximal\ngradient methods for composite optimization problems share essentially the same\nnice global and rate-of-convergence properties as its monotone counterparts,\nstill without assuming a global Lipschitz assumption and without an a priori\nknowledge of the boundedness of the iterates.\n', 'Inexact proximal methods for weakly convex functions This paper proposes and develops inexact proximal methods for finding\nstationary points of the sum of a smooth function and a nonsmooth weakly convex\none, where an error is present in the calculation of the proximal mapping of\nthe nonsmooth term. A general framework for finding zeros of a continuous\nmapping is derived from our previous paper on this subject to establish\nconvergence properties of the inexact proximal point method when the smooth\nterm is vanished and of the inexact proximal gradient method when the smooth\nterm satisfies a descent condition. The inexact proximal point method achieves\nglobal convergence with constructive convergence rates when the Moreau envelope\nof the objective function satisfies the Kurdyka-Lojasiewicz (KL) property.\nMeanwhile, when the smooth term is twice continuously differentiable with a\nLipschitz continuous gradient and a differentiable approximation of the\nobjective function satisfies the KL property, the inexact proximal gradient\nmethod achieves the global convergence of iterates with constructive\nconvergence rates.\n', 'Accelerated Primal-Dual Gradient Method for Smooth and Convex-Concave\n Saddle-Point Problems with Bilinear Coupling In this paper we study the convex-concave saddle-point problem $\\min_x \\max_y\nf(x) + y^T \\mathbf{A} x - g(y)$, where $f(x)$ and $g(y)$ are smooth and convex\nfunctions. We propose an Accelerated Primal-Dual Gradient Method (APDG) for\nsolving this problem, achieving (i) an optimal linear convergence rate in the\nstrongly-convex-strongly-concave regime, matching the lower complexity bound\n(Zhang et al., 2021), and (ii) an accelerated linear convergence rate in the\ncase when only one of the functions $f(x)$ and $g(y)$ is strongly convex or\neven none of them are. Finally, we obtain a linearly convergent algorithm for\nthe general smooth and convex-concave saddle point problem $\\min_x \\max_y\nF(x,y)$ without the requirement of strong convexity or strong concavity.\n']","[('smooth convex optimization', 0.6436753273010254), ('proximal gradient methods', 0.6288390159606934), ('convex optimization', 0.5975933074951172), ('nonsmooth optimization', 0.579609215259552), ('convex optimization problems', 0.5776558518409729), ('gradient descent', 0.5215204954147339), ('proximal gradient', 0.5082480311393738), ('composite optimization', 0.4998741149902344), ('gradient methods', 0.49756118655204773), ('nonsmooth convex', 0.4854936897754669)]" 119,119,221,119_schr odinger operators_schr odinger operator_quasiperiodic schr odinger_discrete schr odinger,"['schr odinger operators', 'schr odinger operator', 'quasiperiodic schr odinger', 'discrete schr odinger', 'odinger operators', 'periodic schr odinger', 'quasiperiodic schr', 'odinger operator', 'odinger operators mathbb', 'anderson localization']","['Random Schr\\""odinger Operators and Anderson localization in aperiodic\n media In this note we review some results on localization and related properties\nfor random Schr\\""odinger operators arising in aperiodic media. These include\nthe Anderson model associated to disordered quasycrystals and also the\nso-called Delone operators, operators associated to deterministic aperiodic\nstructures.\n', 'Arithmetic version of anderson localization for quasiperiodic\n Schr\\""odinger operators with even cosine type potentials We propose a new method to prove Anderson localization for quasiperiodic\nSchr\\""odinger operators and apply it to the quasiperiodic model considered by\nSinai and Fr\\""ohlich-Spencer-Wittwer. More concretely, we prove Anderson\nlocalization for even $C^2$ cosine type quasiperiodic Schr\\""odinger operators\nwith large coupling constants, Diophantine frequencies and Diophantine phases.\n', 'On the spectrum of quasi-periodic Schr\\""odinger operators on\n $\\mathbb{Z}^d$ with $C^2$-cosine type potentials In this paper, we establish the Anderson localization, strong dynamical\nlocalization and the $(\\frac 12-)$-H\\""older continuity of the integrated\ndensity of states (IDS) for some multi-dimensional discrete quasi-periodic (QP)\nSchr\\""odinger operators with asymmetric $C^2$-cosine type potentials. We extend\nboth the iteration scheme of \\cite{CSZ23a} and the interlacing method of\n\\cite{FV21} to handle asymmetric Rellich functions with collapsed gaps.\n']","[('schr odinger operators', 0.6872833967208862), ('schr odinger operator', 0.6612794399261475), ('quasiperiodic schr odinger', 0.6471320986747742), ('discrete schr odinger', 0.6112416386604309), ('odinger operators', 0.6072113513946533), ('periodic schr odinger', 0.5967509150505066), ('quasiperiodic schr', 0.576072633266449), ('odinger operator', 0.5705596208572388), ('odinger operators mathbb', 0.5404006838798523), ('anderson localization', 0.5215941667556763)]" 120,120,219,120_chemotaxis system_navier stokes system_keller segel type_keller segel,"['chemotaxis system', 'navier stokes system', 'keller segel type', 'keller segel', 'chemotaxis', 'nonlinear diffusion', 'elliptic parabolic', 'segel', 'solutions parabolic', 'boundedness classical solutions']","['On the parabolic-elliptic Keller-Segel system with signal-dependent\n motilities: a paradigm for global boundedness and steady states This paper is concerned with a parabolic-elliptic Keller-Segel system where\nboth diffusive and chemotactic coefficients (motility functions) depend on the\nchemical signal density. This system was originally proposed by Keller and\nSegel in \\cite{KS-1971-JTB2} to describe the aggregation phase of {\\it\nDictyostelium discoideum} cells in response to the secreted chemical signal\ncyclic adenosine monophosphate (cAMP), but the available analytical results are\nvery limited by far. Considering system in a bounded smooth domain with Neumann\nboundary conditions, we establish the global boundedness of solutions in any\ndimensions with suitable general conditions on the signal-dependent motility\nfunctions, which are applicable to a wide class of motility functions. The\nexistence/nonexistence of non-constant steady states is studied and abundant\nstationary profiles are found. Some open questions are outlined for further\npursues. Our results demonstrate that the global boundedness and profile of\nstationary solutions to the Keller-Segel system with signal-dependent\nmotilities depend on the decay rates of motility functions, space dimensions\nand the relation between the diffusive and chemotactic motilities, which makes\nthe dynamics immensely wealthy.\n', 'A decoupled linear, mass-conservative block-centered finite difference\n method for the Keller-Segel chemotaxis system As a class of nonlinear partial differential equations, the Keller-Segel\nsystem is widely used to model chemotaxis in biology. In this paper, we present\nthe construction and analysis of a decoupled linear, mass-conservative,\nblock-centered finite difference method for the classical Keller-Segel\nchemotaxis system. We show that the scheme is mass conservative for the cell\ndensity at the discrete level. In addition, second-order temporal and spatial\nconvergence for both the cell density and the chemoattractant concentration are\nrigorously discussed, using the mathematical induction method, the discrete\nenergy method and detailed analysis of the truncation errors. Our scheme is\nproposed and analyzed on non-uniform spatial grids, which leads to more\naccurate and efficient modeling results for the chemotaxis system with rapid\nblow-up phenomenon. Furthermore, the existence and uniqueness of solutions to\nthe Keller-Segel chemotaxis system are also discussed. Numerical experiments\nare presented to verify the theoretical results and to show the robustness and\naccuracy of the scheme.\n', 'On the space-time analyticity of the Keller-Segel-Navier-Stokes system In this paper, we study the coupled Keller-Segel-Navier-Stokes system, which\nmodels chemotaxis occuring in ambient viscous fluid. We consider this\nnonlinear, nonlocal system on a periodic strip, equipped with homogeneous\nNeumann boundary conditions for the Keller-Segel part and no-slip boundary\ncondition for the fluid part. We prove the simultaneous space-time analyticity\nof the solution up to the boundary based on energy methods.\n']","[('chemotaxis system', 0.5155515670776367), ('navier stokes system', 0.42684420943260193), ('keller segel type', 0.4255433678627014), ('keller segel', 0.418174147605896), ('chemotaxis', 0.39214301109313965), ('nonlinear diffusion', 0.35780829191207886), ('elliptic parabolic', 0.3562508225440979), ('segel', 0.35502198338508606), ('solutions parabolic', 0.3528815805912018), ('boundedness classical solutions', 0.35235437750816345)]" 121,121,215,121_autoregressive models_autoregressive time series_autoregressive_vector autoregressive,"['autoregressive models', 'autoregressive time series', 'autoregressive', 'vector autoregressive', 'autoregressive time', 'autoregressive processes', 'first order autoregressive', 'autoregressive conditional', 'time series models', 'autoregressive moving']","['Diagnostic checking of periodic vector autoregressive time series models\n with dependent errors In this article, we study the asymptotic behaviour of the residual\nautocorrelations for periodic vector autoregressive time series models (PVAR\nhenceforth) with uncorrelated but dependent innovations (i.e., weak PVAR). We\nthen deduce the asymptotic distribution of the Ljung-Box-McLeod modified\nPortmanteau statistics for weak PVAR models. In Monte Carlo experiments, we\nillustrate that the proposed test statistics have reasonable finite sample\nperformance. When the innovations exhibit conditional heteroscedasticity or\nother forms of dependence, it appears that the standard test statistics (under\nindependent and identically distributed innovations) are generally nonreliable,\noverrejecting, or underrejecting severely, while the proposed test statistics\noffer satisfactory levels. An illustrative application on real data is also\nproposed.\n', ""On the partial autocorrelation function for locally stationary time\n series: characterization, estimation and inference For stationary time series, it is common to use the plots of partial\nautocorrelation function (PACF) or PACF-based tests to explore the temporal\ndependence structure of such processes. To our best knowledge, such analogs for\nnon-stationary time series have not been fully established yet. In this paper,\nwe fill this gap for locally stationary time series with short-range\ndependence. First, we characterize the PACF locally in the time domain and show\nthat the $j$th PACF, denoted as $\\rho_{j}(t),$ decays with $j$ whose rate is\nadaptive to the temporal dependence of the time series $\\{x_{i,n}\\}$. Second,\nat time $i,$ we justify that the PACF $\\rho_j(i/n)$ can be efficiently\napproximated by the best linear prediction coefficients via the Yule-Walker's\nequations. This allows us to study the PACF via ordinary least squares (OLS)\nlocally. Third, we show that the PACF is smooth in time for locally stationary\ntime series. We use the sieve method with OLS to estimate $\\rho_j(\\cdot)$ and\nconstruct some statistics to test the PACFs and infer the structures of the\ntime series. These tests generalize and modify those used for stationary time\nseries. Finally, a multiplier bootstrap algorithm is proposed for practical\nimplementation and an $\\mathtt R$ package $\\mathtt {Sie2nts}$ is provided to\nimplement our algorithm. Numerical simulations and real data analysis also\nconfirm usefulness of our results.\n"", 'Statistical inference of high-dimensional vector autoregressive time\n series with non-i.i.d. innovations Independent or i.i.d. innovations is an essential assumption in the\nliterature for analyzing a vector time series. However, this assumption is\neither too restrictive for a real-life time series to satisfy or is hard to\nverify through a hypothesis test. This paper performs statistical inference on\na sparse high-dimensional vector autoregressive time series, allowing its white\nnoise innovations to be dependent, even non-stationary. To achieve this goal,\nit adopts a post-selection estimator to fit the vector autoregressive model and\nderives the asymptotic distribution of the post-selection estimator. The\ninnovations in the autoregressive time series are not assumed to be\nindependent, thus making the covariance matrices of the autoregressive\ncoefficient estimators complex and difficult to estimate. Our work develops a\nbootstrap algorithm to facilitate practitioners in performing statistical\ninference without having to engage in sophisticated calculations. Simulations\nand real-life data experiments reveal the validity of the proposed methods and\ntheoretical results.\n Real-life data is rarely considered to exactly satisfy an autoregressive\nmodel with independent or i.i.d. innovations, so our work should better reflect\nthe reality compared to the literature that assumes i.i.d. innovations.\n']","[('autoregressive models', 0.6642975807189941), ('autoregressive time series', 0.6537430286407471), ('autoregressive', 0.6127533316612244), ('vector autoregressive', 0.599174976348877), ('autoregressive time', 0.5891879200935364), ('autoregressive processes', 0.5868762731552124), ('first order autoregressive', 0.5785619616508484), ('autoregressive conditional', 0.5709941983222961), ('time series models', 0.5549508333206177), ('autoregressive moving', 0.531025767326355)]" 122,122,215,122_index graphs_indices graphs_index graph_index trees,"['index graphs', 'indices graphs', 'index graph', 'index trees', 'topological index', 'topological indices', 'wiener index', 'extremal graphs', 'index introduced', 'vertex degree']","['Extremal problems on Sombor indices of unicyclic graphs with a given\n diameter Sombor index is a novel topological index, which was introduced by Gutman and\ndefined for a graph $G$ as $SO(G)=\\sum\\limits_{uv\\in\nE(G)}\\sqrt{d_{u}^{2}+d_{v}^{2}}$, where $d_{u}=d_{G}(u)$ denotes the degree of\nvertex $u$ in graph $G$.\n Extremal problems on the Sombor index for trees with a given diameter has\nbeen considered by Chen et al. [H. Chen, W. Li, J. Wang, Extremal values on the\nSombor index of trees, MATCH Commun. Math. Comput. Chem. 87 (2022) 23--49] and\nLi et al. [S. Li, Z. Wang, M. Zhang, On the extremal Sombor index of trees with\na given diameter, Appl. Math. Comput. 416 (2022) 126731]. As an extension of\nresults introduces above, we determine the maximum Sombor indices for unicyclic\ngraphs with a fixed order and given diameter.\n', 'On the first Banhatti-Sombor index Let $d_v$ be the degree of the vertex $v$ in a connected graph $G$. The first\nBanhatti-Sombor index of $G$ is defined as $BSO(G) =\\sum_{uv\\in\nE(G)}\\sqrt{\\frac{1}{d^2_u}+\\frac{1}{d^2_v}}$, which is a new\nvertex-degree-based topological index introduced by Kulli. In this paper, the\nmathematical relations between the first Banhatti-Sombor index and some other\nwell-known vertex-degree-based topological indices are established. In\naddition, the trees extremal with respect to the first Banhatti-Sombor index on\ntrees and chemical trees are characterized, respectively.\n', 'Bounding the $k$-Steiner Wiener and Wiener-type indices of trees in\n terms of eccentric sequence The eccentric sequence of a connected graph $G$ is the nondecreasing sequence\nof the eccentricities of its vertices. The Wiener index of $G$ is the sum of\nthe distances between all unordered pairs of vertices of $G$. The unique trees\nthat minimise the Wiener index among all trees with a given eccentric sequence\nwere recently determined by the present authors. In this paper we show that\nthese results hold not only for the Wiener index, but for a large class of\ndistance-based topological indices which we term Wiener-type indices.\nParticular cases of this class include the hyper-Wiener index, the Harary\nindex, the generalised Wiener index $W^{\\lambda}$ for $\\lambda>0$ and $\\lambda\n<0$, and the reciprocal complementary Wiener index. Our results imply and unify\nknown bounds on these Wiener-type indices for trees of given order and\ndiameter.\n We also present similar results for the $k$-Steiner Wiener index of trees\nwith a given eccentric sequence. The Steiner distance of a set $A\\subseteq\nV(G)$ is theminimum number of edges in a subtree of $G$ whose vertex set\ncontains $A$, and the $k$-Steiner Wiener index is the sum of distances of all\n$k$-element subsets of $V(G)$. As a corollary, we obtain a sharp lower bound on\nthe $k$-Steiner Wiener index of trees with given order and diameter, and\ndetermine in which cases the extremal tree is unique, thereby correcting an\nerror in the literature.\n']","[('index graphs', 0.5883747339248657), ('indices graphs', 0.566207230091095), ('index graph', 0.5447283983230591), ('index trees', 0.523859977722168), ('topological index', 0.49064576625823975), ('topological indices', 0.4878237545490265), ('wiener index', 0.46490350365638733), ('extremal graphs', 0.4599975645542145), ('index introduced', 0.43618759512901306), ('vertex degree', 0.42984816431999207)]" 123,123,212,123_networks coupled oscillators_phase synchronization_frequency synchronization_synchronization coupled,"['networks coupled oscillators', 'phase synchronization', 'frequency synchronization', 'synchronization coupled', 'coupled oscillators', 'oscillator networks', 'kuramoto models', 'coupled oscillator', 'global synchronization', 'phase oscillators']","['Model Reduction for the Kuramoto-Sakaguchi Model: The Importance of\n Non-entrained Rogue Oscillators The Kuramoto-Sakaguchi model for coupled phase oscillators with\nphase-frustration is often studied in the thermodynamic limit of infinitely\nmany oscillators. Here we extend a model reduction method based on collective\ncoordinates to capture the collective dynamics of finite size\nKuramoto-Sakaguchi models. We find that the inclusion of the effects of rogue\noscillators is essential to obtain an accurate description, in contrast to the\noriginal Kuramoto model where we show that their effects can be ignored. We\nfurther introduce a more accurate ansatz function to describe the shape of\nsynchronized oscillators. Our results from this extended collective coordinate\napproach reduce in the thermodynamic limit to the well-known mean-field\nconsistency relations. For finite networks we show that our model reduction\ndescribes the collective behavior accurately, reproducing the order parameter,\nthe mean frequency of the synchronized cluster, and the size of the cluster at\ngiven coupling strength, as well as the critical coupling strength for partial\nand for global synchronization.\n', 'On the Synchronization Analysis of a Strong Competition Kuramoto Model When modeling the classical Kuramoto model, one of the key features is the\ntendency to synchronize. Accordingly, the most well-adopted choice of the\ncoupling function is the sine function. Due to the oddness of the sine\nfunction, the synchronized frequency would be the average of all the natural\nfrequencies. In this article, we study the synchronization behaviors of the\nKuramoto model with a pure competition coupling function. Namely, instead of\nthe sine function, we choose $\\max \\{0, \\sin \\theta \\}$ to be the coupling\nfunction. This indicates the relation of pure competition between oscillators.\nWe prove asymptotical phase synchronization for identical oscillators and\nasymptotical frequency synchronization for non-identical oscillators under\nreasonable sufficient conditions. In particular, under our sufficient\nconditions, the synchronized frequency is the maximal frequency of all the\nnatural frequencies. On the other hand, in the parameter regime which is out of\nthe scope of the analysis of our theorems, it is possible that the synchronized\nfrequency could be larger than the maximal frequency of the natural frequencies\nof all the oscillators. In this article, we also provide numerical experiments\nto support the analysis of our theorem and to demonstrate the aforementioned\nphenomenon.\n', ""Stability and Synchronization of Kuramoto Oscillators Imagine a group of oscillators, each endowed with their own rhythm or\nfrequency, be it the ticking of a biological clock, the swing of a pendulum, or\nthe glowing of fireflies. While these individual oscillators may seem\nindependent of one another at first glance, the true magic lies in their\nability to influence and synchronize with one another, like a group of\nfireflies glowing in unison.\n The Kuramoto model was motivated by this phenomenon of collective\nsynchronization, when a group of a large number of oscillators spontaneously\nlock to a common frequency, despite vast differences in their individual\nfrequencies. Inspired by Kuramoto's groundbreaking work in the 1970s, this\nmodel captures the essence of how interconnected systems, ranging from\nbiological networks to power grids, can achieve a state of synchronization.\n This work aims to study the stability and synchronization of Kuramoto\noscillators, starting off with an introduction to Kuramoto Oscillators and it's\nbroader applications. We then at a graph theoretic formulation for the same and\nestablish various criterion for the stability, synchronization of Kuramoto\nOscillators. Finally, we broadly analyze and experiment with various physical\nsystems that tend to behave like Kuramoto oscillators followed by further\nsimulations.\n""]","[('networks coupled oscillators', 0.6169372797012329), ('phase synchronization', 0.6034865379333496), ('frequency synchronization', 0.5786298513412476), ('synchronization coupled', 0.5749124884605408), ('coupled oscillators', 0.5747511386871338), ('oscillator networks', 0.5597873330116272), ('kuramoto models', 0.5471497178077698), ('coupled oscillator', 0.5162031054496765), ('global synchronization', 0.5039744973182678), ('phase oscillators', 0.4970850646495819)]" 124,124,209,124_bounded treewidth_graph treewidth_treewidth graph_free graphs bounded,"['bounded treewidth', 'graph treewidth', 'treewidth graph', 'free graphs bounded', 'hereditary graph classes', 'minor free graphs', 'induced subgraphs', 'graphs bounded', 'forbidden induced subgraphs', 'bounded tree']","['Induced subgraphs and tree decompositions VI. Graphs with 2-cutsets This paper continues a series of papers investigating the following question:\nwhich hereditary graph classes have bounded treewidth? We call a graph\n$t$-clean if it does not contain as an induced subgraph the complete graph\n$K_t$, the complete bipartite graph $K_{t, t}$, subdivisions of a $(t \\times\nt)$-wall, and line graphs of subdivisions of a $(t \\times t)$-wall. It is known\nthat graphs with bounded treewidth must be $t$-clean for some $t$; however, it\nis not true that every $t$-clean graph has bounded treewidth. In this paper, we\nshow that three types of cutsets, namely clique cutsets, 2-cutsets, and\n1-joins, interact well with treewidth and with each other, so graphs that are\ndecomposable by these cutsets into basic classes of bounded treewidth have\nbounded treewidth. We apply this result to two hereditary graph classes, the\nclass of ($ISK_4$, wheel)-free graphs and the class of graphs with no cycle\nwith a unique chord. These classes were previously studied and decomposition\ntheorems were obtained for both classes. Our main results are that $t$-clean\n($ISK_4$, wheel)-free graphs have bounded treewidth and that $t$-clean graphs\nwith no cycle with a unique chord have bounded treewidth.\n', 'Induced subgraphs and tree decompositions V. One neighbor in a hole What are the unavoidable induced subgraphs of graphs with large treewidth? It\nis well-known that the answer must include a complete graph, a complete\nbipartite graph, all subdivisions of a wall and line graphs of all subdivisions\nof a wall (we refer to these graphs as the ""basic treewidth obstructions""). So\nit is natural to ask whether graphs excluding the basic treewidth obstructions\nas induced subgraphs have bounded treewidth. Sintiari and Trotignon answered\nthis question in the negative. Their counterexamples, the so-called ""layered\nwheels,"" contain wheels, where a wheel consists of a hole (i.e., an induced\ncycle of length at least four) along with a vertex with at least three\nneighbors in the hole. This leads one to ask whether graphs excluding wheels\nand the basic treewidth obstructions as induced subgraphs have bounded\ntreewidth. This also turns out to be false due to Davies\' recent example of\ngraphs with large treewidth, no wheels and and no basic treewidth obstructions\nas induced subgraphs. However, in Davies\' example there exist holes and\nvertices (outside of the hole) with two neighbors in them. Here we prove that a\nhole with a vertex with at least two neighbors in it is inevitable in graphs\nwith large treewidth and no basic obstruction. Our main result is that graphs\nin which every vertex has at most one neighbor in every hole (that does not\ncontain it) and with the basic treewidth obstructions excluded as induced\nsubgraphs have bounded treewidth.\n', 'Product structure of graph classes with bounded treewidth We show that many graphs with bounded treewidth can be described as subgraphs\nof the strong product of a graph with smaller treewidth and a bounded-size\ncomplete graph. To this end, define the ""underlying treewidth"" of a graph class\n$\\mathcal{G}$ to be the minimum non-negative integer $c$ such that, for some\nfunction $f$, for every graph ${G \\in \\mathcal{G}}$ there is a graph $H$ with\n${\\text{tw}(H) \\leq c}$ such that $G$ is isomorphic to a subgraph of ${H\n\\boxtimes K_{f(\\text{tw}(G))}}$. We introduce disjointed coverings of graphs\nand show they determine the underlying treewidth of any graph class. Using this\nresult, we prove that the class of planar graphs has underlying treewidth 3;\nthe class of $K_{s,t}$-minor-free graphs has underlying treewidth $s$ (for ${t\n\\geq \\max\\{s,3\\}}$); and the class of $K_t$-minor-free graphs has underlying\ntreewidth ${t-2}$. In general, we prove that a monotone class has bounded\nunderlying treewidth if and only if it excludes some fixed topological minor.\nWe also study the underlying treewidth of graph classes defined by an excluded\nsubgraph or excluded induced subgraph. We show that the class of graphs with no\n$H$ subgraph has bounded underlying treewidth if and only if every component of\n$H$ is a subdivided star, and that the class of graphs with no induced $H$\nsubgraph has bounded underlying treewidth if and only if every component of $H$\nis a star.\n']","[('bounded treewidth', 0.6229264140129089), ('graph treewidth', 0.6192233562469482), ('treewidth graph', 0.5963194966316223), ('free graphs bounded', 0.5815856456756592), ('hereditary graph classes', 0.5745610594749451), ('minor free graphs', 0.5729621648788452), ('induced subgraphs', 0.5656404495239258), ('graphs bounded', 0.5631838440895081), ('forbidden induced subgraphs', 0.5583187341690063), ('bounded tree', 0.5488495826721191)]" 125,125,208,125_stochastic navier stokes_stochastic navier_navier stokes equations_navier stokes,"['stochastic navier stokes', 'stochastic navier', 'navier stokes equations', 'navier stokes', '3d navier stokes', 'solutions stochastic', 'navier stokes system', '2d navier stokes', 'three dimensional stochastic', 'stochastic forcing']","['Three-Dimensional stochastic Navier-Stokes equations with Markov\n switching A finite-state Markov chain is introduced in the noise terms of the\nthree-dimensional stochastic Navier-Stokes equations in order to allow for\ntransitions between two types of multiplicative noises. We call such systems as\nstochastic Navier-Stokes equations with Markov switching. To solve such a\nsystem, a family of regularized stochastic systems is introduced. For each such\nregularized system, the existence of a unique strong solution (in the sense of\nstochastic analysis) is established by the method of martingale problems and\npathwise uniqueness. The regularization is removed in the limit by obtaining a\nweakly convergent sequence from the family of regularized solutions, and\nidentifying the limit as a solution of the three-dimensional stochastic\nNavier-Stokes equation with Markov switching.\n', ""Convergence of the stochastic Navier-Stokes-$\\alpha$ solutions toward\n the stochastic Navier-Stokes solutions Loosely speaking, the Navier-Stokes-$\\alpha$ model and the Navier-Stokes\nequations differ by a spatial filtration parametrized by a scale denoted\n$\\alpha$. Starting from a strong two-dimensional solution to the\nNavier-Stokes-$\\alpha$ model driven by a multiplicative noise, we demonstrate\nthat it generates a strong solution to the stochastic Navier-Stokes equations\nunder the condition $\\alpha$ goes to 0. The initially introduced probability\nspace and the Wiener process are maintained throughout the investigation,\nthanks to a local monotonicity property that abolishes the use of Skorokhod's\ntheorem. High spatial regularity a priori estimates for the fluid velocity\nvector field are carried out within periodic boundary conditions.\n"", 'Enhanced dissipation for stochastic Navier-Stokes equations with\n transport noise The phenomenon of dissipation enhancement by transport noise is shown for\nstochastic 2D Navier-Stokes equations in velocity form. In the 3D case,\nsuppression of blow-up is proved for stochastic Navier-Stokes equations in\nvorticity form; in particular, quantitative estimate allows us to choose the\nparameters of noise, uniformly in initial vorticity bounded in $L^2$-norm, so\nthat global solutions exist with a large probability sufficiently close to 1.\n']","[('stochastic navier stokes', 0.7832273244857788), ('stochastic navier', 0.6682472825050354), ('navier stokes equations', 0.6008821129798889), ('navier stokes', 0.561150074005127), ('3d navier stokes', 0.553706705570221), ('solutions stochastic', 0.5391770005226135), ('navier stokes system', 0.5376842617988586), ('2d navier stokes', 0.5352694392204285), ('three dimensional stochastic', 0.49258241057395935), ('stochastic forcing', 0.4820088744163513)]" 126,126,208,126_semigroups_semigroups finite_ordered semigroups_inverse semigroups,"['semigroups', 'semigroups finite', 'ordered semigroups', 'inverse semigroups', 'semigroup', 'semigroup mathcal', 'inverse semigroup', 'semigroup partial', 'inverse monoids', 'matrix semigroups']","['On the semigroup of injective monoid endomorphisms of the monoid\n $\\boldsymbol{B}_{\\omega}^{\\mathscr{F}^3}$ with a three element family\n $\\mathscr{F}^3$ of inductive nonempty subsets of $\\omega$ We describe injective monoid endomorphisms of the semigroup\n$\\boldsymbol{B}_{\\omega}^{\\mathscr{F}^3}$ with a three element family\n$\\mathscr{F}^3$ of inductive nonempty subsets of $\\omega$. Also, we show that\nthe monoid $\\boldsymbol{End}_*^1(\\boldsymbol{B}_{\\omega}^{\\mathscr{F}})$ of all\ninjective endomorphisms of the semigroup\n$\\boldsymbol{B}_{\\omega}^{\\mathscr{F}^3}$ is isomorphic to the multiplicative\nsemigroup of positive integers.\n', ""On the semigroup of monoid endomorphisms of the semigroup\n $\\boldsymbol{B}_{\\omega}^{\\mathscr{F}}$ with a two-element family\n $\\mathscr{F}$ of inductive nonempty subsets of $\\omega$ We study the semigroup of non-injective monoid endomorphisms of the semigroup\n$\\boldsymbol{B}_{\\omega}^{\\mathscr{F}}$ with a two-elements family\n$\\mathscr{F}$ of inductive nonempty subsets of $\\omega$. We describe the\nstructure of elements of the semigroup\n$\\boldsymbol{End}^*_0(\\boldsymbol{B}_{\\omega}^{\\mathscr{F}})$ of non-injective\nmonoid endomorphisms of the semigroup $\\boldsymbol{B}_{\\omega}^{\\mathscr{F}}$.\nIn particular we show that its subsemigroup\n$\\boldsymbol{End}^*(\\boldsymbol{B}_{\\omega}^{\\mathscr{F}})$ of non-injective\nnon-annihilating monoid endomorphisms of the semigroup\n$\\boldsymbol{B}_{\\omega}^{\\mathscr{F}}$ is isomorphic to the direct product of\nthe two-element left-zero semigroup and the multiplicative semigroup of\npositive integers and describe Green's relations on\n$\\boldsymbol{End}^*(\\boldsymbol{B}_{\\omega}^{\\mathscr{F}})$.\n"", ""On some generalization of the bicyclic monoid We introduce an algebraic extension $\\boldsymbol{B}_{\\omega}^{\\mathscr{F}}$\nof the bicyclic monoid for an arbitrary $\\omega$-closed family $\\mathscr{F}$\nsubsets of $\\omega$ which generalizes the bicyclic monoid, the countable\nsemigroup of matrix units and some other combinatorial inverse semigroups. It\nis proved that $\\boldsymbol{B}_{\\omega}^{\\mathscr{F}}$ is a combinatorial\ninverse semigroup and Green's relations, the natural partial order on\n$\\boldsymbol{B}_{\\omega}^{\\mathscr{F}}$, and its set of idempotents are\ndescribed. We provide criteria of simplicity, $0$-simplicity, bisimplicity,\n$0$-bisimplicity of the semigroup $\\boldsymbol{B}_{\\omega}^{\\mathscr{F}}$ and\nwhen $\\boldsymbol{B}_{\\omega}^{\\mathscr{F}}$ has the identity, is isomorphic to\nthe bicyclic semigroup or the countable semigroup of matrix units.\n""]","[('semigroups', 0.5910272598266602), ('semigroups finite', 0.5616601705551147), ('ordered semigroups', 0.5550350546836853), ('inverse semigroups', 0.5534030199050903), ('semigroup', 0.5461874604225159), ('semigroup mathcal', 0.534157395362854), ('inverse semigroup', 0.509874165058136), ('semigroup partial', 0.5094262361526489), ('inverse monoids', 0.4837305247783661), ('matrix semigroups', 0.4748711884021759)]" 127,127,208,127_finite words_words length_binary words_word length,"['finite words', 'words length', 'binary words', 'word length', 'words binary', 'infinite words', 'palindromes', 'infinite word', 'palindrome', 'combinatorics words']","['Extensions and reductions of square-free words A word is square-free if it does not contain a nonempty word of the form $XX$\nas a factor. A famous 1906 result of Thue asserts that there exist arbitrarily\nlong square-free words over a $3$-letter alphabet. We study square-free words\nwith additional properties involving single-letter deletions and extensions of\nwords.\n A square-free word is steady if it remains square-free after deletion of any\nsingle letter. We prove that there exist infinitely many steady words over a\n$4$-letter alphabet. We also demonstrate that one may construct steady words of\nany length by picking letters from arbitrary alphabets of size $7$ assigned to\nthe positions of the constructed word. We conjecture that both bounds can be\nlowered to $4$, which is best possible.\n In the opposite direction, we consider square-free words that remain\nsquare-free after insertion of a single (suitably chosen) letter at every\npossible position in the word. We call them bifurcate. We prove a somewhat\nsurprising fact, that over a fixed alphabet with at least three letters, every\nsteady word is bifurcate. We also consider families of bifurcate words\npossessing a natural tree structure. In particular, we prove that there exists\nan infinite tree of doubly infinite bifurcate words over alphabet of size $12$.\n', 'Some Remarks on Palindromic Periodicities We say a finite word $x$ is a palindromic periodicity if there exist two\npalindromes $p$ and $s$ such that $|x| \\geq |ps|$ and $x$ is a prefix of the\nword $(ps)^\\omega = pspsps\\cdots$. In this paper we examine the palindromic\nperiodicities occurring in some classical infinite words, such as Sturmian\nwords, episturmian words, the Thue-Morse word, the period-doubling word, the\nRudin-Shapiro word, the paperfolding word, and the Tribonacci word, and prove a\nnumber of results about them. We also prove results about words with the\nsmallest number of palindromic periodicities.\n', 'On prefix palindromic length of automatic words The prefix palindromic length $\\mathrm{PPL}_{\\mathbf{u}}(n)$ of an infinite\nword $\\mathbf{u}$ is the minimal number of concatenated palindromes needed to\nexpress the prefix of length $n$ of $\\mathbf{u}$. Since 2013, it is still\nunknown if $\\mathrm{PPL}_{\\mathbf{u}}(n)$ is unbounded for every aperiodic\ninfinite word $\\mathbf{u}$, even though this has been proven for almost all\naperiodic words. At the same time, the only well-known nontrivial infinite word\nfor which the function $\\mathrm{PPL}_{\\mathbf{u}}(n)$ has been precisely\ncomputed is the Thue-Morse word $\\mathbf{t}$. This word is $2$-automatic and,\npredictably, its function $\\mathrm{PPL}_{\\mathbf{t}}(n)$ is $2$-regular, but is\nthis the case for all automatic words?\n In this paper, we prove that this function is $k$-regular for every\n$k$-automatic word containing only a finite number of palindromes. For two such\nwords, namely the paperfolding word and the Rudin-Shapiro word, we derive a\nformula for this function. Our computational experiments suggest that generally\nthis is not true: for the period-doubling word, the prefix palindromic length\ndoes not look $2$-regular, and for the Fibonacci word, it does not look\nFibonacci-regular. If proven, these results would give rare (if not first)\nexamples of a natural function of an automatic word which is not regular.\n']","[('finite words', 0.6182998418807983), ('words length', 0.5667690634727478), ('binary words', 0.5614867210388184), ('word length', 0.5305070281028748), ('words binary', 0.5266027450561523), ('infinite words', 0.5223904848098755), ('palindromes', 0.5020810961723328), ('infinite word', 0.4776669442653656), ('palindrome', 0.4766272306442261), ('combinatorics words', 0.47649142146110535)]" 128,128,207,128_efficient federated learning_learning federated learning_federated learning algorithms_optimization federated learning,"['efficient federated learning', 'learning federated learning', 'federated learning algorithms', 'optimization federated learning', 'federated learning via', 'federated learning', 'personalized federated learning', 'learning federated', 'federated learning framework', 'federated learning federated']","['Exploiting Shared Representations for Personalized Federated Learning Deep neural networks have shown the ability to extract universal feature\nrepresentations from data such as images and text that have been useful for a\nvariety of learning tasks. However, the fruits of representation learning have\nyet to be fully-realized in federated settings. Although data in federated\nsettings is often non-i.i.d. across clients, the success of centralized deep\nlearning suggests that data often shares a global feature representation, while\nthe statistical heterogeneity across clients or tasks is concentrated in the\nlabels. Based on this intuition, we propose a novel federated learning\nframework and algorithm for learning a shared data representation across\nclients and unique local heads for each client. Our algorithm harnesses the\ndistributed computational power across clients to perform many local-updates\nwith respect to the low-dimensional local parameters for every update of the\nrepresentation. We prove that this method obtains linear convergence to the\nground-truth representation with near-optimal sample complexity in a linear\nsetting, demonstrating that it can efficiently reduce the problem dimension for\neach client. This result is of interest beyond federated learning to a broad\nclass of problems in which we aim to learn a shared low-dimensional\nrepresentation among data distributions, for example in meta-learning and\nmulti-task learning. Further, extensive experimental results show the empirical\nimprovement of our method over alternative personalized federated learning\napproaches in federated environments with heterogeneous data.\n', ""Efficient Distribution Similarity Identification in Clustered Federated\n Learning via Principal Angles Between Client Data Subspaces Clustered federated learning (FL) has been shown to produce promising results\nby grouping clients into clusters. This is especially effective in scenarios\nwhere separate groups of clients have significant differences in the\ndistributions of their local data. Existing clustered FL algorithms are\nessentially trying to group together clients with similar distributions so that\nclients in the same cluster can leverage each other's data to better perform\nfederated learning. However, prior clustered FL algorithms attempt to learn\nthese distribution similarities indirectly during training, which can be quite\ntime consuming as many rounds of federated learning may be required until the\nformation of clusters is stabilized. In this paper, we propose a new approach\nto federated learning that directly aims to efficiently identify distribution\nsimilarities among clients by analyzing the principal angles between the client\ndata subspaces. Each client applies a truncated singular value decomposition\n(SVD) step on its local data in a single-shot manner to derive a small set of\nprincipal vectors, which provides a signature that succinctly captures the main\ncharacteristics of the underlying distribution. This small set of principal\nvectors is provided to the server so that the server can directly identify\ndistribution similarities among the clients to form clusters. This is achieved\nby comparing the similarities of the principal angles between the client data\nsubspaces spanned by those principal vectors. The approach provides a simple,\nyet effective clustered FL framework that addresses a broad range of data\nheterogeneity issues beyond simpler forms of Non-IIDness like label skews. Our\nclustered FL approach also enables convergence guarantees for non-convex\nobjectives. Our code is available at https://github.com/MMorafah/PACFL.\n"", ""Federated Asymptotics: a model to compare federated learning algorithms We propose an asymptotic framework to analyze the performance of\n(personalized) federated learning algorithms. In this new framework, we\nformulate federated learning as a multi-criterion objective, where the goal is\nto minimize each client's loss using information from all of the clients. We\nanalyze a linear regression model where, for a given client, we may\ntheoretically compare the performance of various algorithms in the\nhigh-dimensional asymptotic limit. This asymptotic multi-criterion approach\nnaturally models the high-dimensional, many-device nature of federated\nlearning. These tools make fairly precise predictions about the benefits of\npersonalization and information sharing in federated scenarios -- at least in\nour (stylized) model -- including that Federated Averaging with simple client\nfine-tuning achieves the same asymptotic risk as the more intricate\nmeta-learning and proximal-regularized approaches and outperforming Federated\nAveraging without personalization. We evaluate these predictions on federated\nversions of the EMNIST, CIFAR-100, Shakespeare, and Stack Overflow datasets,\nwhere the experiments corroborate the theoretical predictions, suggesting such\nframeworks may provide a useful guide to practical algorithmic development.\n""]","[('efficient federated learning', 0.8329651355743408), ('learning federated learning', 0.8149574995040894), ('federated learning algorithms', 0.8148489594459534), ('optimization federated learning', 0.8112525343894958), ('federated learning via', 0.78867506980896), ('federated learning', 0.7740342617034912), ('personalized federated learning', 0.7563639879226685), ('learning federated', 0.7470946311950684), ('federated learning framework', 0.746263861656189), ('federated learning federated', 0.7355530261993408)]" 129,129,202,129_finitely generated groups_finitely presented groups_free groups_products free groups,"['finitely generated groups', 'finitely presented groups', 'free groups', 'products free groups', 'groups free', 'generated groups', 'groups finitely', 'finitely generated group', 'solvable groups', 'finitely presented group']","['Groups with ET0L co-word problem We study groups whose co-word problems are ET0L languages, which we call\ncoET0L groups, using an automaton based model due to van Leeuwen, and recently\nstudied by Bishop and Elder. In particular we prove a number of closure results\nfor the class of groups with co-word problems in a subclass of `special\' ET0L\nlanguages; that class of groups contains all groups that we know at the time of\nwriting to be co-ET0L, including all groups that were proved by Holt and\nR\\""over to be stack groups, and hence co-indexed. It includes virtually free\ngroups, bounded automata groups, and the Higman-Thompson groups, together with\ngroups constructed from those using finitely generated subgroups, finite\nextension, free and direct products, and by taking the restricted standard\nwreath product of a co-\\E group by a finitely generated virtually free top\ngroup.\n', ""Streaming word problems We study deterministic and randomized streaming algorithms for word problems\nof finitely generated groups. For finitely generated linear groups, metabelian\ngroups and free solvable groups we show the existence of randomized streaming\nalgorithms with logarithmic space complexity for their word problems. We also\nshow that the class of finitely generated groups with a logspace randomized\nstreaming algorithm for the word problem is closed under several group\ntheoretical constructions: finite extensions, graph products and wreath\nproducts by free abelian groups. We contrast these results with several lower\nbound. An example of a finitely presented group, where the word problem has\nonly a linear space randomized streaming algorithm, is Thompson's group $F$.\nFinally, randomized streaming algorithms for subgroup membership problems in\nfree groups and direct products of free groups are studied.\n"", 'Dehn functions of subgroups of products of free groups. Part I: Uniform\n upper bounds Subgroups of direct products of finitely many finitely generated free groups\nform a natural class that plays an important role in geometric group theory.\nIts members include fundamental examples, such as the Stallings-Bieri groups.\nThis raises the problem of understanding their geometric invariants. We prove\nthat finitely presented subgroups of direct products of three free groups, as\nwell as subgroups of finiteness type $\\mathcal{F}_{n-1}$ in a direct product of\n$n$ free groups, have Dehn function bounded above by $N^9$. This gives a\npositive answer to a question of Dison within these important subclasses and\nprovides new insights in the context of Bridson\'s conjecture stating that\nfinitely presented subgroups of direct products of free groups have\npolynomially bounded Dehn function. To prove our results we generalise\ntechniques for ""pushing fillings"" into normal subgroups.\n']","[('finitely generated groups', 0.6426085829734802), ('finitely presented groups', 0.6334677934646606), ('free groups', 0.6194603443145752), ('products free groups', 0.6130813360214233), ('groups free', 0.6104738712310791), ('generated groups', 0.6072888374328613), ('groups finitely', 0.5955377221107483), ('finitely generated group', 0.5910731554031372), ('solvable groups', 0.5883920192718506), ('finitely presented group', 0.577272891998291)]" 130,130,201,130_fully nonlinear elliptic_regularity solutions_regularity fully nonlinear_nonlinear elliptic equations,"['fully nonlinear elliptic', 'regularity solutions', 'regularity fully nonlinear', 'nonlinear elliptic equations', 'degenerate elliptic equations', 'boundary regularity', 'nonlinear elliptic', 'regularity estimates', 'degenerate elliptic', 'elliptic problems']","['Sharp boundary and global regularity for degenerate fully nonlinear\n elliptic equations We obtain optimal boundary and global regularity estimates for viscosity\nsolutions of fully nonlinear elliptic equations whose ellipticity degenerates\nat the critical points of a given solution. We show that any solution is\n$C^{1,\\alpha}$ on the boundary of the domain, for an optimal and explicit\n$\\alpha$ given only in terms of the regularity of the boundary datum and the\nelliptic degeneracy degree, no matter how possibly low is the interior\nregularity for that class of equations. We also obtain sharp global estimates.\nOur findings are new even for model equations, involving only a degenerate\nLaplacian; all previous results of global nature give $C^{1,\\alpha}$ regularity\nonly for some small $\\alpha>0$.\n', 'C^{1,\\alpha}-regularity for a class of degenerate/singular fully\n nonlinear elliptic equations We establish an optimal C^{1,\\alpha}-regularity for viscosity solutions of\ndegenerate/singular fully nonlinear elliptic equations by finding minimal\nregularity requirements on the associated operator.\n', 'Regularity for solutions of fully nonlinear elliptic equations with\n non-homogeneous degeneracy We prove that viscosity solutions to fully nonlinear elliptic equations with\ndegeneracy of double phase type are locally $C^{1,\\gamma}$-regular.\n']","[('fully nonlinear elliptic', 0.6434824466705322), ('regularity solutions', 0.6411079168319702), ('regularity fully nonlinear', 0.6170555949211121), ('nonlinear elliptic equations', 0.6083025336265564), ('degenerate elliptic equations', 0.6061803102493286), ('boundary regularity', 0.6044937372207642), ('nonlinear elliptic', 0.5754162073135376), ('regularity estimates', 0.5587533712387085), ('degenerate elliptic', 0.5572906136512756), ('elliptic problems', 0.555152952671051)]" 131,131,200,131_fault tolerant quantum_codes quantum_quantum error correcting_quantum error correction,"['fault tolerant quantum', 'codes quantum', 'quantum error correcting', 'quantum error correction', 'quantum code', 'quantum codes', 'quantum computation', 'quantum computing', 'quantum error', 'tolerant quantum']","['Short Shor-style syndrome sequences We optimize fault-tolerant quantum error correction to reduce the number of\nsyndrome bit measurements. Speeding up error correction will also speed up an\nencoded quantum computation, and should reduce its effective error rate. We\ngive both code-specific and general methods, using a variety of techniques and\nin a variety of settings. We design new quantum error-correcting codes\nspecifically for efficient error correction, e.g., allowing single-shot error\ncorrection. For codes with multiple logical qubits, we give methods for\ncombining error correction with partial logical measurements. There are\ntradeoffs in choosing a code and error-correction technique. While to date most\nwork has concentrated on optimizing the syndrome-extraction procedure, we show\nthat there are also substantial benefits to optimizing how the measured\nsyndromes are chosen and used. As an example, we design single-shot measurement\nsequences for fault-tolerant quantum error correction with the 16-qubit\nextended Hamming code. Our scheme uses 10 syndrome bit measurements, compared\nto 40 measurements with the Shor scheme. We design single-shot logical\nmeasurements as well: any logical Z measurement can be made together with\nfault-tolerant error correction using only 11 measurements. For comparison,\nusing the Shor scheme a basic implementation of such a non-destructive logical\nmeasurement uses 63 measurements. We also offer ten open problems, the\nsolutions of which could lead to substantial improvements of fault-tolerant\nerror correction.\n', 'Quantum Error Correction near the Coding Theoretical Bound Recent advancements in quantum computing have led to the realization of\nsystems comprising tens of reliable logical qubits, constructed from thousands\nof noisy physical qubits. However, many of the critical applications that\nquantum computers aim to solve require quantum computations involving millions\nor more logical qubits. This necessitates highly efficient quantum error\ncorrection capable of handling large numbers of logical qubits. Classical error\ncorrection theory is well-developed, with low-density parity-check (LDPC) codes\nachieving performance limits by encoding large classical bits. Despite more\nthan two decades of effort, no efficiently decodable quantum error-correcting\ncode that approaches the hashing bound, which is a fundamental lower bound on\nquantum capacity, had been discovered. Here, we present quantum\nerror-correcting codes constructed from classical LDPC codes that approach the\nhashing bound while maintaining linear computational complexity in the number\nof physical qubits. This result establishes a pathway toward realizing\nlarge-scale, fault-tolerant quantum computers. By integrating our quantum error\ncorrection scheme with devices capable of managing vast numbers of qubits, the\nprospect of solving critical real-world problems through quantum computation is\nbrought significantly closer.\n', 'Beyond single-shot fault-tolerant quantum error correction Extensive quantum error correction is necessary in order to perform a useful\ncomputation on a noisy quantum computer. Moreover, quantum error correction\nmust be implemented based on imperfect parity check measurements that may\nreturn incorrect outcomes or inject additional faults into the qubits. To\nachieve fault-tolerant error correction, Shor proposed to repeat the sequence\nof parity check measurements until the same outcome is observed sufficiently\nmany times. Then, one can use this information to perform error correction. A\nbasic implementation of this fault tolerance strategy requires $\\Omega(r d^2)$\nparity check measurements for a distance-d code defined by r parity checks. For\nsome specific highly structured quantum codes, Bombin has shown that\nsingle-shot fault-tolerant quantum error correction is possible using only r\nmeasurements. In this work, we demonstrate that fault-tolerant quantum error\ncorrection can be achieved using $O(d \\log(d))$ measurements for any code with\ndistance $d \\geq \\Omega(n^\\alpha)$ for some constant $\\alpha > 0$. Moreover, we\nprove the existence of a sub-single-shot fault-tolerant quantum error\ncorrection scheme using fewer than r measurements. In some cases, the number of\nparity check measurements required for fault-tolerant quantum error correction\nis exponentially smaller than the number of parity checks defining the code.\n']","[('fault tolerant quantum', 0.6858571171760559), ('codes quantum', 0.6765713095664978), ('quantum error correcting', 0.6735944747924805), ('quantum error correction', 0.668530285358429), ('quantum code', 0.6678707599639893), ('quantum codes', 0.6531369090080261), ('quantum computation', 0.5817036032676697), ('quantum computing', 0.5807619094848633), ('quantum error', 0.5743989944458008), ('tolerant quantum', 0.5722541213035583)]" 132,132,200,132_teaching mathematics_mathematics education_undergraduate mathematics_mathematics,"['teaching mathematics', 'mathematics education', 'undergraduate mathematics', 'mathematics', 'mathematics science', 'teaching learning', 'mathematicians', 'teaching', 'mathematical', 'mathematical sciences']","[""Evaluating the Effect of Activity Based Method of Teaching Mathematics\n on Nigerian Secondary School Students Achievement in Mathematics Mathematics is a compulsory subject in Nigerian secondary schools, and the\nsubject plays an important role in the scientific and technological growth and\ndevelopment of the nation. A shortfall in the knowledge of the students in\nMathematics means that the goal may not be realized, hence the need to improve\nteaching methods for solving the problem of poor performance in the subject.\nThis study evaluated the effect of the activity-based teaching method on the\nstudents' achievement in secondary school Mathematics. The design of the study\nwas a quasi-experimental pretest-posttest research design using intact classes.\nFinding revealed that there was a significant difference in the Mathematics\nperformance between the posttest mean scores of the students who were exposed\nto activity-based teaching methods (experimental) and those that were taught\nwith lecture method (control) groups after controlling for the effect of the\npre-test on Mathematics scores. The paper recommends among others that\nsecondary school Mathematics teachers should be trained and retrained to update\ntheir knowledge in the use of activity-based teaching for making the teaching\nand learning of Mathematics more interesting and rewarding.\n"", ""Challenges in teaching Real Analysis classes at the University of PGRI,\n South Sumatra, Indonesia This paper discusses our experiences and challenges in teaching advanced\nundergraduate Real Analysis classes for Mathematics Education students at the\nUniversity of PGRI (Persatuan Guru Republik Indonesia, Indonesian Teachers\nAssociation) Palembang, South Sumatra, Indonesia. We observe that the syllabus\ncontains topics with a high level of difficulty for the students who are\nspecialized in education and intend to teach mathematics at the secondary\nlevel. The conventional lecturing method is mainly implemented during the\nclass, with some possible variations of the method, including the Texas method\n(also known as Moore's method) and the small group guided discovery method. In\nparticular, the latter method has been implemented successfully for a Real\nAnalysis class at Dartmouth College, New Hampshire by Dumitra\\c{s}cu in 2006.\nAlthough it is a real challenge to apply a specific teaching method that will\nbe able to accommodate a large number of students, the existing teaching\nactivities can still be improved and a more effective method could be\nimplemented in the future. Furthermore, the curriculum contents should be\nadapted for an audience in Mathematics Education to equip them for their future\ncareer as mathematics teachers. Any constructive suggestions are welcome for\nthe improvement of our mathematics education system at the university as well\nas on the national scale.\n"", 'Applications of Teaching Secondary Mathematics in Undergraduate\n Mathematics Courses Robust preparation of future secondary mathematics teachers requires\nattention to the acquisition of mathematical knowledge for teaching. Many\nfuture teachers learn mathematics content primarily through mathematics major\ncourses that are taught by mathematicians who do not specialize in teacher\npreparation. How can mathematics education researchers assist mathematicians in\nmaking explicit connections between the content of undergraduate mathematics\ncourses and the content of secondary mathematics? We present an articulation of\nfive types of connections that can be used in secondary mathematics teacher\npreparation and give examples of question prompts that mathematicians can use\nas applications of teaching secondary mathematics in undergraduate mathematics\ncourses.\n']","[('teaching mathematics', 0.786462128162384), ('mathematics education', 0.7539025545120239), ('undergraduate mathematics', 0.6323861479759216), ('mathematics', 0.5946608781814575), ('mathematics science', 0.5770773887634277), ('teaching learning', 0.5614216327667236), ('mathematicians', 0.5309132933616638), ('teaching', 0.5085413455963135), ('mathematical', 0.5012674927711487), ('mathematical sciences', 0.4960803687572479)]" 133,133,198,133_finsler manifolds_finsler metrics_finsler manifold_finsler metric,"['finsler manifolds', 'finsler metrics', 'finsler manifold', 'finsler metric', 'finsler geometry', 'finsler structure', 'finslerian', 'lorentz finsler', 'reversible finsler', 'finsler']","[""Finsler Geometry, Spacetime & Gravity -- From Metrizability of Berwald\n Spaces to Exact Vacuum Solutions in Finsler Gravity This PhD dissertation covers a range of topics in Finsler geometry and\nFinsler gravity, most notably: (i) the characterization of Berwald spaces, (ii)\npseudo-Riemann (non-)metrizability of Berwald spaces, (iii)\n$(\\alpha,\\beta)$-metrics, (iv) exact solutions to Pfeifer and Wohlfarth's\nvacuum field equation in Finsler gravity, and (v) Finsler gravitational waves\nand their observational signature. An extended abstract can be found in the\ndissertation itself.\n"", 'Special Finsler spaces admitting a semi-concurrent vector field The main objective of this paper is to study semi-concurrent vector fields on\na Finsler manifold. We show that the quasi-$C$-reducible Finsler space,\n$C3$-like Finsler space, $C^{h}$-recurrent Finsler space, and $P2$-like Finsler\nspace are equivalent to Riemannian if they admit a semi-concurrent vector\nfield. Further, we prove the necessary and sufficient condition for a Finsler\nspace satisfying $C$-conformal condition to become Riemannian.\n', 'On almost rational Finsler metrics We study a special class of Finsler metrics which we refer to as Almost\nRational Finsler metrics (shortly, AR-Finsler metrics). We give necessary and\nsufficient conditions for an AR-Finsler manifold $(M,F)$ to be Riemannian. The\nrationality of the associated geometric objects such as Cartan torsion,\ngeodesic spray, Landsberg curvature, $S$-curvature, etc is investigated. We\nprove for a particular subset of AR-Finsler metrics that if $F$ has isotropic\n$S$-curvature, then its $S$-curvature identically vanishes. Further, if $F$ has\nisotropic mean Landsberg curvature, then it is weakly Landsberg. Also, if $F$\nis an Einstein metric, then it is Ricci-flat. Moreover, we show that Randers\nmetric can not be AR-Finsler metric. Finally, we provide some examples of\nAR-Finsler metrics and introduce a new Finsler metric which is called an\nextended $m$-th root metric. We show under what conditions an extended $m$-th\nroot metric is AR-Finsler metric and study its generalized Kropina change.\n']","[('finsler manifolds', 0.7738720178604126), ('finsler metrics', 0.7692248225212097), ('finsler manifold', 0.7523678541183472), ('finsler metric', 0.7421084642410278), ('finsler geometry', 0.7180613279342651), ('finsler structure', 0.6840816736221313), ('finslerian', 0.6136991381645203), ('lorentz finsler', 0.6048964262008667), ('reversible finsler', 0.5446584224700928), ('finsler', 0.5188799500465393)]" 134,134,197,134_isolated singularities_non isolated singularities_hypersurface singularities_isolated singularity,"['isolated singularities', 'non isolated singularities', 'hypersurface singularities', 'isolated singularity', 'intersection singularities', 'complete intersection singularities', 'hypersurface singularity', 'normal surface singularities', 'surface singularities', 'singularities']","['Morse numbers of function germs with isolated singularities A set of Morse numbers is associated to a holomorphic function germ with\nstratified isolated singularity, extending the classical Milnor number to the\nsetting of a singular base space.\n', 'Milnor-Hamm sphere fibrations and the equivalence problem We introduce the sphere fibration for real map germs with radial discriminant\nand we address the problem of its equivalence with the Milnor-Hamm tube\nfibration. Under natural conditions, we prove the existence of open book\nstructures with singularities and solve the equivalence problem.\n', 'Uniform stable radius and Milnor number for non-degenerate isolated\n complete intersection singularities We prove that for two germs of analytic mappings $f,g\\colon (\\mathbb{C}^n,0)\n\\rightarrow (\\mathbb{C}^p,0)$ with the same Newton polyhedra which are\n(Khovanskii) non-degenerate and their zero sets are complete intersections with\nisolated singularity at the origin, there is a piecewise analytic family\n$\\{f_t\\}$ of analytic maps with $f_0=f, f_1=g$ which has a so-called {\\it\nuniform stable radius for the Milnor fibration}. As a corollary, we show that\ntheir Milnor numbers are equal. Also, a formula for the Milnor number is given\nin terms of the Newton polyhedra of the component functions. This is a\ngeneralization of the result by C. Bivia-Ausina. Consequently, we obtain that\nthe Milnor number of a non-degenerate isolated complete intersection\nsingularity is an invariance of Newton boundaries.\n']","[('isolated singularities', 0.6224828958511353), ('non isolated singularities', 0.6172122955322266), ('hypersurface singularities', 0.5828645825386047), ('isolated singularity', 0.5769202709197998), ('intersection singularities', 0.5704389810562134), ('complete intersection singularities', 0.5702103972434998), ('hypersurface singularity', 0.5586485862731934), ('normal surface singularities', 0.5556958317756653), ('surface singularities', 0.540940523147583), ('singularities', 0.524422287940979)]" 135,135,194,135_numerical methods stochastic_stochastic differential equations_euler maruyama scheme_drift diffusion coefficients,"['numerical methods stochastic', 'stochastic differential equations', 'euler maruyama scheme', 'drift diffusion coefficients', 'approximation stochastic', 'nonlinear stochastic differential', 'stochastic differential', 'differential equations sdes', 'drift diffusion', 'discontinuous drift']","['Tamed Euler-Maruyama method for SDEs with non-globally Lipschitz drift\n and multiplicative noise Consider the following stochastic differential equation driven by\nmultiplicative noise on $\\mathbb{R}^d$ with a superlinearly growing drift\ncoefficient, \\begin{align*}\n \\mathrm{d} X_t = b (X_t) \\, \\mathrm{d} t + \\sigma (X_t) \\, \\mathrm{d} B_t.\n\\end{align*} It is known that the corresponding explicit Euler schemes may not\nconverge. In this article, we analyze an explicit and easily implementable\nnumerical method for approximating such a stochastic differential equation,\ni.e. its tamed Euler-Maruyama approximation. Under partial dissipation\nconditions ensuring the ergodicity, we obtain the uniform-in-time convergence\nrates of the tamed Euler-Maruyama process under $L^{1}$-Wasserstein distance\nand total variation distance.\n', ""On the performance of the Euler-Maruyama scheme for multidimensional\n SDEs with discontinuous drift coefficient We study strong approximation of $d$-dimensional stochastic differential\nequations (SDEs) with a discontinuous drift coefficient. More precisely, we\nessentially assume that the drift coefficient is piecewise Lipschitz continuous\nwith an exceptional set $\\Theta\\subset \\mathbb{R}^d$ that is an orientable\n$C^4$-hypersurface of positive reach, the diffusion coefficient is assumed to\nbe Lipschitz continuous and, in a neighborhood of $\\Theta$, both coefficients\nare bounded and the diffusion coefficient has a non-degenerate portion\northogonal to $\\Theta$.\n In recent years, a number of results have been proven in the literature for\nstrong approximation of such SDEs and, in particular, the performance of the\nEuler-Maruyama scheme was studied. For $d=1$ and finite $\\Theta$ it was shown\nthat the Euler-Maruyama scheme achieves an $L_p$-error rate of at least $1/2$\nfor all $p\\geq 1$ as in the classical case of Lipschitz continuous\ncoefficients. For $d>1$, it was only known so far, that the Euler-Maruyama\nscheme achieves an $L_2$-error rate of at least $1/4-$ if, additionally, the\ncoefficients $\\mu$ and $\\sigma$ are globally bounded.\n In this article, we prove that in the above setting the Euler-Maruyama scheme\nin fact achieves an $L_{p}$-error rate of at least $1/2-$ for all\n$d\\in\\mathbb{N}$ and all $p\\geq 1$. The proof of this result is based on the\nwell-known approach of transforming such an SDE into an SDE with globally\nLipschitz continuous coefficients, a new It\\^{o} formula for a class of\nfunctions which are not globally $C^2$ and a detailed analysis of the expected\ntotal time that the actual position of the time-continuous Euler-Maruyama\nscheme and its position at the preceding time point on the underlying grid are\non 'different sides' of the hypersurface $\\Theta$.\n"", 'The Euler-Maruyama Scheme for SDEs with Irregular Drift: Convergence\n Rates via Reduction to a Quadrature Problem We study the strong convergence order of the Euler-Maruyama scheme for scalar\nstochastic differential equations with additive noise and irregular drift. We\nprovide a general framework for the error analysis by reducing it to a weighted\nquadrature problem for irregular functions of Brownian motion. Assuming\nSobolev-Slobodeckij-type regularity of order $\\kappa \\in (0,1)$ for the\nnon-smooth part of the drift, our analysis of the quadrature problem yields the\nconvergence order $\\min\\{3/4,(1+\\kappa)/2\\}-\\epsilon$ for the equidistant\nEuler-Maruyama scheme (for arbitrarily small $\\epsilon>0$). The cut-off of the\nconvergence order at $3/4$ can be overcome by using a suitable non-equidistant\ndiscretization, which yields the strong convergence order of\n$(1+\\kappa)/2-\\epsilon$ for the corresponding Euler-Maruyama scheme.\n']","[('numerical methods stochastic', 0.6422250866889954), ('stochastic differential equations', 0.6101545691490173), ('euler maruyama scheme', 0.5575408339500427), ('drift diffusion coefficients', 0.5565283298492432), ('approximation stochastic', 0.5551060438156128), ('nonlinear stochastic differential', 0.5526400208473206), ('stochastic differential', 0.5493524074554443), ('differential equations sdes', 0.5492722988128662), ('drift diffusion', 0.5234386324882507), ('discontinuous drift', 0.48455876111984253)]" 136,136,194,136_iwasawa theory_iwasawa invariants_hilbert modular forms_modular forms,"['iwasawa theory', 'iwasawa invariants', 'hilbert modular forms', 'modular forms', 'conjecture adic', 'conjecture modular', 'bloch kato conjecture', 'modular form', 'rankin selberg', 'hilbert modular']","['Asai-Flach classes, p-adic L-functions and the Bloch-Kato conjecture for\n GO(4) We prove the Bloch-Kato conjecture for critical values of Asai L-functions of\np-ordinary Hilbert modular forms over quadratic fields (with p split); and one\ninclusion in the Iwasawa main conjecture for these L-functions (up to a power\nof p). Along the way, we also prove a version of the p-adic Eichler-Shimura\ncomparison isomorphism for Hida families of Hilbert modular forms.\n', 'Iwasawa theory of twists of elliptic modular forms over imaginary\n quadratic fields at inert primes Our primary goal in this article is to study the Iwasawa theory for\nsemi-ordinary families of automorphic forms on\n$\\mathrm{GL}_2\\times\\mathrm{Res}_{K/\\mathbb{Q}}\\mathrm{GL}_1$, where $K$ is an\nimaginary quadratic field where the prime $p$ is inert. We prove divisibility\nresults towards Iwasawa main conjectures in this context, utilizing the\noptimized signed factorization procedure for Perrin-Riou functionals and\nBeilinson--Flach elements for a family of Rankin--Selberg products of\n$p$-ordinary forms with a fixed $p$-non-ordinary modular form. The optimality\nenables an effective control on the $\\mu$-invariants of Selmer groups and\n$p$-adic $L$-functions as the modular forms vary in families, which is crucial\nfor our patching argument to establish one divisibility in an Iwasawa main\nconjecture in three variables.\n', 'Iwasawa Main Conjecture for Rankin-Selberg $p$-adic $L$-functions:\n Non-Ordinary Case In this paper we prove that the $p$-adic $L$-function that interpolates the\nRankin-Selberg product of a general weight two modular form which is unramified\nand non-ordinary at $p$, and an ordinary CM form of higher weight contains the\ncharacteristic ideal of the corresponding Selmer group. This is one\ndivisibility of the Iwasawa-Greenberg main conjecture for the $p$-adic\n$L$-function. This generalizes an earlier work of the author to the\nnon-ordinary case. The result of this paper plays a crucial role in the proof\nof Iwasawa main conjecture and refined Birch-Swinnerton-Dyer formula for\nsupersingular elliptic curves.\n']","[('iwasawa theory', 0.5831080079078674), ('iwasawa invariants', 0.5651700496673584), ('hilbert modular forms', 0.564480721950531), ('modular forms', 0.5546868443489075), ('conjecture adic', 0.5244753360748291), ('conjecture modular', 0.5106748938560486), ('bloch kato conjecture', 0.4927351474761963), ('modular form', 0.48735758662223816), ('rankin selberg', 0.4683551788330078), ('hilbert modular', 0.4583769142627716)]" 137,137,193,137_graphs finite groups_graph finite group_graphs groups_graph group,"['graphs finite groups', 'graph finite group', 'graphs groups', 'graph group', 'power graphs', 'group graph', 'power graph', 'graphs finite', 'finite nilpotent groups', 'nilpotent groups']","['On connectivity, domination number and spectral radius of the proper\n enhanced power graphs of finite nilpotent groups For a group $G,$ the enhanced power graph of $G$ is a graph with vertex set\n$G$ in which two distinct elements $x, y$ are adjacent if and only if there\nexists an element $w$ in $G$ such that both $x$ and $y$ are powers of $w.$ The\nproper enhanced power graph is the induced subgraph of the enhanced power graph\non the set $G \\setminus S,$ where $S$ is the set of dominating vertices of the\nenhanced power graph. In this paper, we first characterize the dominating\nvertices of enhanced power graph of any finite nilpotent group. Thereafter, we\nclassify all nilpotent groups $G$ such that the proper enhanced power graphs\nare connected and find out their diameter. We also explicitly find out the\ndomination number of proper enhanced power graphs of finite nilpotent groups.\nFinally, we determine the multiplicity of the Laplacian spectral radius of the\nenhanced power graphs of nilpotent groups.\n', 'Nilpotent groups whose Difference graphs have positive genus The power graph of a finite group $G$ is a simple undirected graph with\nvertex set $G$ and two vertices are adjacent if one is a power of the other.\nThe enhanced power graph of a finite group $G$ is a simple undirected graph\nwhose vertex set is the group $G$ and two vertices $a$ and $b$ are adjacent if\nthere exists $c \\in G$ such that both $a$ and $b$ are powers of $c$. In this\npaper, we study the difference graph $\\mathcal{D}(G)$ of a finite group $G$\nwhich is the difference of the enhanced power graph and the power graph of $G$\nwith all isolated vertices removed. We characterize all the finite nilpotent\ngroups $G$ such that the genus (or cross-cap) of the difference graph\n$\\mathcal{D}(G)$ is at most $2$.\n', 'An exact enumeration of vertex connectivity of the enhanced power graphs\n of finite nilpotent groups The enhanced power graph of a group $G$ is a graph with vertex set $G,$ where\ntwo distinct vertices $x$ and $y$ are adjacent if and only if there exists an\nelement $w$ in $G$ such that both $x$ and $y$ are powers of $w.$ In this paper,\nwe determine the vertex connectivity of the enhanced power graph of any finite\nnilpotent group.\n']","[('graphs finite groups', 0.715557336807251), ('graph finite group', 0.6863375306129456), ('graphs groups', 0.6746506094932556), ('graph group', 0.6218200922012329), ('power graphs', 0.6159515976905823), ('group graph', 0.5747502446174622), ('power graph', 0.56300950050354), ('graphs finite', 0.5402467846870422), ('finite nilpotent groups', 0.5311326384544373), ('nilpotent groups', 0.5154989957809448)]" 138,138,192,138_holomorphic foliations_singular foliation_foliations mathcal_foliations,"['holomorphic foliations', 'singular foliation', 'foliations mathcal', 'foliations', 'foliation mathcal', 'dimensional foliation', 'foliation mathbb', 'foliation', 'one holomorphic', 'singularities holomorphic']","['Unlikely intersections of codimension one foliations We study families of singular holomorphic foliations on complex projective manifolds whose total intersection defines a foliation of unexpectedly low codimension.', ""A brief introduction on residue theory of holomorphic foliations This is a survey paper dealing with holomorphic foliations, with emphasis on\nresidue theory and its applications. We start recalling the definition of\nholomorphic foliations as a subsheaf of the tangent sheaf of a manifold. The\ntheory of Characteristic Classes of vector bundles is approached from this\nperspective. We define Chern classes of holomorphic foliations using the\nChern-Weil theory and we remark that the Baum-Bott residue is a great tool that\nhelp us to classify some foliations. We present throughout the survey several\nrecent results and advances in residue theory. We finish by presenting some\napplications of residues to solve for example the Poincar\\'e problem and the\nexistence of minimal sets for foliations.\n"", 'Extensions and restrictions of holomorphic foliations We prove an extension criterion for codimension one foliations on projective\nhypersurfaces based on the degree of the foliation and the degree of the\nhypersurface, and we ensure, in some instances, an isomorphism between the\ncorresponding spaces of foliations. We also present some examples of foliations\nthat do not satisfy the extension criterion and do not extend.\n']","[('holomorphic foliations', 0.8408181071281433), ('singular foliation', 0.6878252029418945), ('foliations mathcal', 0.6488990187644958), ('foliations', 0.6362702250480652), ('foliation mathcal', 0.6199266314506531), ('dimensional foliation', 0.6166741251945496), ('foliation mathbb', 0.6048486232757568), ('foliation', 0.5876506567001343), ('one holomorphic', 0.5231415033340454), ('singularities holomorphic', 0.5182881951332092)]" 139,139,191,139_community detection_community structures_community structure_communities,"['community detection', 'community structures', 'community structure', 'communities', 'sparse networks', 'spectral clustering', 'stochastic block models', 'random graphs', 'information theoretic threshold', 'network analysis']","[""Robust recovery for stochastic block models, simplified and generalized We study the problem of $\\textit{robust community recovery}$: efficiently\nrecovering communities in sparse stochastic block models in the presence of\nadversarial corruptions. In the absence of adversarial corruptions, there are\nefficient algorithms when the $\\textit{signal-to-noise ratio}$ exceeds the\n$\\textit{Kesten--Stigum (KS) threshold}$, widely believed to be the\ncomputational threshold for this problem. The question we study is: does the\ncomputational threshold for robust community recovery also lie at the KS\nthreshold? We answer this question affirmatively, providing an algorithm for\nrobust community recovery for arbitrary stochastic block models on any constant\nnumber of communities, generalizing the work of Ding, d'Orsi, Nasser & Steurer\non an efficient algorithm above the KS threshold in the case of $2$-community\nblock models.\n There are three main ingredients to our work:\n (i) The Bethe Hessian of the graph is defined as $H_G(t) \\triangleq\n(D_G-I)t^2 - A_Gt + I$ where $D_G$ is the diagonal matrix of degrees and $A_G$\nis the adjacency matrix. Empirical work suggested that the Bethe Hessian for\nthe stochastic block model has outlier eigenvectors corresponding to the\ncommunities right above the Kesten-Stigum threshold. We formally confirm the\nexistence of outlier eigenvalues for the Bethe Hessian, by explicitly\nconstructing outlier eigenvectors from the community vectors.\n (ii) We develop an algorithm for a variant of robust PCA on sparse matrices.\nSpecifically, an algorithm to partially recover top eigenspaces from\nadversarially corrupted sparse matrices under mild delocalization constraints.\n (iii) A rounding algorithm to turn vector assignments of vertices into a\ncommunity assignment, inspired by the algorithm of Charikar \\& Wirth\n\\cite{CW04} for $2$XOR.\n"", 'Exact Recovery of Community Detection in k-Community Gaussian Mixture\n Model We study the community detection problem on a Gaussian mixture model, in\nwhich vertices are divided into $k\\geq 2$ distinct communities. The major\ndifference in our model is that the intensities for Gaussian perturbations are\ndifferent for different entries in the observation matrix, and we do not assume\nthat every community has the same number of vertices. We explicitly find the\nthreshold for the exact recovery of the maximum likelihood estimation.\nApplications include the community detection on hypergraphs.\n', 'Pairwise Covariates-adjusted Block Model for Community Detection One of the most fundamental problems in network study is community detection.\nThe stochastic block model (SBM) is a widely used model, for which various\nestimation methods have been developed with their community detection\nconsistency results unveiled. However, the SBM is restricted by the strong\nassumption that all nodes in the same community are stochastically equivalent,\nwhich may not be suitable for practical applications. We introduce a pairwise\ncovariates-adjusted stochastic block model (PCABM), a generalization of SBM\nthat incorporates pairwise covariate information. We study the maximum\nlikelihood estimates of the coefficients for the covariates as well as the\ncommunity assignments. It is shown that both the coefficient estimates of the\ncovariates and the community assignments are consistent under suitable sparsity\nconditions. Spectral clustering with adjustment (SCWA) is introduced to\nefficiently solve PCABM. Under certain conditions, we derive the error bound of\ncommunity detection under SCWA and show that it is community detection\nconsistent. In addition, we investigate model selection in terms of the number\nof communities and feature selection for the pairwise covariates, and propose\ntwo corresponding algorithms. PCABM compares favorably with the SBM or\ndegree-corrected stochastic block model (DCBM) under a wide range of simulated\nand real networks when covariate information is accessible.\n']","[('community detection', 0.7060063481330872), ('community structures', 0.5245562791824341), ('community structure', 0.517717719078064), ('communities', 0.4970037043094635), ('sparse networks', 0.4880691170692444), ('spectral clustering', 0.47725021839141846), ('stochastic block models', 0.4557701647281647), ('random graphs', 0.442865788936615), ('information theoretic threshold', 0.44198745489120483), ('network analysis', 0.44177329540252686)]" 140,140,189,140_multigrid solvers_algebraic multigrid methods_multigrid solver_multigrid methods,"['multigrid solvers', 'algebraic multigrid methods', 'multigrid solver', 'multigrid methods', 'multigrid preconditioner', 'grid methods', 'geometric multigrid', 'finite element discretizations', 'multigrid based', 'algebraic multigrid']","['Surface Multigrid via Intrinsic Prolongation This paper introduces a novel geometric multigrid solver for unstructured\ncurved surfaces. Multigrid methods are highly efficient iterative methods for\nsolving systems of linear equations. Despite the success in solving problems\ndefined on structured domains, generalizing multigrid to unstructured curved\ndomains remains a challenging problem. The critical missing ingredient is a\nprolongation operator to transfer functions across different multigrid levels.\nWe propose a novel method for computing the prolongation for triangulated\nsurfaces based on intrinsic geometry, enabling an efficient geometric multigrid\nsolver for curved surfaces. Our surface multigrid solver achieves better\nconvergence than existing multigrid methods. Compared to direct solvers, our\nsolver is orders of magnitude faster. We evaluate our method on many geometry\nprocessing applications and a wide variety of complex shapes with and without\nboundaries. By simply replacing the direct solver, we upgrade existing\nalgorithms to interactive frame rates, and shift the computational bottleneck\naway from solving linear systems.\n', 'A Multigrid Preconditioner for Jacobian-free Newton-Krylov Methods In this work, we propose a multigrid preconditioner for Jacobian-free\nNewton-Krylov (JFNK) methods. Our multigrid method does not require knowledge\nof the Jacobian at any level of the multigrid hierarchy. As it is common in\nstandard multigrid methods, the proposed method also relies on three building\nblocks: transfer operators, smoothers, and a coarse level solver. In addition\nto the restriction and prolongation operator, we also use a projection operator\nto transfer the current Newton iterate to a coarser level. The three-level\nChebyshev semi-iterative method is employed as a smoother, as it has good\nsmoothing properties and does not require the representation of the Jacobian\nmatrix. We replace the direct solver on the coarsest level with a matrix-free\nKrylov subspace method, thus giving rise to a truly Jacobian-free multigrid\npreconditioner. We will discuss all building blocks of our multigrid\npreconditioner in detail and demonstrate the robustness and the efficiency of\nthe proposed method using several numerical examples.\n', 'Hybrid multigrid methods for high-order discontinuous Galerkin\n discretizations The present work develops hybrid multigrid methods for high-order\ndiscontinuous Galerkin discretizations of elliptic problems. Fast matrix-free\noperator evaluation on tensor product elements is used to devise a\ncomputationally efficient PDE solver. The multigrid hierarchy exploits all\npossibilities of geometric, polynomial, and algebraic coarsening, targeting\nengineering applications on complex geometries. Additionally, a transfer from\ndiscontinuous to continuous function spaces is performed within the multigrid\nhierarchy. This does not only further reduce the problem size of the\ncoarse-grid problem, but also leads to a discretization most suitable for\nstate-of-the-art algebraic multigrid methods applied as coarse-grid solver. The\nrelevant design choices regarding the selection of optimal multigrid coarsening\nstrategies among the various possibilities are discussed with the metric of\ncomputational costs as the driving force for algorithmic selections. We find\nthat a transfer to a continuous function space at highest polynomial degree (or\non the finest mesh), followed by polynomial and geometric coarsening, shows the\nbest overall performance. The success of this particular multigrid strategy is\ndue to a significant reduction in iteration counts as compared to a transfer\nfrom discontinuous to continuous function spaces at lowest polynomial degree\n(or on the coarsest mesh). The coarsening strategy with transfer to a\ncontinuous function space on the finest level leads to a multigrid algorithm\nthat is robust with respect to the penalty parameter of the SIPG method.\nDetailed numerical investigations are conducted for a series of examples\nranging from academic test cases to more complex, practically relevant\ngeometries. Performance comparisons to state-of-the-art methods from the\nliterature demonstrate the versatility and computational efficiency of the\nproposed multigrid algorithms.\n']","[('multigrid solvers', 0.701389729976654), ('algebraic multigrid methods', 0.6846473217010498), ('multigrid solver', 0.662347137928009), ('multigrid methods', 0.6592667102813721), ('multigrid preconditioner', 0.6557677388191223), ('grid methods', 0.5651882290840149), ('geometric multigrid', 0.5601651668548584), ('finite element discretizations', 0.517833948135376), ('multigrid based', 0.5174821019172668), ('algebraic multigrid', 0.5127667784690857)]" 141,141,188,141_spin models_spin glass_spin interactions_step replica symmetry,"['spin models', 'spin glass', 'spin interactions', 'step replica symmetry', 'replica symmetry breaking', 'energy spin', 'spin glasses', 'replica symmetry', 'mean field spin', 'field spin']","['TAP variational principle for the constrained overlap multiple spherical\n Sherrington-Kirkpatrick model Spin glass models involving multiple replicas with constrained overlaps have\nbeen studied in [FPV92; PT07; Pan18a]. For the spherical versions of these\nmodels [Ko19; Ko20] showed that the limiting free energy is given by a Parisi\ntype minimization. In this work we show that for Sherrington-Kirkpatrick (i.e.\n2-spin) interactions, it can also be expressed in terms of a\nThouless-Andersson-Palmer (TAP) variational principle. This is only the second\nspin glass model where a mathematically rigorous TAP computation of the free\nenergy at all temperatures and external fields has been achieved. The\nvariational formula we derive here also confirms that the model is replica\nsymmetric, a fact which is natural but not obviously deducible from its Parisi\nformula.\n', 'On the Almeida-Thouless transition line in the Sherrington-Kirkpatrick\n model with centered Gaussian external field We study the phase transition of the free energy in the\nSherrington-Kirkpatrick mean-field spin glass model with centered Gaussian\nexternal field. We show that the corresponding Almeida-Thouless line is the\ncorrect transition curve that distinguishes between the replica symmetric and\nreplica symmetry breaking solutions in the Parisi formula.\n', 'Free Energy of the Quantum Sherrington-Kirkpatrick Spin-Glass Model with\n Transverse Field We consider the quantum Sherrington-Kirkpatrick (SK) spin-glass model with\ntransverse field and provide a formula for its free energy in the thermodynamic\nlimit, valid for all inverse temperatures $\\beta>0$. To characterize the free\nenergy, we use the path integral representation of the partition function and\napproximate the model by a sequence of finite-dimensional vector-spin glasses\nwith $\\mathbb{R}^d$-valued spins. This enables us to use results of Panchenko\nwho generalized in \\cite{Pan2,Pan3} the Parisi formula to classical vector-spin\nglasses. As a consequence, we can express the thermodynamic limit of the free\nenergy of the quantum SK model as the $d\\to\\infty$ limit of the free energies\nof the $d$-dimensional approximations of the model.\n']","[('spin models', 0.5612342953681946), ('spin glass', 0.5077273845672607), ('spin interactions', 0.47523075342178345), ('step replica symmetry', 0.46383532881736755), ('replica symmetry breaking', 0.4574061930179596), ('energy spin', 0.45054689049720764), ('spin glasses', 0.4433361887931824), ('replica symmetry', 0.4344150125980377), ('mean field spin', 0.4253738820552826), ('field spin', 0.4030223488807678)]" 142,142,187,142_class analytic functions_starlike functions_analytic functions_analytic functions unit,"['class analytic functions', 'starlike functions', 'analytic functions', 'analytic functions unit', 'univalent functions', 'class analytic', 'classes analytic', 'analytic', 'functions unit disk', 'functions associated']","['Coefficient bounds for starlike functions associated with Gregory\n coefficients It is of interest to know the sharp bounds of the Hankel determinant, Zalcman\nfunctionals, Fekete-Szeg$ \\ddot{o} $ inequality as a part of coefficient\nproblems for different classes of functions. Let $\\mathcal{H}$ be the class of\nfunctions $ f $ which are holomorphic in the open unit disk\n$\\mathbb{D}=\\{z\\in\\mathbb{C}: |z|<1\\}$ of the form\n \\begin{align*}\n f(z)=z+\\sum_{n=2}^{\\infty}a_nz^n\\; \\mbox{for}\\; z\\in\\mathbb{D}\n \\end{align*}\n and suppose that\n \\begin{align*}\n F_{f}(z):=\\log\\dfrac{f(z)}{z}=2\\sum_{n=1}^{\\infty}\\gamma_{n}(f)z^n, \\;\\;\nz\\in\\mathbb{D},\\;\\;\\log 1:=0,\n \\end{align*}\n where $ \\gamma_{n}(f) $ is the logarithmic coefficients. The second Hankel\ndeterminant of logarithmic coefficients $H_{2,1}(F_{f}/2)$ is defined as:\n$H_{2,1}(F_{f}/2) :=\\gamma_{1}\\gamma_{3} -\\gamma^2_{2}$, where $\\gamma_1,\n\\gamma_2,$ and $\\gamma_3$ are the first, second and third logarithmic\ncoefficients of functions belonging to the class $\\mathcal{S}$ of normalized\nunivalent functions. In this article, we first establish sharp inequalities\n$|H_{2,1}(F_{f}/2)|\\leq 1/64$ with logarithmic coefficients for the classes of\nstarlike functions associated with Gregory coefficients. In addition, we\nestablish the sharpness of Fekete-Szeg$ \\ddot{o} $ inequality, Zalcman\nfunctional and generalized Zalcman functional for the class starlike functions\nassociated with Gregory coefficients.\n', ""Theory of certain Non-Univalent Analytic functions We investigate the non-univalent function's properties reminiscent of the\ntheory of univalent starlike functions. Let the analytic function\n$\\psi(z)=\\sum_{i=1}^{\\infty}A_i z^i$, $A_1\\neq0$ be univalent in the unit disk.\nNon-univalent functions may be found in the class $\\mathcal{F}(\\psi)$ of\nanalytic functions $f$ of the form $f(z)=z+\\sum_{k=2}^{\\infty}a_k z^k$\nsatisfying $({zf'(z)}/{f(z)}-1) \\prec \\psi(z)$. Such functions, like the Ma and\nMinda classes of starlike functions, also have nice geometric properties. For\nthese functions, growth and distortion theorems have been established. Further,\nwe obtain bounds for some sharp coefficient functionals and establish the Bohr\nand Rogosinki phenomenon for the class $\\mathcal{F}(\\psi)$. Non-analytic\nfunctions that share properties of analytic functions are known as\nPoly-analytic functions. Moreover, we compute Bohr and Rogosinski's radius for\nPoly-analytic functions with analytic counterparts in the class\n$\\mathcal{F}(\\psi)$ or classes of Ma-Minda starlike and convex functions.\n"", 'Starlikeness of Certain Non-Univalent Functions We consider three classes of functions defined using the class $\\mathcal{P}$\nof all analytic functions $p(z)=1+cz+\\dotsb$ on the open unit disk having\npositive real part and study several radius problems for these classes. The\nfirst class consists of all normalized analytic functions $f$ with\n$f/g\\in\\mathcal{P}$ and $g/(zp)\\in\\mathcal{P}$ for some normalized analytic\nfunction $g$ and $p\\in \\mathcal{P}$. The second class is defined by replacing\nthe condition $f/g\\in\\mathcal{P}$ by $|(f/g)-1|<1$ while the other class\nconsists of normalized analytic functions $f$ with $f/(zp)\\in\\mathcal{P}$ for\nsome $p\\in \\mathcal{P}$. We have determined radii so that the functions in\nthese classes to belong to various subclasses of starlike functions. These\nsubclasses includes the classes of starlike functions of order $\\alpha$,\nparabolic starlike functions, as well as the classes of starlike functions\nassociated with lemniscate of Bernoulli, reverse lemniscate, sine function, a\nrational function, cardioid, lune, nephroid and modified sigmoid function.\n']","[('class analytic functions', 0.5706979632377625), ('starlike functions', 0.5496580004692078), ('analytic functions', 0.5114170908927917), ('analytic functions unit', 0.48569658398628235), ('univalent functions', 0.4773637652397156), ('class analytic', 0.4757828712463379), ('classes analytic', 0.41657498478889465), ('analytic', 0.38839611411094666), ('functions unit disk', 0.3600701689720154), ('functions associated', 0.31928524374961853)]" 143,143,186,143_sumsets_sum free sets_fold sumset_subset sums,"['sumsets', 'sum free sets', 'fold sumset', 'subset sums', 'additive number theory', 'sum elements', 'sumset', 'additive combinatorics', 'sums', 'a_1 a_2 ldots']","['Direct and Inverse Problems for Restricted Signed Sumsets -- I Let $A=\\{a_{1},\\ldots,a_{k}\\}$ be a nonempty finite subset of an additive\nabelian group $G$. For a positive integer $h$, the $h$-fold signed sumset of\n$A$, denoted by $h_{\\pm}A$, is defined as $$h_{\\pm}A=\\left\\lbrace\n\\sum_{i=1}^{k} \\lambda_{i} a_{i}: \\lambda_{i} \\in \\{-h, \\ldots, 0, \\ldots, h\\}\n\\ \\text{for} \\ i= 1, 2, \\ldots, k \\ \\text{and} \\ \\sum_{i=1}^{k}\n\\left|\\lambda_{i} \\right| =h\\right\\rbrace,$$ and the restricted $h$-fold signed\nsumset of $A$, denoted by $h^{\\wedge}_{\\pm}A$, is defined as\n$$h^{\\wedge}_{\\pm}A=\\left\\lbrace \\sum_{i=1}^{k} \\lambda_{i} a_{i}: \\lambda_{i}\n\\in \\left\\lbrace -1, 0, 1\\right\\rbrace \\ \\text{for} \\ i= 1, 2, \\ldots, k \\\n\\text{and} \\ \\sum_{i=1}^{k} \\left|\\lambda_{i} \\right| = h\\right\\rbrace. $$ A\ndirect problem for the sumset $h^{\\wedge}_{\\pm}A$ is to find the optimal size\nof $h^{\\wedge}_{\\pm}A$ in terms of $h$ and $|A|$. An inverse problem for this\nsumset is to determine the structure of the underlying set $A$ when the sumset\n$h^{\\wedge}_{\\pm}A$ has optimal size. While some results are known for the\nsigned sumsets in finite abelian groups due to Bajnok and Matzke, not much is\nknown for the restricted $h$-fold signed sumset $h^{\\wedge}_{\\pm}A$ even in the\nadditive group of integers $\\Bbb Z$. In case of $G = \\Bbb Z$, Bhanja, Komatsu\nand Pandey studied these problems for the sumset $h^{\\wedge}_{\\pm}A$ for $h=2,\n3$, and $k$, and conjectured the direct and inverse results for $h \\geq 4$. In\nthis paper, we prove these conjectures completely for the sets of positive\nintegers. In a subsequent paper, we prove these conjectures for the sets of\nnonnegative integers.\n', 'Inverse problems for sumset sizes of finite sets of integers Let $A$ be a finite set of integers and let $hA$ be its $h$-fold sumset. This\npaper investigates the sequence of sumset sizes $( |hA| )_{h=1}^{\\infty}$, the\nrelations between these sequences for affinely inequivalent sets $A$ and $B$,\nand the comparative growth rates and configurations of the sumset size\nsequences $( |hA| )_{h=1}^{\\infty}$ and $( |hA| )_{h=1}^{\\infty}$.\n', 'Direct and Inverse Problems for Restricted Signed Sumsets -- II Let $A=\\{a_{1},\\ldots,a_{k}\\}$ be a nonempty finite subset of an additive\nabelian group $G$. For a positive integer $h$, the restricted $h$-fold signed\nsumset of $A$, denoted by $h^{\\wedge}_{\\pm}A$, is defined as\n$$h^{\\wedge}_{\\pm}A = \\left\\lbrace \\sum_{i=1}^{k} \\lambda_{i} a_{i}:\n\\lambda_{i} \\in \\left\\lbrace -1, 0, 1\\right\\rbrace \\ \\text{for} \\ i= 1, 2,\n\\ldots, k \\ \\text{and} \\ \\sum_{i=1}^{k} \\left|\\lambda_{i} \\right|\n=h\\right\\rbrace. $$ A direct problem for the restricted $h$-fold signed sumset\nis to find the optimal size of $h^{\\wedge}_{\\pm}A$ in terms of $h$ and $|A|$.\nAn inverse problem for this sumset is to determine the structure of the\nunderlying set $A$ when the sumset has optimal size. While the signed sumsets\n(which is defined differently compared to the restricted signed sumset) in\nfinite abelian groups has been investigated by Bajnok and Matzke, the\nrestricted $h$-fold signed sumset $h^{\\wedge}_{\\pm}A$ is not well studied even\nin the additive group of integers $\\Bbb Z$. Bhanja, Komatsu and Pandey studied\nthese problems for the restricted $h$-fold signed sumset for $h=2, 3$, and $k$,\nand conjectured some direct and inverse results for $h \\geq 4$. In a recent\npaper, Mistri and Prajapati proved these conjectures completely for the set of\npositive integers. In this paper, we prove these conjectures for the set of\nnonnegative integers, which settles all the conjectures completely.\n']","[('sumsets', 0.5231282711029053), ('sum free sets', 0.4712705612182617), ('fold sumset', 0.4705011248588562), ('subset sums', 0.4346328675746918), ('additive number theory', 0.38582274317741394), ('sum elements', 0.38224077224731445), ('sumset', 0.38025644421577454), ('additive combinatorics', 0.3689763844013214), ('sums', 0.3664957880973816), ('a_1 a_2 ldots', 0.34434762597084045)]" 144,144,186,144_otfs modulation_space otfs modulation_multiplexing ofdm_division multiplexing ofdm,"['otfs modulation', 'space otfs modulation', 'multiplexing ofdm', 'division multiplexing ofdm', 'delay doppler dd', 'frequency division multiplexing', 'ofdm', 'orthogonal frequency division', 'frequency space otfs', 'delay doppler']","[""Orthogonal Delay-Doppler Division Multiplexing Modulation Inspired by the orthogonal time frequency space (OTFS) modulation, in this\npaper, we consider designing a multicarrier (MC) modulation on delay-Doppler\n(DD) plane, to couple the modulated signal with a doubly-selective channel\nhaving DD resolutions. A key challenge for the design of DD plane MC modulation\nis to investigate whether a realizable pulse orthogonal with respect to the DD\nplane's fine resolutions exists or not. To this end, we first indicate that a\nfeasible DD plane MC modulation is essentially a type of staggered multitone\nmodulation. Then, analogous to orthogonal frequency division multiplexing, we\npropose an orthogonal delay-Doppler division multiplexing (ODDM) modulation,\nand design the corresponding transmit pulse. Furthermore, we prove that the\nproposed transmit pulse is orthogonal with respect to the DD plane's\nresolutions and therefore a realizable DD plane orthogonal pulse does exist.\nThe orthogonality of this particular pulse significantly eases the derivation\nof the ODDM's DD domain channel input-output relation, and yields a channel\nmatrix with an elegant block-circulant-like structure. We demonstrate that the\nODDM outperforms the OTFS in terms of out-of-band emission and bit error rate,\nby achieving perfect coupling between the modulated signal and the DD channel.\n"", 'Orthogonal Time Frequency Space (OTFS) Modulation for Wireless\n Communications Orthogonal time frequency space (OTFS) modulation is a recently proposed\nmulti-carrier transmission scheme, which innovatively multiplexes the\ninformation symbols in the delay-Doppler (DD) domain instead of the\nconventional time-frequency (TF) domain. The DD domain symbol multiplexing\ngives rise to a direct interaction between the DD domain information symbols\nand DD domain channel responses, which are usually quasi-static, compact,\nseparable, and potentially sparse. Therefore, OTFS modulation enjoys appealing\nadvantages over the conventional orthogonal frequency-division multiplexing\n(OFDM) modulation for wireless communications. In this thesis, we investigate\nthe related subjects of OTFS modulation for wireless communications,\nspecifically focusing on its signal detection, performance analysis, and\napplications. These important aspects are discussed based on the review of the\nstate-of-the-art and a detailed derivation of OTFS modulation from the discrete\nZak transform (DZT). Finally, a summary of future research directions on OTFS\nmodulation are also provided.\n', 'On the Characterizations of OTFS Modulation over multipath Rapid Fading\n Channel Orthogonal time frequency space (OTFS) modulation has been confirmed to\nprovide significant performance advantages against Doppler in high-mobility\nscenarios. The core feature of OTFS is that the time-variant channel is\nconverted into a non-fading 2D channel in the delay-Doppler (DD) domain so that\nall symbols experience the same channel gain. In now available literature, the\nchannel is assumed to be quasi-static over an OTFS frame. As for more practical\nchannels, the input-output relation will be time-variant as the environment or\nmedium changes. In this paper, we analyze the characterizations of OTFS\nmodulation over a more general multipath channel, where the signal of each path\nhas experienced a unique rapid fading. First, we derive the explicit\ninput-output relationship of OTFS in the DD domain for the case of ideal pulse\nand rectangular pulse. It is shown that the rapid fading will produce extra\nDoppler dispersion without impacting on delay domain. We next demonstrate that\nOTFS can be interpreted as an efficient time diversity technology that combines\nspace-time encoding and interleaving. Simulation results reveal that OTFS is\ninsensitive to rapid fading and still outperforms orthogonal frequency-division\nmultiplexing (OFDM) in these types of channels.\n']","[('otfs modulation', 0.5485365390777588), ('space otfs modulation', 0.5277403593063354), ('multiplexing ofdm', 0.5268808603286743), ('division multiplexing ofdm', 0.5020744204521179), ('delay doppler dd', 0.49254339933395386), ('frequency division multiplexing', 0.4854007661342621), ('ofdm', 0.44697579741477966), ('orthogonal frequency division', 0.44512271881103516), ('frequency space otfs', 0.44168606400489807), ('delay doppler', 0.4396515190601349)]" 145,145,184,145_bose einstein condensation_bose einstein condensates_bose einstein condensate_bose gases,"['bose einstein condensation', 'bose einstein condensates', 'bose einstein condensate', 'bose gases', 'einstein condensates', 'einstein condensation', 'interacting bosons', 'einstein condensate', 'bose einstein', 'bose gas']","['Bose-Einstein Condensation for Lattice Bosons We present a class of models of interacting lattice bosons which show\ncomplete Bose-Einstein condensation for the ground state.\n', 'Length scales for BEC in the dilute Bose gas We give a short proof of Bose Einstein Condensation of dilute Bose gases on\nlength scales much longer than the Gross-Pitaevskii scale.\n', 'The Bose gas in a box with Neumann boundary conditions We consider a gas of bosonic particles confined in a box with Neumann\nboundary conditions. We prove Bose-Einstein condensation in the\nGross-Pitaevskii regime, with an optimal bound on the condensate depletion. Our\nlower bound for the ground state energy in the box implies (via Neumann\nbracketing) a lower bound for the ground state energy of the Bose gas in the\nthermodynamic limit.\n']","[('bose einstein condensation', 0.8010678291320801), ('bose einstein condensates', 0.781952440738678), ('bose einstein condensate', 0.756225049495697), ('bose gases', 0.6343837976455688), ('einstein condensates', 0.5895387530326843), ('einstein condensation', 0.5850558280944824), ('interacting bosons', 0.5543807148933411), ('einstein condensate', 0.5538434386253357), ('bose einstein', 0.5402318239212036), ('bose gas', 0.46974286437034607)]" 146,146,184,146_reconfigurable intelligent surface_reconfigurable intelligent surfaces_intelligent surface ris_ris assisted wireless,"['reconfigurable intelligent surface', 'reconfigurable intelligent surfaces', 'intelligent surface ris', 'ris assisted wireless', 'intelligent surface bd', 'surface bd ris', 'intelligent surfaces riss', 'intelligent surfaces ris', 'diagonal reconfigurable intelligent', 'beyond diagonal reconfigurable']","['Reconfigurable Intelligent Surfaces 2.0: Beyond Diagonal Phase Shift\n Matrices Reconfigurable intelligent surface (RIS) has been envisioned as a promising\ntechnique to enable and enhance future wireless communications due to its\npotential to engineer the wireless channels in a cost-effective manner.\nExtensive research attention has been drawn to the use of conventional RIS 1.0\nwith diagonal phase shift matrices, where each RIS element is connected to its\nown load to ground but not connected to other elements. However, the simple\narchitecture of RIS 1.0 limits its flexibility of manipulating passive\nbeamforming. To fully exploit the benefits of RIS, in this paper, we introduce\nRIS 2.0 beyond diagonal phase shift matrices, namely beyond diagonal RIS\n(BD-RIS). We first explain the modeling of BD-RIS based on the scattering\nparameter network analysis and classify BD-RIS by the mathematical\ncharacteristics of the scattering matrix, supported modes, and architectures.\nThen, we provide simulations to evaluate the sum-rate performance with\ndifferent modes/architectures of BD-RIS. We summarize the benefits of BD-RIS in\nproviding high flexibility in wave manipulation, enlarging coverage,\nfacilitating the deployment, and requiring low complexity in resolution bit and\nelement numbers. Inspired by the benefits of BD-RIS, we also discuss potential\napplications of BD-RIS in various wireless systems. Finally, we list key\nchallenges in modeling, designing, and implementing BD-RIS in practice and\npoint to possible future research directions for BD-RIS.\n', 'Localized and Distributed Beyond Diagonal Reconfigurable Intelligent\n Surfaces with Lossy Interconnections: Modeling and Optimization Reconfigurable intelligent surface (RIS) is a key technology to control the\ncommunication environment in future wireless networks. Recently, beyond\ndiagonal RIS (BD-RIS) emerged as a generalization of RIS achieving larger\ncoverage through additional tunable impedance components interconnecting the\nRIS elements. However, conventional RIS and BD-RIS can effectively serve only\nusers in their proximity, resulting in limited coverage. To overcome this\nlimitation, in this paper, we investigate distributed RIS, whose elements are\ndistributed over a wide region, in opposition to localized RIS commonly\nconsidered in the literature. The scaling laws of distributed BD-RIS reveal\nthat it offers significant gains over distributed conventional RIS and\nlocalized BD-RIS, enabled by its interconnections allowing signal propagation\nwithin the BD-RIS. To assess the practical performance of distributed BD-RIS,\nwe model and optimize BD-RIS with lossy interconnections through transmission\nline theory. Our model accounts for phase changes and losses over the BD-RIS\ninterconnections arising when the interconnection lengths are not much smaller\nthan the wavelength. Numerical results show that the performance of localized\nBD-RIS is only slightly impacted by losses, given the short interconnection\nlengths. Besides, distributed BD-RIS can achieve orders of magnitude of gains\nover conventional RIS, even in the presence of low losses.\n', ""A Tutorial on Beyond-Diagonal Reconfigurable Intelligent Surfaces: Modeling, Architectures, System Design and Optimization, and Applications Written by its inventors, this first tutorial on Beyond-Diagonal Reconfigurable Intelligent Surfaces (BD-RISs) provides the readers with the basics and fundamental tools necessary to appreciate, understand, and contribute to this emerging and disruptive technology. Conventional (Diagonal) RISs (D-RISs) are characterized by a diagonal scattering matrix $\\mathbf{\\Theta}$ such that the wave manipulation flexibility of D-RIS is extremely limited. In contrast, BD-RIS refers to a novel and general framework for RIS where its scattering matrix is not limited to be diagonal (hence, the ``beyond-diagonal'' terminology) and consequently, all entries of $\\mathbf{\\Theta}$ can potentially help shaping waves for much higher manipulation flexibility. This physically means that BD-RIS can artificially engineer and reconfigure coupling across elements of the surface thanks to inter-element reconfigurable components which allow waves absorbed by one element to flow through other elements. Consequently, BD-RIS opens the door to more general and versatile intelligent surfaces that subsumes existing RIS architectures as special cases. In this tutorial, we share all the secret sauce to model, design, and optimize BD-RIS and make BD-RIS transformative in many different applications. Topics discussed include physics-consistent and multi-port network-aided modeling; transmitting, reflecting, hybrid, and multi-sector mode analysis; reciprocal and non-reciprocal architecture designs and optimal performance-complexity Pareto frontier of BD-RIS; signal processing, optimization, and channel estimation for BD-RIS; hardware impairments (discrete-value impedance and admittance, lossy interconnections and components, wideband effects, mutual coupling) of BD-RIS; benefits and applications of BD-RIS in communications, sensing, power transfer.""]","[('reconfigurable intelligent surface', 0.48249122500419617), ('reconfigurable intelligent surfaces', 0.4746350944042206), ('intelligent surface ris', 0.4567756652832031), ('ris assisted wireless', 0.45558246970176697), ('intelligent surface bd', 0.4455392360687256), ('surface bd ris', 0.42086902260780334), ('intelligent surfaces riss', 0.4130071699619293), ('intelligent surfaces ris', 0.41044390201568604), ('diagonal reconfigurable intelligent', 0.38818567991256714), ('beyond diagonal reconfigurable', 0.38127318024635315)]" 147,147,182,147_finite element stokes_finite element methods_galerkin methods_incompressible navier stokes,"['finite element stokes', 'finite element methods', 'galerkin methods', 'incompressible navier stokes', 'incompressible stokes', 'element stokes', 'discontinuous galerkin', 'navier stokes equations', 'hybridized discontinuous galerkin', 'navier stokes']","['Pressure robust SUPG-stabilized finite elements for the unsteady\n Navier-Stokes equation In the present contribution we propose a novel conforming Finite Element\nscheme for the time-dependent Navier-Stokes equation, which is proven to be\nboth convection quasi-robust and pressure robust. The method is built combining\na ""divergence-free"" velocity/pressure couple (such as the Scott-Vogelius\nelement), a Discontinuous Galerkin in time approximation, and a suitable\nSUPG-curl stabilization. A set of numerical tests, in accordance with the\ntheoretical results, is included.\n', 'A nonconforming pressure-robust finite element method for the Stokes\n equations on anisotropic meshes Most classical finite element schemes for the (Navier-)Stokes equations are\nneither pressure-robust, nor are they inf-sup stable on general anisotropic\ntriangulations. A lack of pressure-robustness may lead to large velocity\nerrors, whenever the Stokes momentum balance is dominated by a strong and\ncomplicated pressure gradient. It is a consequence of a method, which does not\nexactly satisfy the divergence constraint. However, inf-sup stable schemes can\noften be made pressure-robust just by a recent, modified discretization of the\nexterior forcing term, using $\\mathbf{H}(\\operatorname{div})$-conforming\nvelocity reconstruction operators. This approach has so far only been analyzed\non shape-regular triangulations. The novelty of the present contribution is\nthat the reconstruction approach for the Crouzeix-Raviart method, which has a\nstable Fortin operator on arbitrary meshes, is combined with results on the\ninterpolation error on anisotropic elements for reconstruction operators of\nRaviart-Thomas and Brezzi-Douglas-Marini type, generalizing the method to a\nlarge class of anisotropic triangulations. Numerical examples confirm the\ntheoretical results in a 2D and a 3D test case.\n', 'A pressure-robust embedded discontinuous Galerkin method for the Stokes\n problem by reconstruction operators The embedded discontinuous Galerkin (EDG) finite element method for the\nStokes problem results in a point-wise divergence-free approximate velocity on\ncells. However, the approximate velocity is not H(div)-conforming and it can be\nshown that this is the reason that the EDG method is not pressure-robust, i.e.,\nthe error in the velocity depends on the continuous pressure. In this paper we\npresent a local reconstruction operator that maps discretely divergence-free\ntest functions to exactly divergence-free test functions. This local\nreconstruction operator restores pressure-robustness by only changing the right\nhand side of the discretization, similar to the reconstruction operator\nrecently introduced for the Taylor--Hood and mini elements by Lederer et al.\n(SIAM J. Numer. Anal., 55 (2017), pp. 1291--1314). We present an a priori error\nanalysis of the discretization showing optimal convergence rates and\npressure-robustness of the velocity error. These results are verified by\nnumerical examples. The motivation for this research is that the resulting EDG\nmethod combines the versatility of discontinuous Galerkin methods with the\ncomputational efficiency of continuous Galerkin methods and accuracy of\npressure-robust finite element methods.\n']","[('finite element stokes', 0.642822802066803), ('finite element methods', 0.5738146305084229), ('galerkin methods', 0.56498122215271), ('incompressible navier stokes', 0.5463944673538208), ('incompressible stokes', 0.5272274017333984), ('element stokes', 0.5221638679504395), ('discontinuous galerkin', 0.5201390385627747), ('navier stokes equations', 0.5165606737136841), ('hybridized discontinuous galerkin', 0.486908882856369), ('navier stokes', 0.4720262885093689)]" 148,148,182,148_fusion frames_fusion frame_frames hilbert_dual frames,"['fusion frames', 'fusion frame', 'frames hilbert', 'dual frames', 'frame operator', 'frame dual', 'fusion', 'continuous frames', 'dual frame', 'frame theory']","['Fusion frames for operators and atomic systems Recently, fusion frames and frames for operators were considered as\ngeneralizations of frames in Hilbert spaces. In this paper, we generalize some\nof the known results in frame theory to fusion frames related to a linear\nbounded operator K which we call K-fusion frames. We obtain new K-fusion frames\nby considering K-fusion frames with a class of bounded linear operators. We\nalso study the stability of K-fusion frames under small perturbations. We\nfurther give some characterizations of atomic systems with subspace sequences.\n', 'Controlled $K$-Fusion Frame for Hilbert Spaces $K$-fusion frames are a generalization of fusion frames in frame theory. In\nthis paper, we extend the concept of controlled fusion frames to controlled\n$K$-fusion frames, and we develop some results on the controlled $K$-fusion\nframes for Hilbert spaces, which generalized some well known of controlled\nfusion frames case. also we discuss some characterizations of controlled Bessel\n$K$-fusion sequences and of controlled Bessel $K$-fusion. Further, we analyse\nstability conditions of controlled $K$-fusion frames under perturbation.\n', 'Robustness of controlled $K$-Fusion Frame in Hilbert C$^*$-modules under\n erasures of submodules Controlled $\\ast$-K-fusion frames are generalization of controlled fusion\nframes in frame theory. In this paper, we propose the notion of controlled\n$\\ast$-k-fusions frames on Hilbert $C^{\\ast}$-modules. We give some\ncaraterizations and some of their properties are obtained. Then we study the\nerasures of submodules of a controlled $k$-fusion frame in Hilbert\n$C^{\\ast}$-modules and we present some sufficient conditions under which a\nsequence remains a standart controlled k-fusion frame after deletion of some\nsubmodules. Finally, we introduce a perturbation for controlled $K$-fusion\nframes in Hilbert $C^{\\ast}$-modules and it is shown that under some conditions\ncontrolled $K$-fusion frames are stable under this perturbation, and we\ngeneralize some of the results obtained for perturbations of controlled\n$K$-fusion frames.\n']","[('fusion frames', 0.6473575234413147), ('fusion frame', 0.6102688908576965), ('frames hilbert', 0.5619090795516968), ('dual frames', 0.5269407629966736), ('frame operator', 0.5200565457344055), ('frame dual', 0.48538559675216675), ('fusion', 0.4724371135234833), ('continuous frames', 0.47070321440696716), ('dual frame', 0.4655287265777588), ('frame theory', 0.4425722658634186)]" 149,149,182,149_learning federated learning_federated learning_learning wireless_federated learning fl,"['learning federated learning', 'federated learning', 'learning wireless', 'federated learning fl', 'wireless federated', 'learning federated', 'distributed learning', 'edge learning', 'wireless networks', 'wireless channels']","['Reconfigurable Intelligent Surface Enabled Federated Learning: A Unified\n Communication-Learning Design Approach To exploit massive amounts of data generated at mobile edge networks,\nfederated learning (FL) has been proposed as an attractive substitute for\ncentralized machine learning (ML). By collaboratively training a shared\nlearning model at edge devices, FL avoids direct data transmission and thus\novercomes high communication latency and privacy issues as compared to\ncentralized ML. To improve the communication efficiency in FL model\naggregation, over-the-air computation has been introduced to support a large\nnumber of simultaneous local model uploading by exploiting the inherent\nsuperposition property of wireless channels. However, due to the heterogeneity\nof communication capacities among edge devices, over-the-air FL suffers from\nthe straggler issue in which the device with the weakest channel acts as a\nbottleneck of the model aggregation performance. This issue can be alleviated\nby device selection to some extent, but the latter still suffers from a\ntradeoff between data exploitation and model communication. In this paper, we\nleverage the reconfigurable intelligent surface (RIS) technology to relieve the\nstraggler issue in over-the-air FL. Specifically, we develop a learning\nanalysis framework to quantitatively characterize the impact of device\nselection and model aggregation error on the convergence of over-the-air FL.\nThen, we formulate a unified communication-learning optimization problem to\njointly optimize device selection, over-the-air transceiver design, and RIS\nconfiguration. Numerical experiments show that the proposed design achieves\nsubstantial learning accuracy improvement compared with the state-of-the-art\napproaches, especially when channel conditions vary dramatically across edge\ndevices.\n', 'CFLIT: Coexisting Federated Learning and Information Transfer Future wireless networks are expected to support diverse mobile services,\nincluding artificial intelligence (AI) services and ubiquitous data\ntransmissions. Federated learning (FL), as a revolutionary learning approach,\nenables collaborative AI model training across distributed mobile edge devices.\nBy exploiting the superposition property of multiple-access channels,\nover-the-air computation allows concurrent model uploading from massive devices\nover the same radio resources, and thus significantly reduces the communication\ncost of FL. In this paper, we study the coexistence of over-the-air FL and\ntraditional information transfer (IT) in a mobile edge network. We propose a\ncoexisting federated learning and information transfer (CFLIT) communication\nframework, where the FL and IT devices share the wireless spectrum in an OFDM\nsystem. Under this framework, we aim to maximize the IT data rate and guarantee\na given FL convergence performance by optimizing the long-term radio resource\nallocation. A key challenge that limits the spectrum efficiency of the\ncoexisting system lies in the large overhead incurred by frequent communication\nbetween the server and edge devices for FL model aggregation. To address the\nchallenge, we rigorously analyze the impact of the computation-to-communication\nratio on the convergence of over-the-air FL in wireless fading channels. The\nanalysis reveals the existence of an optimal computation-to-communication ratio\nthat minimizes the amount of radio resources needed for over-the-air FL to\nconverge to a given error tolerance. Based on the analysis, we propose a\nlow-complexity online algorithm to jointly optimize the radio resource\nallocation for both the FL devices and IT devices. Extensive numerical\nsimulations verify the superior performance of the proposed design for the\ncoexistence of FL and IT devices in wireless cellular systems.\n', 'Digital Over-the-Air Federated Learning in Multi-Antenna Systems In this paper, the performance optimization of federated learning (FL), when\ndeployed over a realistic wireless multiple-input multiple-output (MIMO)\ncommunication system with digital modulation and over-the-air computation\n(AirComp) is studied. In particular, a MIMO system is considered in which edge\ndevices transmit their local FL models (trained using their locally collected\ndata) to a parameter server (PS) using beamforming to maximize the number of\ndevices scheduled for transmission. The PS, acting as a central controller,\ngenerates a global FL model using the received local FL models and broadcasts\nit back to all devices. Due to the limited bandwidth in a wireless network,\nAirComp is adopted to enable efficient wireless data aggregation. However,\nfading of wireless channels can produce aggregate distortions in an\nAirComp-based FL scheme. To tackle this challenge, we propose a modified\nfederated averaging (FedAvg) algorithm that combines digital modulation with\nAirComp to mitigate wireless fading while ensuring the communication\nefficiency. This is achieved by a joint transmit and receive beamforming\ndesign, which is formulated as an optimization problem to dynamically adjust\nthe beamforming matrices based on current FL model parameters so as to minimize\nthe transmitting error and ensure the FL performance. To achieve this goal, we\nfirst analytically characterize how the beamforming matrices affect the\nperformance of the FedAvg in different iterations. Based on this relationship,\nan artificial neural network (ANN) is used to estimate the local FL models of\nall devices and adjust the beamforming matrices at the PS for future model\ntransmission. The algorithmic advantages and improved performance of the\nproposed methodologies are demonstrated through extensive numerical\nexperiments.\n']","[('learning federated learning', 0.544837236404419), ('federated learning', 0.5397226214408875), ('learning wireless', 0.5259676575660706), ('federated learning fl', 0.5190533399581909), ('wireless federated', 0.5016071796417236), ('learning federated', 0.49636536836624146), ('distributed learning', 0.4323342740535736), ('edge learning', 0.4009435772895813), ('wireless networks', 0.3980078399181366), ('wireless channels', 0.3705924153327942)]" 150,150,180,150_solutions vlasov poisson_vlasov poisson system_vlasov poisson_solutions vlasov,"['solutions vlasov poisson', 'vlasov poisson system', 'vlasov poisson', 'solutions vlasov', 'poisson equations', 'euler poisson system', 'limit vlasov', 'dimensional vlasov', 'poisson system', 'poisson systems']","['A Probabilistic Mean Field Limit for the Vlasov-Poisson System for Ions The Vlasov-Poisson system for ions is a kinetic equation for dilute,\nunmagnetised plasma. It describes the evolution of the ions in a plasma under\nthe assumption that the electrons are thermalized. Consequently, the Poisson\ncoupling for the electrostatic potential contains an additional exponential\nnonlinearity not present in the electron Vlasov-Poisson system.\n The system can be formally derived through a mean field limit from a\nmicroscopic system of ions interacting with a thermalized electron\ndistribution. However, it is an open problem to justify this limit rigorously\nfor ions modelled as point charges. Existing results on the derivation of the\nthree-dimensional ionic Vlasov-Poisson system require a truncation of the\nsingularity in the Coulomb interaction at spatial scales of order $N^{- \\beta}$\nwith $\\beta < 1/15$, which is more restrictive than the available results for\nthe electron Vlasov-Poisson system.\n In this article, we prove that the Vlasov-Poisson system for ions can be\nderived from a microscopic system of ions and thermalized electrons with\ninteraction truncated at scale $N^{- \\beta}$ with $\\beta < 1/3$. We develop a\ngeneralisation of the probabilistic approach to mean field limits that is\napplicable to interaction forces defined through a nonlinear coupling with the\nparticle density. The proof is based on a quantitative uniform law of large\nnumbers for convolutions between empirical measures of independent, identically\ndistributed random variables and locally Lipschitz functions.\n', 'On the asymptotic behavior of solutions to the Vlasov-Poisson system We prove small data modified scattering for the Vlasov-Poisson system in\ndimension $d=3$ using a method inspired from dispersive analysis. In\nparticular, we identify a simple asymptotic dynamic related to the scattering\nmass.\n', 'Backward problem for the 1D ionic Vlasov-Poisson equation In this paper, we study the backward problem for the one-dimensional\nVlasov-Poisson system with massless electrons, and we show the Landau damping\nby fixing the asymptotic behaviour of our solution.\n']","[('solutions vlasov poisson', 0.7938392758369446), ('vlasov poisson system', 0.7756565809249878), ('vlasov poisson', 0.6863333582878113), ('solutions vlasov', 0.6118466258049011), ('poisson equations', 0.5624814033508301), ('euler poisson system', 0.5492361187934875), ('limit vlasov', 0.5166463851928711), ('dimensional vlasov', 0.5004605650901794), ('poisson system', 0.4864158034324646), ('poisson systems', 0.4676009714603424)]" 151,151,179,151_randomization tests_permutation tests_independence tests_independence testing,"['randomization tests', 'permutation tests', 'independence tests', 'independence testing', 'testing independence', 'test independence', 'conditional independence testing', 'test statistics', 'sample tests', 'proposed tests']","['Boosting the Power of Kernel Two-Sample Tests The kernel two-sample test based on the maximum mean discrepancy (MMD) is one\nof the most popular methods for detecting differences between two distributions\nover general metric spaces. In this paper we propose a method to boost the\npower of the kernel test by combining MMD estimates over multiple kernels using\ntheir Mahalanobis distance. We derive the asymptotic null distribution of the\nproposed test statistic and use a multiplier bootstrap approach to efficiently\ncompute the rejection region. The resulting test is universally consistent and,\nsince it is obtained by aggregating over a collection of kernels/bandwidths, is\nmore powerful in detecting a wide range of alternatives in finite samples. We\nalso derive the distribution of the test statistic for both fixed and local\ncontiguous alternatives. The latter, in particular, implies that the proposed\ntest is statistically efficient, that is, it has non-trivial asymptotic\n(Pitman) efficiency. The consistency properties of the Mahalanobis and other\nnatural aggregation methods are also explored when the number of kernels is\nallowed to grow with the sample size. Extensive numerical experiments are\nperformed on both synthetic and real-world datasets to illustrate the efficacy\nof the proposed method over single kernel tests. The computational complexity\nof the proposed method is also studied, both theoretically and in simulations.\nOur asymptotic results rely on deriving the joint distribution of MMD estimates\nusing the framework of multiple stochastic integrals, which is more broadly\nuseful, specifically, in understanding the efficiency properties of recently\nproposed adaptive MMD tests based on kernel aggregation and also in developing\nmore computationally efficient (linear time) tests that combine multiple\nkernels. We conclude with an application of the Mahalanobis aggregation method\nfor kernels with diverging scaling parameters.\n', 'Cheap Permutation Testing Permutation tests are a popular choice for distinguishing distributions and\ntesting independence, due to their exact, finite-sample control of false\npositives and their minimax optimality when paired with U-statistics. However,\nstandard permutation tests are also expensive, requiring a test statistic to be\ncomputed hundreds or thousands of times to detect a separation between\ndistributions. In this work, we offer a simple approach to accelerate testing:\ngroup your datapoints into bins and permute only those bins. For U and\nV-statistics, we prove that these cheap permutation tests have two remarkable\nproperties. First, by storing appropriate sufficient statistics, a cheap test\ncan be run in time comparable to evaluating a single test statistic. Second,\ncheap permutation power closely approximates standard permutation power. As a\nresult, cheap tests inherit the exact false positive control and minimax\noptimality of standard permutation tests while running in a fraction of the\ntime. We complement these findings with improved power guarantees for standard\npermutation testing and experiments demonstrating the benefits of cheap\npermutations over standard maximum mean discrepancy (MMD), Hilbert-Schmidt\nindependence criterion (HSIC), random Fourier feature, Wilcoxon-Mann-Whitney,\ncross-MMD, and cross-HSIC tests.\n', 'A Permutation-free Kernel Two-Sample Test The kernel Maximum Mean Discrepancy~(MMD) is a popular multivariate distance\nmetric between distributions that has found utility in two-sample testing. The\nusual kernel-MMD test statistic is a degenerate U-statistic under the null, and\nthus it has an intractable limiting distribution. Hence, to design a\nlevel-$\\alpha$ test, one usually selects the rejection threshold as the\n$(1-\\alpha)$-quantile of the permutation distribution. The resulting\nnonparametric test has finite-sample validity but suffers from large\ncomputational cost, since every permutation takes quadratic time. We propose\nthe cross-MMD, a new quadratic-time MMD test statistic based on\nsample-splitting and studentization. We prove that under mild assumptions, the\ncross-MMD has a limiting standard Gaussian distribution under the null.\nImportantly, we also show that the resulting test is consistent against any\nfixed alternative, and when using the Gaussian kernel, it has minimax\nrate-optimal power against local alternatives. For large sample sizes, our new\ncross-MMD provides a significant speedup over the MMD, for only a slight loss\nin power.\n']","[('randomization tests', 0.5825642943382263), ('permutation tests', 0.5244858860969543), ('independence tests', 0.5157424211502075), ('independence testing', 0.5002722144126892), ('testing independence', 0.488186776638031), ('test independence', 0.4808075428009033), ('conditional independence testing', 0.47678306698799133), ('test statistics', 0.4355618953704834), ('sample tests', 0.39941760897636414), ('proposed tests', 0.39331960678100586)]" 152,152,179,152_renormalization group_renormalization_renormalizability_renormalizable,"['renormalization group', 'renormalization', 'renormalizability', 'renormalizable', 'renormalization group flow', 'renormalisation', 'renormalisation group', 'renormalization group rg', 'renormalized', 'quantum field theories']","['Semiclassical Trans-Series from the Perturbative Hopf-Algebraic\n Dyson-Schwinger Equations: $\\phi^3$ QFT in 6 Dimensions We analyze the asymptotically free massless scalar $\\phi^3$ quantum field\ntheory in 6 dimensions, using resurgent asymptotic analysis to find the\ntrans-series solutions which yield the non-perturbative completion of the\ndivergent perturbative solutions to the Kreimer-Connes Hopf-algebraic\nDyson-Schwinger equations for the anomalous dimension. This scalar conformal\nfield theory is asymptotically free and has a real Lipatov instanton. In the\nHopf-algebraic approach we find a trans-series having an intricate Borel\nsingularity structure, with three distinct but resonant non-perturbative terms,\neach repeated in an infinite series. These expansions are in terms of the\nrenormalized coupling. The resonant structure leads to powers of logarithmic\nterms at higher levels of the trans-series, analogous to logarithmic terms\narising from interactions between instantons and anti-instantons, but arising\nfrom a purely perturbative formalism rather than from a semi-classical\nanalysis.\n', ""On Haag's theorem and renormalization ambiguities We revisit the implications of Haag's theorem in the light of the\nrenormalization group. There is still some lack of discussion in the literature\nabout the possible impact of the theorem on the standard (as opposite of\naxiomatic) quantum field theory, and we try to shed light in this direction.\nOur discussion then deals with the interplay between Haag's theorem and\nrenormalization. While we clarify how perturbative renormalization (for the\nsub-class of interactions that are renormalizable) marginalizes the its impact\nwhen the coupling is formally small, we argue that a non-perturbative and\nnon-ambiguous renormalization cannot be built if there is any reference to the\ninteraction picture with free fields. In other words, Haag's theorem should be\nregarded as a no-go theorem for the existence of a non-ambiguous analytic\ncontinuation from perturbative to non-perturbative QFT.\n"", 'Linearized renormalization Using an infinitesimal approach, this work addresses the renormalization problem to deal with the ultraviolet divergences arising in quantum field theory. Under the assumption that the action has already been renormalized to yield an ultraviolet-finite effective action that satisfies a certain set of renormalization conditions, we analyze how the action must be adjusted to reproduce a first-order change in these renormalization conditions. The analysis then provides the change that is induced on the correlation functions of the theory. This program is successfully carried out in the case of super-renormalizable theories, namely, a scalar field with cubic interaction in four space-time dimensions and with quartic interaction in three space-time dimensions. Relying on existing results in the theory of perturbative renormalization, we derive explicit renormalized expressions for these theories, each of which involves only a finite number of graphs constructed with full propagators and full $n$-point vertices. The renormalizable case is analyzed as well; the derived expressions are ultraviolet finite as the regulator is removed but cannot be written without a regulator. In this sense, the renormalization is not fully explicit in the renormalizable case. Nevertheless, a perturbative solution of the equations starting from the free theory provides the renormalized Feynman graphs, similar to the BPHZ program. For compatibility with the preservation of the renormalization conditions, a projective renormalization scheme, as opposed to a minimal one, is also introduced. The ideas developed are extended to the study of the renormalization of composite operators and the Schwinger-Dyson equations.']","[('renormalization group', 0.671108067035675), ('renormalization', 0.6598987579345703), ('renormalizability', 0.6451960206031799), ('renormalizable', 0.6420077681541443), ('renormalization group flow', 0.6217562556266785), ('renormalisation', 0.6151000261306763), ('renormalisation group', 0.6130029559135437), ('renormalization group rg', 0.6047101020812988), ('renormalized', 0.5776699781417847), ('quantum field theories', 0.5413388609886169)]" 153,153,178,153_lie symmetry analysis_lie symmetries_lie point symmetries_lie symmetry,"['lie symmetry analysis', 'lie symmetries', 'lie point symmetries', 'lie symmetry', 'generalized symmetries', 'approximate symmetries', 'variational symmetries', 'symmetries', 'invariant solutions', 'dimensional lie algebra']","['Lie symmetry analysis and similarity solutions for the Camassa-Choi\n equations The method of Lie symmetry analysis of differential equations is applied to\ndetermine exact solutions for the Camassa-Choi equation and its generalization.\nWe prove that the Camassa-Choi equation is invariant under an\ninfinite-dimensional Lie algebra, with an essential five-dimensional Lie\nalgebra. The application of the Lie point symmetries leads to the construction\nof exact similarity solutions.\n', 'Similarity solutions and Conservation laws for the\n Bogoyavlensky-Konopelchenko Equation by Lie point symmetries The 1 + 2 dimensional Bogoyavlensky-Konopelchenko Equation is investigated\nfor its solution and conservation laws using the Lie point symmetry analysis.\nIn the recent past, certain work has been done describing the Lie point\nsymmetries for the equation and this work seems to be incomplete (Ray S (2017)\nCompt. Math. Appl. 74, 1157). We obtained certain new symmetries and\ncorresponding conservation laws. The travelling-wave solution and some other\nsimilarity solutions are studied.\n', 'Symmetries of nonlinear ordinary differential equations: the modified\n Emden equation as a case study Lie symmetry analysis is one of the powerful tools to analyze nonlinear\nordinary differential equations. We review the effectiveness of this method in\nterms of various symmetries. We present the method of deriving Lie point\nsymmetries, contact symmetries, hidden symmetries, nonlocal symmetries,\n$\\lambda$-symmetries, adjoint symmetries and telescopic vector fields of a\nsecond-order ordinary differential equation. We also illustrate the algorithm\ninvolved in each method by considering a nonlinear oscillator equation as an\nexample. The connections between (i) symmetries and integrating factors and\n(ii) symmetries and integrals are also discussed and illustrated through the\nsame example. The interconnections between some of the above symmetries, that\nis (i) Lie point symmetries and $\\lambda$-symmetries and (ii) exponential\nnonlocal symmetries and $\\lambda$-symmetries are also discussed. The order\nreduction procedure is invoked to derive the general solution of the\nsecond-order equation.\n']","[('lie symmetry analysis', 0.7241292595863342), ('lie symmetries', 0.7200035452842712), ('lie point symmetries', 0.699038028717041), ('lie symmetry', 0.6702678799629211), ('generalized symmetries', 0.6600404381752014), ('approximate symmetries', 0.6050596237182617), ('variational symmetries', 0.5893681645393372), ('symmetries', 0.5802092552185059), ('invariant solutions', 0.5707628726959229), ('dimensional lie algebra', 0.5644188523292542)]" 154,154,178,154_reaction network theory_reaction networks_chemical reaction networks_reaction network,"['reaction network theory', 'reaction networks', 'chemical reaction networks', 'reaction network', 'chemical reaction network', 'biochemical reaction networks', 'reaction systems', 'kinetic systems', 'mass action kinetics', 'action kinetics']","['Analysis of Mass-Action Systems by Split Network Translation We introduce the notion of corresponding a chemical reaction network to a\nsplit network translation, and use this novel process to extend the scope of\nexisting network-based theory for characterizing the steady state set of\nmass-action systems. In the process of network splitting, the reactions of a\nnetwork are divided into subnetworks, called slices, in such a way that, when\nsummed across the slices, the stoichiometry of each reaction sums to that of\nthe original network. This can produce a network with more desirable structural\nproperties, such as weak reversibility and a lower deficiency, which can then\nbe used to establish steady state properties of the original mass-action system\nsuch as multistationarity and absolute concentration robustness. We also\npresent a computational implementation utilizing mixed-integer linear\nprogramming for determining whether a given chemical reaction network has a\nweakly reversible split network translation.\n', 'A decomposition-based approach for deriving positive steady states of a\n class of chemical reaction networks with non-mass-action kinetics Steady states are frequently used to investigate the long-term behaviors of\n(bio)-chemical systems. Recently, there has been a growing interest in\nnetwork-based approaches due to their efficiency in deriving parametrizations\nof positive steady states in systems with mass-action kinetics. In this study,\nwe extend this approach to derive positive steady states in networks under\nnon-mass-action kinetics, specifically mixed kinetics. In a system with mixed\nkinetics, some reactions {may follow} mass-action kinetics, while others in the\nsame network follow different rate laws, such as quotient rate laws. An example\nof such complexity is evident in a mathematical model of the insulin signaling\npathway in type 2 diabetes. To compute its positive {steady states}, we adapt\nour existing network decomposition approach, originally designed for\nmass-action kinetics, to handle networks with non-mass-action kinetics. This\napproach involves breaking down a given network into smaller, independent\nsubnetworks to derive the positive steady states of each subnetwork separately.\nThese individual steady states are then combined to obtain the positive steady\nstates of the entire network. This strategy makes computations more manageable\nfor complex and large networks. More importantly, this method could separate\nreactions with purely mass-action kinetics into certain subnetworks from those\nthat follow different rate laws. We also present an illustrative example that\nprovides insights into methods for transforming networks with mixed kinetics\ninto their associated mass-action systems.\n', 'Global stability of first order endotactic reaction systems Reaction networks are a general framework widely used in modelling diverse\nphenomena in different science disciplines. The dynamical process of a reaction\nnetwork endowed with mass-action kinetics is a mass-action system. In this\npaper we study dynamics of first order mass-action systems. We prove that every\nfirst order endotactic mass-action system has a weakly reversible deficiency\nzero realization, and has a unique equilibrium which is exponentially globally\nasymptotically stable (and is positive) in each (positive) stoichiometric\ncompatibility class. In particular, we prove that global attractivity\nconjecture holds for every linear complex balanced mass-action system. In this\nway, we exclude the possibility of first order endotactic mass-action systems\nto admit multistationarity or multistability. The result indicates that the\nimportance of binding molecules in reactants is crucial for (endotactic)\nreaction networks to have complicated dynamics like limit cycles. The proof\nrelies on the fact that $\\mathcal{A}$-endotacticity of first order reaction\nnetworks implies endotacticity for a finite set $\\mathcal{A}$, which is also\nproved in this paper.\n Out of independent interest, we provide a sufficient condition for\nendotacticity of reaction networks which are not necessarily of first order.\n']","[('reaction network theory', 0.6770608425140381), ('reaction networks', 0.6225848197937012), ('chemical reaction networks', 0.619091808795929), ('reaction network', 0.6124193072319031), ('chemical reaction network', 0.6109707951545715), ('biochemical reaction networks', 0.6011883616447449), ('reaction systems', 0.542107343673706), ('kinetic systems', 0.5287255644798279), ('mass action kinetics', 0.5111426711082458), ('action kinetics', 0.47961410880088806)]" 155,155,178,155_bayesian inverse problems_bayesian inverse_bayesian inversion_statistical inverse problems,"['bayesian inverse problems', 'bayesian inverse', 'bayesian inversion', 'statistical inverse problems', 'nonlinear bayesian', 'nonlinear inverse problems', 'statistical inverse', 'large scale bayesian', 'nonlinear inverse', 'inverse problems partial']","['Optimal design of large-scale nonlinear Bayesian inverse problems under\n model uncertainty We consider optimal experimental design (OED) for Bayesian nonlinear inverse\nproblems governed by partial differential equations (PDEs) under model\nuncertainty. Specifically, we consider inverse problems in which, in addition\nto the inversion parameters, the governing PDEs include secondary uncertain\nparameters. We focus on problems with infinite-dimensional inversion and\nsecondary parameters and present a scalable computational framework for optimal\ndesign of such problems. The proposed approach enables Bayesian inversion and\nOED under uncertainty within a unified framework. We build on the Bayesian\napproximation error (BAE) approach, to incorporate modeling uncertainties in\nthe Bayesian inverse problem, and methods for A-optimal design of\ninfinite-dimensional Bayesian nonlinear inverse problems. Specifically, a\nGaussian approximation to the posterior at the maximum a posteriori probability\npoint is used to define an uncertainty aware OED objective that is tractable to\nevaluate and optimize. In particular, the OED objective can be computed at a\ncost, in the number of PDE solves, that does not grow with the dimension of the\ndiscretized inversion and secondary parameters. The OED problem is formulated\nas a binary bilevel PDE constrained optimization problem and a greedy\nalgorithm, which provides a pragmatic approach, is used to find optimal\ndesigns. We demonstrate the effectiveness of the proposed approach for a model\ninverse problem governed by an elliptic PDE on a three-dimensional domain. Our\ncomputational results also highlight the pitfalls of ignoring modeling\nuncertainties in the OED and/or inference stages.\n', 'Hyper-differential sensitivity analysis for nonlinear Bayesian inverse\n problems We consider hyper-differential sensitivity analysis (HDSA) of nonlinear\nBayesian inverse problems governed by PDEs with infinite-dimensional\nparameters. In previous works, HDSA has been used to assess the sensitivity of\nthe solution of deterministic inverse problems to additional model\nuncertainties and also different types of measurement data. In the present\nwork, we extend HDSA to the class of Bayesian inverse problems governed by\nPDEs. The focus is on assessing the sensitivity of certain key quantities\nderived from the posterior distribution. Specifically, we focus on analyzing\nthe sensitivity of the MAP point and the Bayes risk and make full use of the\ninformation embedded in the Bayesian inverse problem. After establishing our\nmathematical framework for HDSA of Bayesian inverse problems, we present a\ndetailed computational approach for computing the proposed HDSA indices. We\nexamine the effectiveness of the proposed approach on a model inverse problem\ngoverned by a PDE for heat conduction.\n', 'Non-intrusive optimal experimental design for large-scale nonlinear\n Bayesian inverse problems using a Bayesian approximation error approach We consider optimal experimental design (OED) for nonlinear inverse problems\nwithin the Bayesian framework. Optimizing the data acquisition process for\nlarge-scale nonlinear Bayesian inverse problems is a computationally\nchallenging task since the posterior is typically intractable and\ncommonly-encountered optimality criteria depend on the observed data. Since\nthese challenges are not present in OED for linear Bayesian inverse problems,\nwe propose an approach based on first linearizing the associated forward\nproblem and then optimizing the experimental design. Replacing an accurate but\ncostly model with some linear surrogate, while justified for certain problems,\ncan lead to incorrect posteriors and sub-optimal designs if model discrepancy\nis ignored. To avoid this, we use the Bayesian approximation error (BAE)\napproach to formulate an A-optimal design objective for sensor selection that\nis aware of the model error. In line with recent developments, we prove that\nthis uncertainty-aware objective is independent of the exact choice of\nlinearization. This key observation facilitates the formulation of an\nuncertainty-aware OED objective function using a completely trivial linear map,\nthe zero map, as a surrogate to the forward dynamics. The base methodology is\nalso extended to marginalized OED problems, accommodating uncertainties arising\nfrom both linear approximations and unknown auxiliary parameters. Our approach\nonly requires parameter and data sample pairs, hence it is particularly\nwell-suited for black box forward models. We demonstrate the effectiveness of\nour method for finding optimal designs in an idealized subsurface flow inverse\nproblem and for tsunami detection.\n']","[('bayesian inverse problems', 0.7436306476593018), ('bayesian inverse', 0.6929126977920532), ('bayesian inversion', 0.6380840539932251), ('statistical inverse problems', 0.5587443113327026), ('nonlinear bayesian', 0.5294186472892761), ('nonlinear inverse problems', 0.5147368311882019), ('statistical inverse', 0.5096768736839294), ('large scale bayesian', 0.47619983553886414), ('nonlinear inverse', 0.46806690096855164), ('inverse problems partial', 0.45156756043434143)]" 156,156,176,156_abelian varieties_abelian varieties mathbb_ordinary abelian varieties_polarized abelian varieties,"['abelian varieties', 'abelian varieties mathbb', 'ordinary abelian varieties', 'polarized abelian varieties', 'abelian varieties defined', 'groups abelian varieties', 'abelian variety', 'dimensional abelian varieties', 'ordinary abelian variety', 'varieties finite fields']","[""The Tate Conjecture for Certain Abelian Varieties over Finite Fields Tate's theorem (Invent. Math. 1966)implies that the Tate conjecture holds for\nany abelian variety over a finite field whose Q_l-algebra of Tate classes is\ngenerated by those of degree 1. We construct families of abelian varieties over\nfinite fields for which this condition fails, but for which we are nevertheless\nable to prove the Tate conjecture.\n"", 'Categories of abelian varieties over finite fields II: Abelian varieties\n over finite fields and Morita equivalence The category of abelian varieties over $\\mathbb{F}_q$ is shown to be\nanti-equivalent to a category of $\\mathbb{Z}$-lattices that are modules for a\nnon-commutative pro-ring of endomorphisms of a suitably chosen direct system of\nabelian varieties over $\\mathbb{F}_q$. On full subcategories cut out by a\nfinite set $w$ of conjugacy classes of Weil $q$-numbers, the anti-equivalence\nis represented by what we call $w$-locally projective abelian varieties.\n', 'Isogenies of certain abelian varieties over finite fields with p-ranks\n zero We study the isogenies of certain abelian varieties over finite fields with\nnon-commutative endomorphism algebras with a view to potential use in\nisogeny-based cryptography. In particular, we show that any two such abelian\nvarieties with endomorphism rings maximal orders in the endomorphism algebra\nare linked by a cyclic isogeny of prime degree.\n']","[('abelian varieties', 0.7702721953392029), ('abelian varieties mathbb', 0.7372089624404907), ('ordinary abelian varieties', 0.7321255803108215), ('polarized abelian varieties', 0.7221680879592896), ('abelian varieties defined', 0.7199863791465759), ('groups abelian varieties', 0.7187954783439636), ('abelian variety', 0.7098590135574341), ('dimensional abelian varieties', 0.7000895738601685), ('ordinary abelian variety', 0.677660346031189), ('varieties finite fields', 0.6710683703422546)]" 157,157,175,157_liouville quantum gravity_quantum gravity lqg_liouville conformal_liouville conformal field,"['liouville quantum gravity', 'quantum gravity lqg', 'liouville conformal', 'liouville conformal field', 'liouville quantum', 'quantum gravity', 'random surfaces', 'sle curves', 'conformal', 'via conformal']","['Uniqueness of the welding problem for SLE and Liouville quantum gravity We give a simple set of geometric conditions on curves $\\eta$, $\\tilde{\\eta}$\nin ${\\mathbf H}$ from $0$ to $\\infty$ so that if $\\varphi \\colon {\\mathbf H}\n\\to {\\mathbf H}$ is a homeomorphism which is conformal off $\\eta$ with\n$\\varphi(\\eta) = \\tilde{\\eta}$ then $\\varphi$ is a conformal automorphism of\n${\\mathbf H}$. Our motivation comes from the fact that it is possible to apply\nour result to random conformal welding problems related to the Schramm-Loewner\nevolution (SLE) and Liouville quantum gravity (LQG). In particular, we show\nthat if $\\eta$ is a non-space-filling SLE$_\\kappa$ curve in ${\\mathbf H}$ from\n$0$ to $\\infty$ and $\\varphi$ is a homeomorphism which is conformal on\n${\\mathbf H} \\setminus \\eta$ and $\\varphi(\\eta)$, $\\eta$ are equal in\ndistribution then $\\varphi$ is a conformal automorphism of ${\\mathbf H}$.\nApplying this result for $\\kappa=4$ establishes that the welding operation for\ncritical ($\\gamma=2$) Liouville quantum gravity (LQG) is well-defined. Applying\nit for $\\kappa \\in (4,8)$ gives a new proof that the welding of two independent\n$\\kappa/4$-stable looptrees of quantum disks to produce an SLE$_\\kappa$ on top\nof an independent $4/\\sqrt{\\kappa}$-LQG surface is well-defined.\n', 'Radial conformal welding in Liouville quantum gravity The seminal work of Sheffield showed that when random surfaces called\nLiouville quantum gravity (LQG) are conformally welded, the resulting interface\nis Schramm-Loewner evolution (SLE). This has been proved for a variety of\nconfigurations, and has applications to the scaling limits of random planar\nmaps and the solvability of SLE and Liouville conformal field theory. We extend\nthe theory to the setting where two sides of a canonical three-pointed LQG\nsurface are conformally welded together, resulting in a radial SLE curve which\ncan be described by imaginary geometry.\n', 'Cutting $\\gamma$-Liouville quantum gravity by Schramm-Loewner evolution\n for $\\kappa \\not\\in \\{\\gamma^2, 16/\\gamma^2\\}$ There are many deep and useful theorems relating Schramm-Loewner evolution\n(SLE$_\\kappa$) and Liouville quantum gravity ($\\gamma$-LQG) in the case when\nthe parameters satisfy $\\kappa \\in \\{\\gamma^2, 16/\\gamma^2\\}$. Roughly\nspeaking, these theorems say that the SLE$_\\kappa$ curve cuts the $\\gamma$-LQG\nsurface into two or more independent $\\gamma$-LQG surfaces. We extend these\ntheorems to the case when $\\kappa \\not\\in \\{\\gamma^2, 16/\\gamma^2\\}$. Roughly\nspeaking we show that if we have an appropriate variant of SLE$_\\kappa$ and an\nindependent $\\gamma$-LQG disk, then the SLE curve cuts the LQG disk into two or\nmore $\\gamma$-LQG surfaces which are conditionally independent given the values\nalong the SLE curve of a certain collection of auxiliary imaginary geometry\nfields, viewed modulo conformal coordinate change. These fields are sampled\nindependently from the SLE and the LQG and have the property that that the sum\nof the central charges associated with the SLE$_\\kappa$ curve, the $\\gamma$-LQG\nsurface, and the auxiliary fields is 26. This condition on the central charge\nis natural from the perspective of bosonic string theory. We also prove\nanalogous statements when the SLE curve is replaced by, e.g., an LQG metric\nball or a Brownian motion path. Statements of this type were conjectured by\nSheffield and are continuum analogs of certain Markov properties of random\nplanar maps decorated by two or more statistical physics models. We include a\nsubstantial list of open problems.\n']","[('liouville quantum gravity', 0.5535640120506287), ('quantum gravity lqg', 0.5311325788497925), ('liouville conformal', 0.5048843026161194), ('liouville conformal field', 0.4766657054424286), ('liouville quantum', 0.4733099639415741), ('quantum gravity', 0.43915680050849915), ('random surfaces', 0.4072670340538025), ('sle curves', 0.40712010860443115), ('conformal', 0.4028014540672302), ('via conformal', 0.400940477848053)]" 158,158,174,158_bifurcation limit_limit cycles_bifurcations_bifurcation,"['bifurcation limit', 'limit cycles', 'bifurcations', 'bifurcation', 'limit cycle', 'zero hopf bifurcation', 'hopf bifurcation', 'systems limit', 'bifurcate', 'polynomial systems']","['Limit cycles of piecewise smooth differential systems with nilpotent\n center and linear saddle In this paper, we study the number of limit cycles of a piecewise smooth\ndifferential system separated by one or two parallel straight lines or rays\nformed by a nilpotent center or degenerate center and linear saddle. Piecewise\nlinear differential systems separated by one or two parallel straight lines\nwith one of the subsystems of type nilpotent center and other subsystems of\ntype linear saddle can have at most two limit cycles and there are systems in\nthese classes having one limit cycle. The limit cycle in particular consists of\nsaddle separatrices of the subsystem.\n', 'Limit cycles appearing from the perturbation of differential systems\n with multiple switching curves This paper deals with the problem of limit cycle bifurcations for a piecewise\nnear-Hamilton system with four regions separated by algebraic curves $y=\\pm\nx^2$. By analyzing the obtained first order Melnikov function, we give an upper\nbound of the number of limit cycles which bifurcate from the period annulus\naround the origin under $n$-th degree polynomial perturbations. In the case\n$n=1$, we obtain that at least 4 (resp. 3) limit cycles can bifurcate from the\nperiod annulus if the switching curves are $y=\\pm x^2$ (resp. $y=x^2$ or\n$y=-x^2$). The results also show that the number of switching curves affects\nthe number of limit cycles.\n', 'On the number of limit cycles for Bogdanov-Takens system under\n perturbations of piecewise smooth polynomials In this paper, we study the bifurcate of limit cycles for Bogdanov-Takens\nsystem($\\dot{x}=y$, $\\dot{y}=-x+x^{2}$) under perturbations of piecewise smooth\npolynomials of degree $2$ and $n$ respectively. We bound the number of zeros of\nfirst order Melnikov function which controls the number of limit cycles\nbifurcating from the center. It is proved that the upper bounds of the number\nof limit cycles with switching curve $x=y^{2m}$($m$ is a positive integral) are\n$(39m+36)n+77m+21(m\\geq 2)$ and $50n+52(m=1)$ (taking into account the\nmultiplicity). The upper bounds number of limit cycles with switching lines\n$x=0$ and $y=0$ are 11 (taking into account the multiplicity) and it can be\nreached.\n']","[('bifurcation limit', 0.6433734893798828), ('limit cycles', 0.5862330794334412), ('bifurcations', 0.5670191049575806), ('bifurcation', 0.5374869108200073), ('limit cycle', 0.5305013656616211), ('zero hopf bifurcation', 0.4931919574737549), ('hopf bifurcation', 0.4757435619831085), ('systems limit', 0.4076173007488251), ('bifurcate', 0.40718457102775574), ('polynomial systems', 0.4000158905982971)]" 159,159,173,159_galton watson branching_branching processes_galton watson processes_watson branching process,"['galton watson branching', 'branching processes', 'galton watson processes', 'watson branching process', 'state branching processes', 'branching processes immigration', 'branching processes random', 'galton watson process', 'branching process', 'watson branching']","['Asymptotic behaviour of critical decomposable 2-type Galton-Watson\n processes with immigration In this paper the asymptotic behaviour of a critical 2-type Galton-Watson\nprocess with immigration is described when its offspring mean matrix is\nreducible, in other words, when the process is decomposable. It is proved that,\nunder second or fourth order moment assumptions on the offspring and\nimmigration distributions, a sequence of appropriately scaled random step\nprocesses formed from a critical decomposable 2-type Galton-Watson process with\nimmigration converges weakly. The limit process can be described using one or\ntwo independent squared Bessel processes and possibly the unique stationary\ndistribution of an appropriate single-type subcritical Galton-Watson process\nwith immigration. Our results complete and extend the results of Foster and Ney\n(1978) for some strongly critical decomposable 2-type Galton-Watson processes\nwith immigration.\n', ""Galton-Watson processes and their role as building blocks for branching\n processes This article is an essay, both expository and argumentative, on the\nGalton-Watson process as a tool in the domain of Branching Processes. It is at\nthe same time the author's ways to honour two distinguished scientists in this\ndomain, both from the Russian Academy of Science, and to congratulate them for\ntheir special birthdays coming up very soon. The thread of the article is the\nrole, which the Galton-Watson process had played in the author's own research.\nWe start with an article on a controlled Galton-Watson process. Then we pass to\nrandom absorbing processes, and also recall and discuss a problem in medicine.\nFurther questions will bring us via the Borel-Cantelli Lemma to\n$\\varphi$-branching processes and extensions. To gain more generality, we then\nlook at bisexual Galton-Watson processes. Finally we briefly discuss relatively\ncomplicated resource dependent branching processes to show that, here again,\nusing Galton-Watson reproduction schemes (whenever reasonable) can be a\nconvincing approach to new processes which are then sufficiently tractable to\nobtain results of interest.\n Keywords: Controlled branching process; $\\varphi$-branching process, Bisexual\nreproduction, Borel-Cantelli Lemma; Resource dependence; Society forms,\nStopping times, Theorem of envelopment, BRS-inequality.\n"", 'On tail behaviour of stationary second-order Galton-Watson processes\n with immigration A second-order Galton-Watson process with immigration can be represented as a\ncoordinate process of a 2-type Galton-Watson process with immigration.\nSufficient conditions are derived on the offspring and immigration\ndistributions of a second-order Galton-Watson process with immigration under\nwhich the corresponding 2-type Galton-Watson process with immigration has a\nunique stationary distribution such that its common marginals are regularly\nvarying. In the course of the proof sufficient conditions are given under which\nthe distribution of a second-order Galton-Watson process (without immigration)\nat any fixed time is regularly varying provided that the initial sizes of the\npopulation are independent and regularly varying.\n']","[('galton watson branching', 0.6675693988800049), ('branching processes', 0.6585055589675903), ('galton watson processes', 0.6525123715400696), ('watson branching process', 0.6416667699813843), ('state branching processes', 0.6255120038986206), ('branching processes immigration', 0.6235400438308716), ('branching processes random', 0.6163804531097412), ('galton watson process', 0.6100903749465942), ('branching process', 0.5937008857727051), ('watson branching', 0.586607038974762)]" 160,160,172,160_braid groups_braid group_artin braid group_strand braid,"['braid groups', 'braid group', 'artin braid group', 'strand braid', 'braids', 'braid', 'pure braid', 'braid monoid', 'knot groups', 'artin braid']","['Homomorphisms between braid groups We give a complete classification of homomorphisms from the braid group on\n$n$ strands to the braid group on $2n$ strands when $n$ is at least 5. We also\nclassify endomorphisms of the braid group on 4 strands, as well as\nhomomorphisms from the commutator subgroup of the braid group on $n$ strands to\nthe braid group on $2n-5$ strands. Our classifications suggest a recursive\nclassification of homomorphisms between any braid groups. We also give a\nsimple, geometric proof of a theorem of Lin that highly constrains the\nholomorphic maps that may exist between spaces of monic, square-free\npolynomials of two given degrees.\n', 'Characteristic subgroups and the R$_\\infty$-property for virtual braid\n groups Let $n\\geq 2$. Let $VB_n$ (resp. $VP_n$) denote the virtual braid group\n(resp. virtual pure braid group), let $WB_n$ (resp. $WP_n$) denote the welded\nbraid group (resp. welded pure braid group) and let $UVB_n$ (resp. $UVP_n$)\ndenote the unrestricted virtual braid group (resp. unrestricted virtual pure\nbraid group). In the first part of this paper we prove that, for $n\\geq 4$, the\ngroup $VP_n$ and for $n\\geq 3$ the groups $WP_n$ and $UVP_n$ are characteristic\nsubgroups of $VB_n$, $WB_n$ and $UVB_n$, respectively. In the second part of\nthe paper we show that, for $n\\geq 2$, the virtual braid group $VB_n$, the\nunrestricted virtual pure braid group $UVP_n$, and the unrestricted virtual\nbraid group $UVB_n$ have the R$_\\infty$-property. As a consequence of the\ntechnique used for few strings we also prove that, for $n=2,3,4$, the welded\nbraid group $WB_n$ has the R$_\\infty$-property and that for $n=2$ the\ncorresponding pure braid groups have the R$_\\infty$-property. On the other hand\nfor $n\\geq 3$ it is unknown if the R$_\\infty$-property holds or not for the\nvirtual pure braid group $VP_n$ and the welded pure braid group $WP_n$.\n', 'The braid group injects in the virtual braid group The virtual braid groups are generalizations of the classical braid groups.\nThis paper gives an elementary proof that the classical braid group injects\ninto the virtual braid group over the same number of strands.\n']","[('braid groups', 0.7950873970985413), ('braid group', 0.7405962347984314), ('artin braid group', 0.6794162392616272), ('strand braid', 0.5906113982200623), ('braids', 0.589880108833313), ('braid', 0.5736347436904907), ('pure braid', 0.563644289970398), ('braid monoid', 0.538232147693634), ('knot groups', 0.5322605967521667), ('artin braid', 0.526665210723877)]" 161,161,172,161_mappings metric spaces_fixed point theorems_fixed point generalized_existence fixed points,"['mappings metric spaces', 'fixed point theorems', 'fixed point generalized', 'existence fixed points', 'spaces fixed point', 'contraction mappings', 'mappings metric', 'contractive mappings', 'mapping metric', 'fixed point theory']","['New directions in fixed point theory in $G$-metric spaces and\n applications to mappings contracting perimeters of triangles We are concerned with the study of fixed points for mappings $T: X\\to X$,\nwhere $(X,G)$ is a $G$-metric space in the sense of Mustafa and Sims. After the\npublication of the paper [Journal of Nonlinear and Convex Analysis. 7(2) (2006)\n289--297] by Mustafa and Sims, a great interest was devoted to the study of\nfixed points in $G$-metric spaces. In 2012, the first and third authors\nobserved that several fixed point theorems established in $G$-metric spaces are\nimmediate consequences of known fixed point theorems in standard metric spaces.\nThis observation demotivated the investigation of fixed points in $G$-metric\nspaces. In this paper, we open new directions in fixed point theory in\n$G$-metric spaces. Namely, we establish new versions of the Banach, Kannan and\nReich fixed point theorems in $G$-metric spaces. We point out that the approach\nused by the first and third authors [Fixed Point Theory Appl. 2012 (2012) 1--7]\nis inapplicable in the present study. We also provide some interesting\napplications related to mappings contracting perimeters of triangles.\n', 'Fixed point results for multipoint Kannan-type mappings We introduce and study a new type of mappings in metric spaces termed\n$n$-point Kannan-type mappings. A fixed-point theorem is proved for these\nmappings. In general case such mappings are discontinuous in the domain but\nnecessarily continuous at fixed points. Conditions under which usual Kannan\nmappings and mapping contracting the total pairwise distances between $n$\npoints are $n$-point Kannan-type mappings are found. It is shown that\nadditional conditions of asymptotic regularity and continuity allow to extend\nthe value of the contraction coefficient in fixed-point theorems for $n$-point\nKannan-type mappings.\n', 'Fixed point theorem for generalized Kannan type mappings We introduce a new type of mappings in metric spaces which are three-point\nanalogue of the well-known Kannan type mappings and call them generalized\nKannan type mappings. It is shown that in general case such mappings are\ndiscontinuous but continuous at fixed points as well as Kannan type mappings\nand that these two classes of mappings are independent. The fixed-point theorem\nfor generalized Kannan type mappings is proved. Additional conditions of\nasymptotic regularity and continuity allow us to extent the class of mappings\nfor which the fixed-point theorems hold. Following Kannan, we also obtain two\nother fixed-point theorems for generalized Kannan type mappings in metric\nspaces which are not obligatory complete.\n']","[('mappings metric spaces', 0.6647870540618896), ('fixed point theorems', 0.6355462074279785), ('fixed point generalized', 0.6272403001785278), ('existence fixed points', 0.6262998580932617), ('spaces fixed point', 0.6194776892662048), ('contraction mappings', 0.6144412755966187), ('mappings metric', 0.608924150466919), ('contractive mappings', 0.5776727199554443), ('mapping metric', 0.5740983486175537), ('fixed point theory', 0.5725624561309814)]" 162,162,171,162_dynamic mode decomposition_koopman operator based_based koopman operator_mode decomposition,"['dynamic mode decomposition', 'koopman operator based', 'based koopman operator', 'mode decomposition', 'koopman operator theory', 'systems koopman operator', 'mode decomposition dmd', 'koopman operators', 'koopman operator', 'koopman eigenfunctions']","[""Invariant Consistent Dynamic Mode Decomposition Any deterministic autonomous dynamical system may be globally linearized by\nits' Koopman operator. This object is typically infinite-dimensional and can be\napproximated by the so-called Dynamic Mode Decomposition (DMD). In DMD, the\ncentral idea is to preserve a fundamental property of the Koopman operator:\nlinearity. This work augments DMD by preserving additional properties like\nfunctional relationships between observables and consistency along geometric\ninvariants. The first set of constraints provides a framework for understanding\nDMD variants like Higher-order DMD and Affine DMD. The latter set guarantees\nthe estimation of Koopman eigen-functions with eigen-value 1, whose level sets\nare known to delineate invariant sets. These benefits are realized with only a\nminimal increase in computational cost, primarily due to the linearity of\nconstraints.\n"", 'The kernel perspective on dynamic mode decomposition This manuscript revisits theoretical assumptions concerning dynamic mode\ndecomposition (DMD) of Koopman operators, including the existence of lattices\nof eigenfunctions, common eigenfunctions between Koopman operators, and\nboundedness and compactness of Koopman operators. Counterexamples that\nillustrate restrictiveness of the assumptions are provided for each of the\nassumptions. In particular, this manuscript proves that the native reproducing\nkernel Hilbert space (RKHS) of the Gaussian RBF kernel function only supports\nbounded Koopman operators if the dynamics are affine. In addition, a new\nframework for DMD, that requires only densely defined Koopman operators over\nRKHSs is introduced, and its effectiveness is demonstrated through numerical\nexamples.\n', 'A concise introduction to Koopman operator theory and the Extended\n Dynamic Mode Decomposition The framework of Koopman operator theory is discussed along with its\nconnections to Dynamic Mode Decomposition (DMD) and (Kernel) Extended Dynamic\nMode Decomposition (EDMD). This paper provides a succinct overview with\nconsistent notation. The authors hope to provide an exposition that more\nnaturally emphasizes the connections between theory and algorithms which may\nresult in a sense of clarity on the subject.\n']","[('dynamic mode decomposition', 0.7435837984085083), ('koopman operator based', 0.658954918384552), ('based koopman operator', 0.6513270735740662), ('mode decomposition', 0.6494140625), ('koopman operator theory', 0.6374648213386536), ('systems koopman operator', 0.6280875205993652), ('mode decomposition dmd', 0.6209798455238342), ('koopman operators', 0.6200594305992126), ('koopman operator', 0.6058586239814758), ('koopman eigenfunctions', 0.5293915867805481)]" 163,163,169,163_decoder polar codes_polar code construction_polar codes based_decoder polar,"['decoder polar codes', 'polar code construction', 'polar codes based', 'decoder polar', 'codes polar codes', 'polar codes', 'polar code', 'codes polar', 'successive cancellation decoding', 'scl decoding']","['Row-Merged Polar Codes: Analysis, Design and Decoder Implementation Row-merged polar codes are a family of pre-transformed polar codes (PTPCs)\nwith little precoding overhead. Providing an improved distance spectrum over\nplain polar codes, they are capable to perform close to the finite-length\ncapacity bounds. However, there is still a lack of efficient design procedures\nfor row-merged polar codes. Using novel weight enumeration algorithms with low\ncomputational complexity, we propose a design methodology for row-merged polar\ncodes that directly considers their minimum distance properties. The codes\nsignificantly outperform state-of-the-art cyclic redundancy check (CRC)-aided\npolar codes under successive cancellation list (SCL) decoding in\nerror-correction performance. Furthermore, we present fast simplified\nsuccessive cancellation list (Fast-SSCL) decoding of PTPCs, based on which we\nderive a high-throughput, unrolled architecture template for fully pipelined\ndecoders. Implementation results of SCL decoders for row-merged polar codes in\na 12 nm technology additionally demonstrate the superiority of these codes with\nrespect to the implementation costs, compared to state-of-the-art reference\ndecoder implementations.\n', 'Simplified Successive Cancellation List Decoding of PAC Codes Polar codes are the first class of structured channel codes that achieve the\nsymmetric capacity of binary channels with efficient encoding and decoding. In\n2019, Arikan proposed a new polar coding scheme referred to as\npolarization-adjusted convolutional (PAC)} codes. In contrast to polar codes,\nPAC codes precode the information word using a convolutional code prior to\npolar encoding. This results in material coding gain over polar code under Fano\nsequential decoding as well as successive cancellation list (SCL) decoding.\nGiven the advantages of SCL decoding over Fano decoding in certain scenarios\nsuch as low-SNR regime or where a constraint on the worst case decoding latency\nexists, in this paper, we focus on SCL decoding and present a simplified SCL\n(SSCL) decoding algorithm for PAC codes. SSCL decoding of PAC codes reduces the\ndecoding latency by identifying special nodes in the decoding tree and\nprocessing them at the intermediate stages of the graph. Our simulation results\nshow that the performance of PAC codes under SSCL decoding is almost similar to\nthe SCL decoding while having lower decoding latency.\n', 'Successive Cancellation Automorphism List Decoding of Polar Codes The discovery of suitable automorphisms of polar codes gained a lot of\nattention by applying them in Automorphism Ensemble Decoding (AED) to improve\nthe error-correction performance, especially for short block lengths. This\npaper introduces Successive Cancellation Automorphism List (SCAL) decoding of\npolar codes as a novel application of automorphisms in advanced Successive\nCancellation List (SCL) decoding. Initialized with L permutations sampled from\nthe automorphism group, a superposition of different noise realizations and\npath splitting takes place inside the decoder. In this way, the SCAL decoder\nautomatically adapts to the channel conditions and outperforms the\nerror-correction performance of conventional SCL decoding and AED. For a polar\ncode of length 128, SCAL performs near Maximum Likelihood (ML) decoding with\nL=8, in contrast to M=16 needed decoder cores in AED. Application-Specific\nIntegrated Circuit (ASIC) implementations in a 12 nm technology show that\nhigh-throughput, pipelined SCAL decoders outperform AED in terms of energy\nefficiency and power density, and SCL decoders additionally in area efficiency.\n']","[('decoder polar codes', 0.6968479156494141), ('polar code construction', 0.6283882260322571), ('polar codes based', 0.6228757500648499), ('decoder polar', 0.617719829082489), ('codes polar codes', 0.6092422008514404), ('polar codes', 0.6077226996421814), ('polar code', 0.5921953320503235), ('codes polar', 0.5817708969116211), ('successive cancellation decoding', 0.5515181422233582), ('scl decoding', 0.5430305004119873)]" 164,164,169,164_monomial ideals_monomial ideals let_monomial ideal_graded ideals,"['monomial ideals', 'monomial ideals let', 'monomial ideal', 'graded ideals', 'graded ideal', 'type ideals', 'ideals polynomial', 'ideals generated', 'ideal polynomial ring', 'ideals whose']","['On the copersistence property and nearly copersistence property of\n monomial ideals In this paper we investigate the monomial ideals which satisfy the\ncopersistence property or nearly copersistence property.\n', 'Simplicial Resolutions of Powers of Square-free Monomial Ideals The Taylor resolution is almost never minimal for powers of monomial ideals,\neven in the square-free case. In this paper we introduce a smaller resolution\nfor each power of any square-free monomial ideal, which depends only on the\nnumber of generators of the ideal. More precisely, for every pair of fixed\nintegers $r$ and $q$, we construct a simplicial complex that supports a free\nresolution of the $r$-th power of any square-free monomial ideal with $q$\ngenerators. The resulting resolution is significantly smaller than the Taylor\nresolution, and is minimal for special cases. Considering the relations on the\ngenerators of a fixed ideal allows us to further shrink these resolutions. We\nalso introduce a class of ideals called ""extremal ideals"", and show that the\nBetti numbers of powers of all square-free monomial ideals are bounded by Betti\nnumbers of powers of extremal ideals. Our results lead to upper bounds on Betti\nnumbers of powers of any square-free monomial ideal that greatly improve the\nbinomial bounds offered by the Taylor resolution.\n', 'Powers of Principal $Q$-Borel ideals Fix a poset $Q$ on $\\{x_1,\\ldots,x_n\\}$. A $Q$-Borel monomial ideal $I\n\\subseteq \\mathbb{K}[x_1,\\ldots,x_n]$ is a monomial ideal whose monomials are\nclosed under the Borel-like moves induced by $Q$. A monomial ideal $I$ is a\nprincipal $Q$-Borel ideal, denoted $I=Q(m)$, if there is a monomial $m$ such\nthat all the minimal generators of $I$ can be obtained via $Q$-Borel moves from\n$m$. In this paper we study powers of principal $Q$-Borel ideals. Among our\nresults, we show that all powers of $Q(m)$ agree with their symbolic powers,\nand that the ideal $Q(m)$ satisfies the persistence property for associated\nprimes. We also compute the analytic spread of $Q(m)$ in terms of the poset\n$Q$.\n']","[('monomial ideals', 0.7982827425003052), ('monomial ideals let', 0.7503976225852966), ('monomial ideal', 0.7490582466125488), ('graded ideals', 0.6292816400527954), ('graded ideal', 0.5613270401954651), ('type ideals', 0.5608906149864197), ('ideals polynomial', 0.5596798658370972), ('ideals generated', 0.5499230623245239), ('ideal polynomial ring', 0.5393364429473877), ('ideals whose', 0.5311498045921326)]" 165,165,167,165_constellation shaping_optical communications_coded modulation_optical communication,"['constellation shaping', 'optical communications', 'coded modulation', 'optical communication', 'modulation formats', 'probabilistic shaping', 'optical wireless communication', 'intensity modulation', 'modulation direct detection', 'intensity modulation direct']","['On the Performance of Multidimensional Constellation Shaping for Linear\n and Nonlinear Optical Fiber Channel Multidimensional constellation shaping of up to 32 dimensions with different\nspectral efficiencies are compared through AWGN and fiber-optic simulations.\nThe results show that no constellation is universal and the balance of required\nand effective SNRs should be jointly considered for the specific optical\ntransmission scenario.\n', 'Sequence-Selection-Based Constellation Shaping for Nonlinear Channels Probabilistic shaping is a pragmatic approach to improve the performance of\ncoherent optical fiber communication systems. In the nonlinear regime, the\nadvantages offered by probabilistic shaping might increase thanks to the\nopportunity to obtain an additional nonlinear shaping gain. Unfortunately, the\noptimization of conventional shaping techniques, such as probabilistic\namplitude shaping (PAS), yields a relevant nonlinear shaping gain only in\nscenarios of limited practical interest. In this manuscript we use sequence\nselection to investigate the potential, opportunities, and challenges offered\nby probabilistic shaping for nonlinear channels. First, we show that ideal\nsequence selection is able to provide up to 0.13 bit/s/Hz gain with respect to\nPAS with an optimized blocklength. However, this additional gain is obtained\nonly if the selection metric accounts for the signs of the symbols: they must\nbe known to compute the selection metric, but there is no need to shape them.\nFurthermore, we show that the selection depends in a non-critical way on the\nsymbol rate and link length: the sequences selected for a certain scenario\nstill provide a relevant gain if these are modified. Then, we analyze and\ncompare several practical implementations of sequence selection by taking into\naccount interaction with forward error correction (FEC) and complexity.\nOverall, the single block and the multi block FEC-independent bit scrambling\nare the best options, with a gain up to 0.08 bit/s/Hz. The main challenge and\nlimitation to their practical implementation remains the evaluation of the\nmetric, whose complexity is currently too high. Finally, we show that the\nnonlinear shaping gain provided by sequence selection persists when carrier\nphase recovery is included.\n', 'Probabilistically Shaped 4-PAM for Short-Reach IM/DD Links with a Peak\n Power Constraint Probabilistic shaping for intensity modulation and direct detection (IM/DD)\nlinks is discussed and a peak power constraint determined by the limited\nmodulation extinction ratio (ER) of optical modulators is introduced. The input\ndistribution of 4-ary unipolar pulse amplitude modulation (PAM) symbols is\noptimized for short-reach transmission links without optical amplification nor\nin-line dispersion compensation. The resulting distribution is symmetric around\nits mean allowing to use probabilistic amplitude shaping (PAS) to generate\nsymbols that are protected by forward error correction (FEC) and that have the\noptimal input distribution. The numerical analysis is confirmed experimentally\nfor both an additive white Gaussian noise (AWGN) channel and a fiber channel,\nshowing gains in transmission reach and transmission rate, as well as rate\nadaptability.\n']","[('constellation shaping', 0.5586516261100769), ('optical communications', 0.5421646237373352), ('coded modulation', 0.4977280795574188), ('optical communication', 0.4918655455112457), ('modulation formats', 0.4917620122432709), ('probabilistic shaping', 0.48004239797592163), ('optical wireless communication', 0.4678390920162201), ('intensity modulation', 0.45748427510261536), ('modulation direct detection', 0.45307156443595886), ('intensity modulation direct', 0.4513396918773651)]" 166,166,165,166_deep reinforcement learning_reinforcement learning drl_deep network dqn_multi agent deep,"['deep reinforcement learning', 'reinforcement learning drl', 'deep network dqn', 'multi agent deep', 'radio resource management', 'agent reinforcement learning', 'network dqn', 'deep reinforcement', 'reinforcement learning', 'resource allocation']","['Deep Reinforcement Learning Based Multidimensional Resource Management\n for Energy Harvesting Cognitive NOMA Communications The combination of energy harvesting (EH), cognitive radio (CR), and\nnon-orthogonal multiple access (NOMA) is a promising solution to improve energy\nefficiency and spectral efficiency of the upcoming beyond fifth generation\nnetwork (B5G), especially for support the wireless sensor communications in\nInternet of things (IoT) system. However, how to realize intelligent frequency,\ntime, and energy resource allocation to support better performances is an\nimportant problem to be solved. In this paper, we study joint spectrum, energy,\nand time resource management for the EH-CR-NOMA IoT systems. Our goal is to\nminimize the number of data packets losses for all secondary sensing users\n(SSU), while satisfying the constraints on the maximum charging battery\ncapacity, maximum transmitting power, maximum buffer capacity, and minimum data\nrate of primary users (PU) and SSUs. Due to the non-convexity of this\noptimization problem and the stochastic nature of the wireless environment, we\npropose a distributed multidimensional resource management algorithm based on\ndeep reinforcement learning (DRL). Considering the continuity of the resources\nto be managed, the deep deterministic policy gradient (DDPG) algorithm is\nadopted, based on which each agent (SSU) can manage its own multidimensional\nresources without collaboration. In addition, a simplified but practical action\nadjuster (AA) is introduced for improving the training efficiency and battery\nperformance protection. The provided results show that the convergence speed of\nthe proposed algorithm is about 4 times faster than that of DDPG, and the\naverage number of packet losses (ANPL) is about 8 times lower than that of the\ngreedy algorithm.\n', 'Dynamic Channel Access and Power Control in Wireless Interference\n Networks via Multi-Agent Deep Reinforcement Learning Due to the scarcity in the wireless spectrum and limited energy resources\nespecially in mobile applications, efficient resource allocation strategies are\ncritical in wireless networks. Motivated by the recent advances in deep\nreinforcement learning (DRL), we address multi-agent DRL-based joint dynamic\nchannel access and power control in a wireless interference network. We first\npropose a multi-agent DRL algorithm with centralized training (DRL-CT) to\ntackle the joint resource allocation problem. In this case, the training is\nperformed at the central unit (CU) and after training, the users make\nautonomous decisions on their transmission strategies with only local\ninformation. We demonstrate that with limited information exchange and faster\nconvergence, DRL-CT algorithm can achieve 90% of the performance achieved by\nthe combination of weighted minimum mean square error (WMMSE) algorithm for\npower control and exhaustive search for dynamic channel access. In the second\npart of this paper, we consider distributed multi-agent DRL scenario in which\neach user conducts its own training and makes its decisions individually,\nacting as a DRL agent. Finally, as a compromise between centralized and fully\ndistributed scenarios, we consider federated DRL (FDRL) to approach the\nperformance of DRL-CT with the use of a central unit in training while limiting\nthe information exchange and preserving privacy of the users in the wireless\nsystem. Via simulation results, we show that proposed learning frameworks lead\nto efficient adaptive channel access and power control policies in dynamic\nenvironments.\n', 'Meta-Reinforcement Learning Based Resource Allocation for Dynamic V2X\n Communications This paper studies the allocation of shared resources between\nvehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) links in\nvehicle-to-everything (V2X) communications. In existing algorithms, dynamic\nvehicular environments and quantization of continuous power become the\nbottlenecks for providing an effective and timely resource allocation policy.\nIn this paper, we develop two algorithms to deal with these difficulties.\nFirst, we propose a deep reinforcement learning (DRL)-based resource allocation\nalgorithm to improve the performance of both V2I and V2V links. Specifically,\nthe algorithm uses deep Q-network (DQN) to solve the sub-band assignment and\ndeep deterministic policy-gradient (DDPG) to solve the continuous power\nallocation problem. Second, we propose a meta-based DRL algorithm to enhance\nthe fast adaptability of the resource allocation policy in the dynamic\nenvironment. Numerical results demonstrate that the proposed DRL-based\nalgorithm can significantly improve the performance compared to the DQN-based\nalgorithm that quantizes continuous power. In addition, the proposed meta-based\nDRL algorithm can achieve the required fast adaptation in the new environment\nwith limited experiences.\n']","[('deep reinforcement learning', 0.546940267086029), ('reinforcement learning drl', 0.5117605328559875), ('deep network dqn', 0.483656644821167), ('multi agent deep', 0.44250497221946716), ('radio resource management', 0.4358658790588379), ('agent reinforcement learning', 0.4342656135559082), ('network dqn', 0.43169939517974854), ('deep reinforcement', 0.4256437122821808), ('reinforcement learning', 0.422063410282135), ('resource allocation', 0.40901046991348267)]" 167,167,165,167_superintegrable systems_superintegrability_superintegrable_integrable systems,"['superintegrable systems', 'superintegrability', 'superintegrable', 'integrable systems', 'integrable hamiltonian', 'system integrable', 'hamiltonian systems', 'degenerate second order', 'lagrangian form', 'hamiltonian system']","['Classical Superintegrable Systems in a Magnetic Field that Separate in\n Cartesian Coordinates We consider superintegrability in classical mechanics in the presence of\nmagnetic fields. We focus on three-dimensional systems which are separable in\nCartesian coordinates. We construct all possible minimally and maximally\nsuperintegrable systems in this class with additional integrals quadratic in\nthe momenta. Together with the results of our previous paper [J. Phys. A: Math.\nTheor. 50 (2017), 245202, 24 pages], where one of the additional integrals was\nby assumption linear, we conclude the classification of three-dimensional\nquadratically minimally and maximally superintegrable systems separable in\nCartesian coordinates. We also describe two particular methods for constructing\nsuperintegrable systems with higher-order integrals.\n', 'Abundant Superintegrable Systems and Hessian Structures We show that a large class of non-degenerate second-order (maximally)\nsuperintegrable systems gives rise to Hessian structures, which admit natural\n(Hessian) coordinates adapted to the superintegrable system. In particular,\nabundant superintegrable systems on Riemannian manifolds of constant sectional\ncurvature fall into this class. We explicitly compute the natural Hessian\ncoordinates for examples of non-degenerate second-order superintegrable systems\nin dimensions two and three.\n', 'Algebraic Conditions for Conformal Superintegrability in Arbitrary\n Dimension We show that the definition of a second order superintegrable system on a\n(pseudo-)Riemannian manifold gives rise to a conformally invariant notion of\nsuperintegrability. Conformal equivalence is the natural extension of the\nwell-known St\\""ackel transform, which in turn originates from the classical\nMaupertuis-Jacobi principle. We extend our recently developed algebraic\ngeometric approach for the classification of second order superintegrable\nsystems in arbitrarily high dimension to conformally superintegrable systems,\nwhich are presented via conformal scale choices of second order superintegrable\nsystems defined within a conformal geometry.\n For superintegrable systems on constant curvature spaces, we find that the\nconformal scales of St\\""ackel equivalent systems arise from eigenfunctions of\nthe Laplacian and that their equivalence is characterised by a conformal\ndensity of weight two.\n Our approach yields an algebraic equation that governs the classification\nunder conformal equivalence for a prolific class of second order conformally\nsuperintegrable systems. This class contains all non-degenerate examples known\nto date, and is given by a simple algebraic constraint of degree two on a\ngeneral harmonic cubic form. In this way the yet unsolved classification\nproblem is put into the reach of algebraic geometry and geometric invariant\ntheory. In particular, no obstruction exists in dimension three, and thus the\nknown classification of conformally superintegrable systems is reobtained in\nthe guise of an unrestricted univariate sextic. In higher dimensions, the\nobstruction is new and has never been revealed by traditional approaches.\n']","[('superintegrable systems', 0.7914242148399353), ('superintegrability', 0.612334668636322), ('superintegrable', 0.596089243888855), ('integrable systems', 0.5664674639701843), ('integrable hamiltonian', 0.44306033849716187), ('system integrable', 0.4345724284648895), ('hamiltonian systems', 0.41521817445755005), ('degenerate second order', 0.4059016704559326), ('lagrangian form', 0.35218384861946106), ('hamiltonian system', 0.3466879427433014)]" 168,168,162,168_irs assisted wireless_aided wireless communication_reflecting surface irs_aided wireless,"['irs assisted wireless', 'aided wireless communication', 'reflecting surface irs', 'aided wireless', 'passive beamforming', 'wireless communication', 'passive irs', 'irs reflection', 'intelligent reflecting surface', 'reflecting surface aided']","['Multi-Hop Beam Routing for Hybrid Active/Passive IRS Aided Wireless\n Communications Prior studies on intelligent reflecting surface (IRS) have mostly considered\nwireless communication systems aided by a single passive IRS, which, however,\nhas limited control over wireless propagation environment and suffers from\nproduct-distance path-loss. To address these issues, we propose in this paper a\nnew hybrid active/passive IRS aided wireless communication system, where an\nactive IRS and multiple passive IRSs are deployed to assist the communication\nbetween a base station (BS) and a remote user in complex environment, by\nestablishing a multihop reflection path across active/passive IRSs. In\nparticular, the active IRS enables signal reflection with power amplification,\nthus effectively compensating the severe path-loss in the multi-reflection\npath. To maximize the achievable rate at the user, we first design the optimal\nbeamforming of the BS and selected (active/passive) IRSs for a given\nmulti-reflection path, and then propose an efficient algorithm to obtain the\noptimal multi-reflection path by using the path decomposition method and graph\ntheory. We show that the active IRS should be selected to establish the beam\nrouting path when its amplification power and/or number of active reflecting\nelements are sufficiently large. Last, numerical results demonstrate the\neffectiveness of the proposed hybrid active/passive IRS beam routing design as\ncompared to the benchmark scheme with passive IRSs only.\n', ""Simultaneous Transmit Diversity and Passive Beamforming with Large-Scale\n Intelligent Reflecting Surface: Far-Field or Near-Field? Intelligent reflecting surface (IRS) has emerged as a cost-effective solution\nto enhance wireless communication performance via passive signal reflection.\nExisting works on IRS have mainly focused on investigating IRS's passive\nbeamforming/reflection design to boost the communication rate for users\nassuming that their channel state information (CSI) is fully or partially\nknown. However, how to exploit IRS to improve the wireless transmission\nreliability without any CSI, which is typical in high-mobility/delay-sensitive\ncommunication scenarios, remains largely open. In this paper, we study a new\nIRS-aided communication system with the IRS integrated to its aided access\npoint (AP) to achieve both functions of transmit diversity and passive\nbeamforming simultaneously. Specifically, we first show an interesting result\nthat the IRS's passive beamforming gain in any direction is invariant to the\ncommon phase-shift applied to all of its reflecting elements. Accordingly, we\ndesign the common phase-shift of IRS elements to achieve transmit diversity at\nthe AP side without the need of any CSI of the users. In addition, we propose a\npractical method for the users to estimate the CSI at the receiver side for\ninformation decoding. Meanwhile, we show that the conventional passive\nbeamforming gain of IRS can be retained for the other users with their CSI\nknown at the AP. Furthermore, we derive the asymptotic performance of both\nIRS-aided transmit diversity and passive beamforming in closed-form, by\nconsidering the large-scale IRS with an infinite number of elements. Numerical\nresults validate our analysis and show the performance gains of the proposed\nIRS-aided simultaneous transmit diversity and passive beamforming scheme over\nother benchmark schemes.\n"", ""Wireless Communication Aided by Intelligent Reflecting Surface: Active\n or Passive? In this letter, we consider an intelligent reflecting surface (IRS)-aided\nwireless communication system, where an active or passive IRS is employed to\nassist the communication between an access point and a user. First, we consider\nthe downlink/uplink communication separately and optimize the IRS placement for\nrate maximization with an active or passive IRS. We show that the active IRS\nshould be deployed closer to the receiver with the IRS's decreasing\namplification power; while in contrast, the passive IRS should be deployed near\neither the transmitter or receiver. Moreover, with optimized IRS placement, the\npassive IRS is shown to outperform its active counterpart when the number of\nreflecting elements is sufficiently large and/or the active-IRS amplification\npower is too small. Next, we optimize the IRS placement for both active and\npassive IRSs to maximize the weighted sum-rate of uplink and downlink\ncommunications. We show that in this case, the passive IRS is more likely to\nachieve superior rate performance. This is because the optimal active-IRS\nplacement needs to balance the rate performance in the uplink and downlink,\nwhile deploying the passive IRS near the transmitter or receiver is optimal\nregardless of the uplink or downlink.\n""]","[('irs assisted wireless', 0.5621314644813538), ('aided wireless communication', 0.5074683427810669), ('reflecting surface irs', 0.4987248480319977), ('aided wireless', 0.47848302125930786), ('passive beamforming', 0.4616667330265045), ('wireless communication', 0.4525820314884186), ('passive irs', 0.4507982134819031), ('irs reflection', 0.4244692325592041), ('intelligent reflecting surface', 0.3988785147666931), ('reflecting surface aided', 0.3979097306728363)]" 169,169,161,169_fractional sobolev spaces_fractional sobolev space_orlicz sobolev spaces_fractional sobolev,"['fractional sobolev spaces', 'fractional sobolev space', 'orlicz sobolev spaces', 'fractional sobolev', 'sobolev embeddings', 'orlicz sobolev', 'sobolev type inequalities', 'sobolev spaces', 'sobolev space', 'sobolev inequalities']","[""Asymptotic behaviours in Fractional Orlicz-Sobolev spaces on Carnot\n groups In this article we define a class of fractional Orlicz-Sobolev spaces on\nCarnot groups and, in the spirit of the celebrated results of\nBourgain-Brezis-Mironescu and of Maz'ya-Shaposhnikova, we study the asymptotic\nbehavior of the Orlicz functionals when the fractional parameter goes to $1$\nand $0$.\n"", ""Sobolev embeddings in Musielak-Orlicz space An embedding theorem for Sobolev spaces built upon general Musielak-Orlicz\nnorms is offered. These norms are defined in terms of generalized Young\nfunctions which also depend on the $x$ variable. Under minimal conditions on\nthe latter dependence, a Sobolev conjugate is associated with any function of\nthis type. Such a conjugate is sharp, in the sense that, for each fixed $x$, it\nagrees with the sharp Sobolev conjugate in classical Orlicz spaces. Both\nSobolev inequalities in the whole $\\mathbb{R}^n$ and Sobolev-Poincar\\'e\ninequalities in domains are established. Compact Sobolev embeddings are also\npresented. In particular, optimal embeddings for standard Orlicz-Sobolev\nspaces, variable exponent Sobolev spaces, and double-phase Sobolev spaces are\nrecovered and complemented in borderline cases. A key tool, of independent\ninterest, in our approach is a new weak type inequality for Riesz potentials in\nMusielak-Orlicz spaces involving a sharp fractional-order Sobolev conjugate.\n"", ""Asymptotics of weighted Gagliardo seminorms In this paper we consider fractional Sobolev spaces equipped with weights\nbeing powers of the distance to the boundary of the domain. We prove the\nversions of Bourgain--Brezis--Mironescu and Maz'ya--Shaposhnikova asymptotic\nformulae for weighted fractional Gagliardo seminorms. For $p>1$ we also provide\na nonlocal characterization of classical weighted Sobolev spaces with power\nweights.\n""]","[('fractional sobolev spaces', 0.7633336782455444), ('fractional sobolev space', 0.7372028827667236), ('orlicz sobolev spaces', 0.6994900107383728), ('fractional sobolev', 0.6820287704467773), ('sobolev embeddings', 0.630621075630188), ('orlicz sobolev', 0.6274746060371399), ('sobolev type inequalities', 0.6174506545066833), ('sobolev spaces', 0.6162246465682983), ('sobolev space', 0.597863495349884), ('sobolev inequalities', 0.5885314345359802)]" 170,170,160,170_klt singularities_semi ample_divisor k_x_kodaira dimension,"['klt singularities', 'semi ample', 'divisor k_x', 'kodaira dimension', 'calabi yau varieties', 'klt pairs', 'canonical bundle', 'log canonical pairs', 'canonical divisor', 'log canonical pair']","['An inductive approach to generalized abundance using nef reduction We use the canonical bundle formula for parabolic fibrations to give an\ninductive approach to the generalized abundance conjecture using nef reduction.\nIn particular, we observe that generalized abundance holds for a klt pair\n$(X,B)$ if the nef dimension $n(K_X+B+L)=2$ and $K_X+B \\geq 0$ or\n$n(K_X+B+L)=3$ and $\\kappa(K_X+B )>0$.\n', ""Nef and abundant divisors, semiampleness and canonical bundle formula In this paper, we use canonical bundle formulas to prove some generalizations\nof an old theorem of Kawamata on the semiampleness of nef and abundant log\ncanonical divisors. In particular, we show that for klt pairs $(X,B)$ with\n$K_X+B$ effective, $L \\in Pic (X)$ nef, nefness and abundance of $K_X+B+L$\nimplies semiampleness. This essentially generalizes Kawamata's theorem to the\nsetting of generalized abundance.\n"", 'Boundedness and volume of generalised pairs In this paper we investigate boundedness and volumes of generalised pairs,\nand give applications to usual pairs especially to a class of pairs that we\ncall stable log minimal models.\n Fixing the dimension and a DCC set controlling coefficients, we will show\nthat the set of volumes of all projective generalised lc pairs $(X,B+M)$ under\nthe given data, satisfies the DCC. Futhermore, we will show that in the klt\ncase, the set of such pairs with ample $K_X+B+M$ and fixed volume, forms a\nbounded family.\n We prove a result about descent of nef divisors to bounded families. This is\nthe key to proving the above and various other results.\n We will then apply the above to study projective lc pairs $(X,B)$ with\nabundant $K_X+B$ of arbitrary Kodaira dimension. In particular, we show that\nthe set of Iitaka volumes of such pairs satisfies DCC under some natural\nboundedness assumptions on the fibres of the Iitaka fibration.\n We define stable log minimal models which consist of a projective lc pair\n$(X,B)$ with semi-ample $K_X+B$ together with a divisor $A\\ge 0$ so that\n$K_X+B+A$ is ample and $A$ does not contain any non-klt centre of $(X,B)$. This\nis a generalisation of both usual stable pairs of general type and stable log\nCalabi-Yau pairs. Fixing appropriate invariants we show that stable log minimal\nmodels form a bounded family. Then we discuss connection with moduli spaces.\n']","[('klt singularities', 0.541581928730011), ('semi ample', 0.4949767589569092), ('divisor k_x', 0.47101110219955444), ('kodaira dimension', 0.4557146728038788), ('calabi yau varieties', 0.4531457722187042), ('klt pairs', 0.44905680418014526), ('canonical bundle', 0.4391011893749237), ('log canonical pairs', 0.42496469616889954), ('canonical divisor', 0.42253074049949646), ('log canonical pair', 0.4184620678424835)]" 171,171,160,171_affine hecke algebras_hecke algebras type_affine hecke algebra_hecke algebras,"['affine hecke algebras', 'hecke algebras type', 'affine hecke algebra', 'hecke algebras', 'hecke algebra type', 'hecke algebra', 'iwahori hecke algebra', 'klr algebras', 'double affine hecke', 'quiver hecke']","['Affine Hecke algebras and generalisations of quiver Hecke algebras for\n type B We define and study cyclotomic quotients of affine Hecke algebras of type B.\nWe establish an isomorphism between direct sums of blocks of these algebras and\na generalisation, for type B, of cyclotomic quiver Hecke algebras which are a\nfamily of graded algebras closely related to algebras introduced by Varagnolo\nand Vasserot. Inspired by the work of Brundan and Kleshchev we first give a\nfamily of isomorphisms for the corresponding result in type A which includes\ntheir original isomorphism. We then select a particular isomorphism from this\nfamily and use it to prove our result.\n', 'Morita equivalences for cyclotomic Hecke algebras of type B and D We give a Morita equivalence theorem for so-called cyclotomic quotients of\naffine Hecke algebras of type B and D, in the spirit of a classical result of\nDipper-Mathas in type A for Ariki-Koike algebras. As a consequence, the\nrepresentation theory of affine Hecke algebras of type B and D reduces to the\nstudy of their cyclotomic quotients with eigenvalues in a single orbit under\nmultiplication by $q^2$ and inversion. The main step in the proof consists in a\ndecomposition theorem for generalisations of quiver Hecke algebras that\nappeared recently in the study of affine Hecke algebras of type B and D. This\ntheorem reduces the general situation of a disconnected quiver with involution\nto a simpler setting. To be able to treat types B and D at the same time we\nunify the different definitions of generalisations of quiver Hecke algebra for\ntype B that exist in the literature.\n', 'Affine Hecke algebras of type D and generalisations of quiver Hecke\n algebras We define and study cyclotomic quotients of affine Hecke algebras of type D.\nWe establish an isomorphism between (direct sums of blocks of) these cyclotomic\nquotients and a generalisation of cyclotomic quiver Hecke algebras which are a\nfamily of Z-graded algebras closely related to algebras introduced by Shan,\nVaragnolo and Vasserot. To achieve this, we first complete the study of\ncyclotomic quotients of affine Hecke algebras of type B by considering the\nsituation when a deformation parameter p squares to 1. We then relate the two\ngeneralisations of quiver Hecke algebras showing that the one for type D can be\nseen as fixed point subalgebras of their analogues for type B, and we carefully\nstudy how far this relation remains valid for cyclotomic quotients. This allows\nus to obtain the desired isomorphism. This isomorphism completes the family of\nisomorphisms relating affine Hecke algebras of classical types to\n(generalisations of) quiver Hecke algebras, originating in the famous result of\nBrundan and Kleshchev for the type A.\n']","[('affine hecke algebras', 0.7833150029182434), ('hecke algebras type', 0.7604078054428101), ('affine hecke algebra', 0.7373615503311157), ('hecke algebras', 0.7020856738090515), ('hecke algebra type', 0.6776257753372192), ('hecke algebra', 0.5876506567001343), ('iwahori hecke algebra', 0.5874727368354797), ('klr algebras', 0.5820763111114502), ('double affine hecke', 0.5439761877059937), ('quiver hecke', 0.512229859828949)]" 172,172,160,172_bayesian optimization_optimization bayesian_bayesian optimization bo_black box optimization,"['bayesian optimization', 'optimization bayesian', 'bayesian optimization bo', 'black box optimization', 'efficient global optimization', 'global optimization', 'objective optimization', 'optimization tasks', 'multi objective optimization', 'optimization methods']","['Parallel Predictive Entropy Search for Multi-objective Bayesian\n Optimization with Constraints Real-world problems often involve the optimization of several objectives\nunder multiple constraints. An example is the hyper-parameter tuning problem of\nmachine learning algorithms. In particular, the minimization of the estimation\nof the generalization error of a deep neural network and at the same time the\nminimization of its prediction time. We may also consider as a constraint that\nthe deep neural network must be implemented in a chip with an area below some\nsize. Here, both the objectives and the constraint are black boxes, i.e.,\nfunctions whose analytical expressions are unknown and are expensive to\nevaluate. Bayesian optimization (BO) methodologies have given state-of-the-art\nresults for the optimization of black-boxes. Nevertheless, most BO methods are\nsequential and evaluate the objectives and the constraints at just one input\nlocation, iteratively. Sometimes, however, we may have resources to evaluate\nseveral configurations in parallel. Notwithstanding, no parallel BO method has\nbeen proposed to deal with the optimization of multiple objectives under\nseveral constraints. If the expensive evaluations can be carried out in\nparallel (as when a cluster of computers is available), sequential evaluations\nresult in a waste of resources. This article introduces PPESMOC, Parallel\nPredictive Entropy Search for Multi-objective Bayesian Optimization with\nConstraints, an information-based batch method for the simultaneous\noptimization of multiple expensive-to-evaluate black-box functions under the\npresence of several constraints. Iteratively, PPESMOC selects a batch of input\nlocations at which to evaluate the black-boxes so as to maximally reduce the\nentropy of the Pareto set of the optimization problem. We present empirical\nevidence in the form of synthetic, benchmark and real-world experiments that\nillustrate the effectiveness of PPESMOC.\n', 'Deterministic Global Optimization of the Acquisition Function in\n Bayesian Optimization: To Do or Not To Do? Bayesian Optimization (BO) with Gaussian Processes relies on optimizing an\nacquisition function to determine sampling. We investigate the advantages and\ndisadvantages of using a deterministic global solver (MAiNGO) compared to\nconventional local and stochastic global solvers (L-BFGS-B and multi-start,\nrespectively) for the optimization of the acquisition function. For CPU\nefficiency, we set a time limit for MAiNGO, taking the best point as optimal.\nWe perform repeated numerical experiments, initially using the Muller-Brown\npotential as a benchmark function, utilizing the lower confidence bound\nacquisition function; we further validate our findings with three alternative\nbenchmark functions. Statistical analysis reveals that when the acquisition\nfunction is more exploitative (as opposed to exploratory), BO with MAiNGO\nconverges in fewer iterations than with the local solvers. However, when the\ndataset lacks diversity, or when the acquisition function is overly\nexploitative, BO with MAiNGO, compared to the local solvers, is more likely to\nconverge to a local rather than a global ly near-optimal solution of the\nblack-box function. L-BFGS-B and multi-start mitigate this risk in BO by\nintroducing stochasticity in the selection of the next sampling point, which\nenhances the exploration of uncharted regions in the search space and reduces\ndependence on acquisition function hyperparameters. Ultimately, suboptimal\noptimization of poorly chosen acquisition functions may be preferable to their\noptimal solution. When the acquisition function is more exploratory, BO with\nMAiNGO, multi-start, and L-BFGS-B achieve comparable probabilities of\nconvergence to a globally near-optimal solution (although BO with MAiNGO may\nrequire more iterations to converge under these conditions).\n', 'Bayesian Optimization for Function Compositions with Applications to\n Dynamic Pricing Bayesian Optimization (BO) is used to find the global optima of black box\nfunctions. In this work, we propose a practical BO method of function\ncompositions where the form of the composition is known but the constituent\nfunctions are expensive to evaluate. By assuming an independent Gaussian\nprocess (GP) model for each of the constituent black-box function, we propose\nExpected Improvement (EI) and Upper Confidence Bound (UCB) based BO algorithms\nand demonstrate their ability to outperform not just vanilla BO but also the\ncurrent state-of-art algorithms. We demonstrate a novel application of the\nproposed methods to dynamic pricing in revenue management when the underlying\ndemand function is expensive to evaluate.\n']","[('bayesian optimization', 0.7215151786804199), ('optimization bayesian', 0.707835853099823), ('bayesian optimization bo', 0.7075497508049011), ('black box optimization', 0.6775373220443726), ('efficient global optimization', 0.5766164660453796), ('global optimization', 0.5707074403762817), ('objective optimization', 0.5061849355697632), ('optimization tasks', 0.49889442324638367), ('multi objective optimization', 0.496522456407547), ('optimization methods', 0.49646633863449097)]" 173,173,159,173_elliptic k3 surfaces_k3 surfaces_singular k3 surfaces_surfaces k3,"['elliptic k3 surfaces', 'k3 surfaces', 'singular k3 surfaces', 'surfaces k3', 'polarized k3 surfaces', 'k3 surface', 'k3 surfaces picard', 'kummer surfaces', 'k3 surface picard', 'elliptic k3']","['Enriques involutions on singular K3 surfaces of small discriminants We classify Enriques involutions on a K3 surface, up to conjugation in the\nautomorphism group, in terms of lattice theory. We enumerate such involutions\non singular K3 surfaces with transcendental lattice of discriminant smaller\nthan or equal to 36. For 11 of these K3 surfaces, we apply Borcherds method to\ncompute the automorphism group of the Enriques surfaces covered by them. In\nparticular, we investigate the structure of the two most algebraic Enriques\nsurfaces.\n', ""Lectures on Supersingular K3 Surfaces and the Crystalline Torelli\n Theorem We survey crystalline cohomology, crystals, and formal group laws with an\nemphasis on geometry. We apply these concepts to K3 surfaces, and especially to\nsupersingular K3 surfaces. In particular, we discuss stratifications of the\nmoduli space of polarized K3 surfaces in positive characteristic, Ogus'\ncrystalline Torelli theorem for supersingular K3 surfaces, the Tate conjecture,\nand the unirationality of K3 surfaces.\n"", ""Elliptic fibrations and involutions on K3 surfaces We survey our contributions on the classification of elliptic fibrations on\nK3 surfaces with a non-symplectic involution. We place them in the more general\nframework of K3 surfaces with an involution without any hypothesis on its fixed\nlocus or on the action on the symplectic 2-form. We revisit the complete\nclassification of elliptic fibrations on K3 surfaces with a 2-elementary\nN\\'eron--Severi lattice, and give a complete classification of extremal\nelliptic fibrations on K3 surfaces that are quadratic covers of rational\nelliptic surfaces.\n""]","[('elliptic k3 surfaces', 0.8379067182540894), ('k3 surfaces', 0.8053971529006958), ('singular k3 surfaces', 0.7988689541816711), ('surfaces k3', 0.7717417478561401), ('polarized k3 surfaces', 0.7716220617294312), ('k3 surface', 0.7272739410400391), ('k3 surfaces picard', 0.7210930585861206), ('kummer surfaces', 0.685120165348053), ('k3 surface picard', 0.6356074810028076), ('elliptic k3', 0.6326216459274292)]" 174,174,157,174_inequalities hilbert_radius hilbert_operator norm_operators complex hilbert,"['inequalities hilbert', 'radius hilbert', 'operator norm', 'operators complex hilbert', 'hilbert space operators', 'inequalities operator', 'inequalities numerical', 'radius operator', 'operators hilbert', 'bounded linear operators']","['On inequalities for A-numerical radius of operators Let $A$ be a positive operator on a complex Hilbert space $\\mathcal{H}.$ We\npresent inequalities concerning upper and lower bounds for $A$-numerical radius\nof operators, which improve on and generalize the existing ones, studied\nrecently in [A. Zamani, A-Numerical radius inequalities for semi-Hilbertian\nspace operators, Linear Algebra Appl. 578 (2019) 159-183]. We also obtain some\ninequalities for $B$-numerical radius of $2\\times 2$ operator matrices where\n$B$ is the $2\\times 2$ diagonal operator matrix whose diagonal entries are $A$.\nFurther we obtain upper bounds for $A$-numerical radius for product of\noperators which improve on the existing bounds.\n', 'Refined inequalities for the numerical radius of Hilbert space operators We present some new upper and lower bounds for the numerical radius of\nbounded linear operators on a complex Hilbert space and show that these are\nstronger than the existing ones. In particular, we prove that if $A$ is a\nbounded linear operator on a complex Hilbert space $\\mathcal{H}$ and if\n$\\Re(A)$, $\\Im(A)$ are the real part, the imaginary part of $A$, respectively,\nthen $$ w(A)\\geq\\frac{\\|A\\|}{2} +\\frac{1}{2\\sqrt{2}} \\Big |\n\\|\\Re(A)+\\Im(A)\\|-\\|\\Re(A)-\\Im(A)\\| \\Big | $$ and $$\nw^2(A)\\geq\\frac{1}{4}\\|A^*A+AA^*\\|+\\frac{1}{4}\\Big|\n\\|\\Re(A)+\\Im(A)\\|^2-\\|\\Re(A)-\\Im(A)\\|^2\\Big|. $$ Here $w(.)$ and $\\|.\\|$ denote\nthe numerical radius and the operator norm, respectively. Further, we obtain\nrefinement of inequalities for the numerical radius of the product of two\noperators. Finally, as an application of the second inequality mentioned above,\nwe obtain an improvement of upper bound for the numerical radius of the\ncommutators of operators.\n', 'On A-numerical radius inequalities for $2 \\times 2$ operator matrices Let ($\\mathcal{H}, \\langle . , .\\rangle )$ be a complex Hilbert space and $A$\nbe a positive bounded linear operator on it. Let $w_A(T)$ be the $A$-numerical\nradius and $\\|T\\|_A$ be the $A$-operator seminorm of an operator $T$ acting on\nthe semi-Hilbertian space $(\\mathcal{H}, \\langle .,.\\rangle_A),$ where $\\langle\nx, y\\rangle_A:=\\langle Ax, y\\rangle$ for all $x,y\\in \\mathcal{H}$. In this\narticle, we establish several upper and lower bounds for $B$-numerical radius\nof $2\\times 2$ operator matrices, where $B=\\begin{bmatrix}\n A & 0\n 0 & A\n \\end{bmatrix}$. Further, we prove some refinements of earlier $A$-numerical\nradius inequalities for operators.\n']","[('inequalities hilbert', 0.5717406272888184), ('radius hilbert', 0.5024877190589905), ('operator norm', 0.501291811466217), ('operators complex hilbert', 0.4966748058795929), ('hilbert space operators', 0.4964488446712494), ('inequalities operator', 0.4931049644947052), ('inequalities numerical', 0.4762263596057892), ('radius operator', 0.47316405177116394), ('operators hilbert', 0.47102972865104675), ('bounded linear operators', 0.4651585519313812)]" 175,175,157,175_central limit theorems_weak law large_strong law large_moment convergence,"['central limit theorems', 'weak law large', 'strong law large', 'moment convergence', 'sublinear expectation', 'law large numbers', 'classical central limit', 'weak law', 'sums independent random', 'sums random variables']","['Strong laws of large numbers for sequences of blockwise $m$-dependent\n and orthogonal random variables under sublinear expectations In this paper, we establish some strong laws of large numbers (SLLN) for\nnon-independent random variables under the framework of sublinear expectations.\nOne of our main results is for blockwise $m$-dependent random variables, and\nanother is for orthogonal random variables. Both are the generalizations of\nSLLN for independent random variables in sublinear expectation spaces.\n', 'The sufficient and necessary conditions of the strong law of large\n numbers under the sub-linear expectations In this paper, by establishing a Borel-Cantelli lemma for a capacity which is\nnot necessarily continuous, and a link between a sequence of independent random\nvariables under the sub-linear expectation and a sequence of independent random\nvariables on $\\mathbb R^{\\infty}$ under a probability, we give the sufficient\nand necessary conditions of the strong law of large numbers for independent and\nidentically distributed random variables under the sub-liner expectation, and\nthe sufficient and necessary conditions for the convergence of an infinite\nseries of independent random variables, without any assumption on the\ncontinuity of the capacities. A purely probabilistic proof of a weak law of\nlarge numbers is also given.\n In the version 1, there are errors in the proof of Lemma 2.1 and 2.2. Version\n2 corrected the errors under additional conditions, but Corollaries 3.1-3.4 are\nonly shown for the copy of the random variables in a new sub-linear expectation\nspace. In this version, we show that Corollaries 3.1-3.4 remain true for the\noriginal random variables and the results for the copy are just special cases.\n', 'Strong law of large numbers for $m$-dependent and stationary random\n variables under sub-linear expectations The arm of this paper is to establish the strong law of large numbers (SLLN)\nof $m$-dependent random variables under the framework of sub-linear\nexpectations. We establish the SLLN for a sequence of independent, but not\nnecessarily identically distributed random variables. The study further extends\nthe SLLN to $m$-dependent and stationary sequence of random variables with the\ncondition $C_{\\mathbb V}(|X_1|)<\\infty$ which is the sufficient and necessary\ncondition of SLLN in the case of independent and identically distributed random\nvariables.\n']","[('central limit theorems', 0.5470211505889893), ('weak law large', 0.5349351763725281), ('strong law large', 0.5155588984489441), ('moment convergence', 0.5154272317886353), ('sublinear expectation', 0.5070456862449646), ('law large numbers', 0.49707290530204773), ('classical central limit', 0.4835074841976166), ('weak law', 0.4643941819667816), ('sums independent random', 0.4639679193496704), ('sums random variables', 0.4633893668651581)]" 176,176,156,176_lie algebroids_lie groupoids_algebroids lie_lie groupoid,"['lie algebroids', 'lie groupoids', 'algebroids lie', 'lie groupoid', 'lie algebroid', 'symplectic groupoids', 'poisson lie group', 'courant algebroids', 'algebroids', 'lie group']","[""Exploring the Structure of Higher Algebroids The notion of a \\emph{higher-order algebroid}, as introduced by\nJ\\'o\\'zwikowski and Rotkiewicz in their work \\emph{Higher-order analogs of Lie\nalgebroids via vector bundle comorphisms} (SIGMA, 2018), generalizes the\nconcepts of a higher-order tangent bundle $\\tau^k_M: \\mathrm{T}^k M \\to M$ and\na (Lie) algebroid. This idea is based on a (vector bundle) comorphism approach\nto (Lie) algebroids and the reduction procedure of homotopies from the level of\nLie groupoids to that of Lie algebroids. In brief, an alternative description\nof a Lie algebroid $(A, [\\cdot, \\cdot], \\sharp)$ is a vector bundle comorphism\n$\\kappa$, defined as the dual of the Poisson map $\\varepsilon: \\mathrm{T}^\\ast\nA \\to \\mathrm{T} A^\\ast$ associated with the Lie algebroid $A$. The framework\nof comorphisms has proven to be a suitable language for describing higher-order\nanalogues of Lie algebroids from the perspective of the role played by (Lie)\nalgebroids in geometric mechanics. In this work, we uncover the classical\nalgebraic structures underlying the somewhat mysterious description of\nhigher-order algebroids through comorphisms. For the case $k=2$, we establish a\none-to-one correspondence between higher-order Lie algebroids and pairs\nconsisting of a two-term representation (up to homotopy) of a Lie algebroid and\na morphism to the adjoint representation of this algebroid.\n"", ""On the integrability of Lie algebroids by diffeological spaces Lie's third theorem does not hold for Lie groupoids and Lie algebroids. In\nthis article, we show that Lie's third theorem is valid within a specific class\nof diffeological groupoids that we call `singular Lie groupoids.' To achieve\nthis, we introduce a subcategory of diffeological spaces which we call\n`quasi-etale.' Singular Lie groupoids are precisely the groupoid objects within\nthis category, where the unit space is a manifold.\n Our approach involves the construction of a functor that maps singular Lie\ngroupoids to Lie algebroids, extending the classical functor from Lie groupoids\nto Lie algebroids. We prove that the \\v{S}evera-Weinstein groupoid of an\nalgebroid is an example of a singular Lie groupoid, thereby establishing Lie's\nthird theorem in this context.\n"", 'Lie Algebroids This is an overview article on Lie algebroids, and their role as the\ninfinitesimal counterparts of Lie groupoids.\n']","[('lie algebroids', 0.746404767036438), ('lie groupoids', 0.7216359972953796), ('algebroids lie', 0.7029484510421753), ('lie groupoid', 0.6780493259429932), ('lie algebroid', 0.6562644839286804), ('symplectic groupoids', 0.5955762267112732), ('poisson lie group', 0.5777502655982971), ('courant algebroids', 0.5519641637802124), ('algebroids', 0.5506556034088135), ('lie group', 0.5488434433937073)]" 177,177,155,177_toda hierarchy_toda lattice_integrable hierarchy_kp hierarchy,"['toda hierarchy', 'toda lattice', 'integrable hierarchy', 'kp hierarchy', 'integrable hierarchies', 'discrete painlev equations', 'bkp hierarchy', 'kdv hierarchy', 'toda', 'tau functions']","['The Modified Toda Hierarchy In this paper, modified Toda (mToda) equation is generalized to form an\nintegrable hierarchy in the framework of Sato theory, which is therefore called\nmToda hierarchy. Inspired by the fact that Toda hierarchy is 2-component\ngeneralization of usual KP hierarchy, mToda hierarchy is constructed from\nbilinear equations of 2-component first modified KP hierarchy, where we provide\nthe corresponding equivalence with Lax formulations. Then it is demonstrated\nthat there are Miura links between Toda and mToda hierarchies, which means the\ndefinition of mToda hierarchy here is reasonable. Finally, Darboux\ntransformations of the Toda and mToda hierarchies are also constructed by using\nthe aforementioned Miura links.\n', 'Tau-function of the B-Toda hierarchy We continue the study of the B-Toda hierarchy (the Toda lattice with the\nconstraint of type B) which can be regarded as a discretization of the BKP\nhierarchy. We introduce the tau-function of the B-Toda hierarchy and obtain the\nbilinear equations for it. Examples of soliton tau-functions are presented in\nthe explicit form.\n', 'From Toda hierarchy to KP hierarchy Using the matrix-resolvent method and a formula of the second-named author on\nthe $n$-point function for a KP tau-function, we show that the tau-function of\nan arbitrary solution to the Toda lattice hierarchy is a KP tau-function. We\nthen generalize this result to tau-functions for the extended Toda hierarchy\n(ETH) by developing the matrix-resolvent method for the ETH. As an example the\npartition function of Gromov--Witten invariants of the complex projective line\nis a KP tau-function, and an application on irreducible representations of the\nsymmetric group is obtained.\n']","[('toda hierarchy', 0.6192165017127991), ('toda lattice', 0.6073318719863892), ('integrable hierarchy', 0.4832990765571594), ('kp hierarchy', 0.47325044870376587), ('integrable hierarchies', 0.4549882113933563), ('discrete painlev equations', 0.4157293140888214), ('bkp hierarchy', 0.402058869600296), ('kdv hierarchy', 0.3894851505756378), ('toda', 0.387112021446228), ('tau functions', 0.3806837797164917)]" 178,178,154,178_electric vehicle charging_vehicle charging_ev charging_charging discharging,"['electric vehicle charging', 'vehicle charging', 'ev charging', 'charging discharging', 'charging station', 'charging stations', 'electric vehicle ev', 'fast charging', 'electric vehicles evs', 'electric vehicle']","[""Health-aware and user-involved battery charging management for electric\n vehicles: linear quadratic strategies This paper studies control-theory-enabled intelligent charging management for\nbattery systems in electric vehicles (EVs). Charging is crucial for the battery\nperformance and life as well as a contributory factor to a user's confidence in\nor anxiety about EVs. For the existing practices and methods, many run with a\nlack of battery health awareness during charging, and none includes the user\nneeds into the charging loop. To remedy such deficiencies, we propose to\nperform charging that, for the first time, allows the user to specify charging\nobjectives and accomplish them through dynamic control, in addition to\nsuppressing the charging-induced negative effects on battery health. Two\ncharging strategies are developed using the linear quadratic control theory.\nAmong them, one is based on control with fixed terminal charging state, and the\nother on tracking a reference charging path. They are computationally\ncompetitive, without requiring real-time constrained optimization as needed in\nmost charging techniques available in the literature. A simulation-based study\ndemonstrates their effectiveness and potential. It is anticipated that charging\nwith health awareness and user involvement guaranteed by the proposed\nstrategies will bring major improvements to not only the battery longevity but\nalso the EV user satisfaction.\n"", ""Coordinated vehicle dispatching and charging scheduling for an electric\n ride-hailing fleet under charging congestion and dynamic prices Effective utilization of charging station capacity plays an important role in\nenhancing the profitability of ride-hailing systems using electric vehicles.\nExisting studies assume constant energy prices and uncapacitated charging\nstations or do not explicitly consider vehicle queueing at charging stations,\nresulting in over-optimistic charging infrastructure utilization. In this\nstudy, we develop a dynamic charging scheduling method (named CongestionAware)\nthat anticipates vehicles' energy needs and coordinates their charging\noperations with real-time energy prices to avoid long waiting time at charging\nstations and increase the total profit of the system. A sequential mixed\ninteger linear programming model is proposed to devise vehicles' day-ahead\ncharging plans based on their experienced charging waiting times and energy\nconsumption. The obtained charging plans are adapted within the day in response\nto vehicles' energy needs and charging station congestion. The developed\ncharging policy is tested using NYC yellow taxi data in a Manhattan-like study\narea with a fleet size of 100 vehicles given the scenarios of 3000 and 4000\ncustomers per day. The computational results show that our CongestionAware\npolicy outperforms different benchmark policies with up to +15.06% profit and\n+19.16% service rate for 4000 customers per day. Sensitivity analysis is\nconducted with different system parameters and managerial insights are\ndiscussed.\n"", 'A Game-theoretic Approach for Dynamic Service Scheduling at Charging\n Facilities Electric vehicle (EV) charging patterns are highly uncertain in both\nlocation, time, and duration particularly in association with the predicted\nhigh demand for electric mobility in the future. An EV can be charged at home,\nat charging stations near highway ramps, or on parking lots next to office\nbuildings, shops, airports, among other locations. Charging time and duration\ncan be fixed and continuous or flexible and intermittent. EV user preferences\nof charging services depend on many factors (e.g., charging prices, choice of\ndestinations), causing EV charging patterns to shift in real-time. Hence, there\nis a need for a highly flexible EV charging network to support the rapid\nadoption of the technology. This study presents a dynamic scheduling scheme for\nEV charging facilities considering uncertainties in charging demand, charger\navailability, and charging rate. The problem is formulated as a dynamic\nprogramming model that minimizes the travel and waiting costs and charging\nexpenses while penalizing overcharging attempts. An integrated generalized Nash\nequilibrium technique is introduced to solve the problem that incorporates a\nMonte Carlo tree search algorithm to efficiently capture the uncertainties and\napproximate the value function of the dynamic program. Numerical experiments on\nhypothetical and real-world networks confirm the solution quality and\ncomputational efficiency of the proposed methodology. This study will promote\nEV adoption and support environmental sustainability by helping users lower the\ncharging spot search burden via a real-time, user-adaptive optimizer.\nStakeholders can retrieve charger utilization and pricing data and get feedback\non their charging network policies.\n']","[('electric vehicle charging', 0.6316206455230713), ('vehicle charging', 0.6028374433517456), ('ev charging', 0.5797463059425354), ('charging discharging', 0.5136127471923828), ('charging station', 0.4903143644332886), ('charging stations', 0.4850555658340454), ('electric vehicle ev', 0.483822226524353), ('fast charging', 0.4756144881248474), ('electric vehicles evs', 0.46432650089263916), ('electric vehicle', 0.45809245109558105)]" 179,179,153,179_discrete memoryless channel_discrete memoryless channels_memoryless channel_memoryless channels,"['discrete memoryless channel', 'discrete memoryless channels', 'memoryless channel', 'memoryless channels', 'binary symmetric channel', 'binary erasure channel', 'channel coding', 'channel capacity', 'shannon capacity', 'symmetric channel']","[""Variable-Length Codes with Bursty Feedback We study variable-length codes for point-to-point discrete memoryless\nchannels with noiseless unlimited-rate feedback that occurs in $L$ bursts. We\nterm such codes variable-length bursty-feedback (VLBF) codes. Unlike classical\ncodes with feedback after each transmitted code symbol, bursty feedback fits\nbetter with protocols that employ sparse feedback after a packet is sent and\nalso with half-duplex end devices that cannot transmit and listen to the\nchannel at the same time. We present a novel non-asymptotic achievability bound\nfor VLBF codes with $L$ bursts of feedback over any discrete memoryless\nchannel. We numerically evaluate the bound over the binary symmetric channel\n(BSC). We perform optimization over the time instances at which feedback occurs\nfor both our own bound and Yavas et al.'s non-asymptotic achievability bound\nfor variable-length stop-feedback (VLSF) codes, where only a single bit is sent\nat each feedback instance. Our results demonstrate the advantages of richer\nfeedback: VLBF codes significantly outperform VLSF codes at short blocklengths,\nespecially as the error probability $\\epsilon$ decreases. Remarkably, for\nBSC(0.11) and error probability $10^{-10}$, our VLBF code with $L=5$ and\nexpected decoding time $N\\leq 400$ outperforms the achievability bound given by\nPolyanskiy et al. for VLSF codes with $L=\\infty$, and our VLBF code with $L=3$.\n"", ""Identification Over Binary Noisy Permutation Channels We study message identification over the binary noisy permutation channel.\nFor discrete memoryless channels (DMCs), the number of identifiable messages\ngrows doubly exponentially, and the maximum second-order exponent is the\nShannon capacity of the DMC. We consider a binary noisy permutation channel\nwhere the transmitted vector is first permuted by a permutation chosen\nuniformly at random, and then passed through a binary symmetric channel with\ncrossover probability $p$. In an earlier work, it was shown that $2^{c_n n}$\nmessages can be identified over binary (noiseless) permutation channel if\n$c_n\\rightarrow 0$. For the binary noisy permutation channel, we show that\nmessage sizes growing as $2^{\\epsilon_n \\sqrt{\\frac{n}{\\log n}}}$ are\nidentifiable for any $\\epsilon_n\\rightarrow 0$. We also prove a strong converse\nresult showing that for any sequence of identification codes with message size\n$2^{R_n \\sqrt{n}\\log n}$, where $R_n \\rightarrow \\infty$, the sum of Type-I and\nType-II error probabilities approaches at least $1$ as $n\\rightarrow \\infty$.\nOur proof of the strong converse uses the idea of channel resolvability. The\nchannel of interest turns out to be the ``binary weight-to-weight (BWW)\nchannel'' which captures the effect on the Hamming weight of a vector, when the\nvector is passed through a binary symmetric channel. We propose a novel\ndeterministic quantization scheme for quantization of a distribution over\n$\\{0,1,\\cdots, n\\}$ by an $M$-type input distribution when the distortion is\nmeasured on the output distribution (over the BWW channel) in total variation\ndistance. This plays a key role in the converse proof.\n"", ""Sequential Transmission Over Binary Asymmetric Channels With Feedback In this paper, we consider the problem of variable-length coding over the\nclass of memoryless binary asymmetric channels (BACs) with noiseless feedback,\nincluding the binary symmetric channel (BSC) as a special case. In 2012,\nNaghshvar et al. introduced an encoding scheme, which we refer to as the\nsmall-enough-difference (SED) encoder, which asymptotically achieves both\ncapacity and Burnashev's optimal error exponent for symmetric binary-input\nchannels. Building on the work of Naghshvar et al., this paper extends the SED\nencoding scheme to the class of BACs and develops a non-asymptotic upper bound\non the average blocklength that is shown to achieve both capacity and the\noptimal error exponent. For the specific case of the BSC, we develop an\nadditional non-asymptotic bound using a two-phase analysis that leverages both\na submartingale synthesis and a Markov chain time of first passage analysis.\nFor the BSC with capacity $1/2$, both new achievability bounds exceed the\nachievability bound of Polyanskiy et al. for a system limited to stop-feedback\ncodes.\n""]","[('discrete memoryless channel', 0.7355169057846069), ('discrete memoryless channels', 0.7326219081878662), ('memoryless channel', 0.6839974522590637), ('memoryless channels', 0.6730499267578125), ('binary symmetric channel', 0.6195023655891418), ('binary erasure channel', 0.6190193891525269), ('channel coding', 0.6124290227890015), ('channel capacity', 0.5902085900306702), ('shannon capacity', 0.5861333012580872), ('symmetric channel', 0.5662034153938293)]" 180,180,152,180_boltzmann collision operator_spatially homogeneous boltzmann_limit boltzmann_boltzmann collision,"['boltzmann collision operator', 'spatially homogeneous boltzmann', 'limit boltzmann', 'boltzmann collision', 'homogeneous boltzmann', 'boltzmann equations', 'solutions boltzmann', 'linear boltzmann', 'boltzmann operator', 'linearized boltzmann']","['$L^p$-norms for the homogeneous non-cutoff Boltzmann equation with soft\n potentials We establish a priori estimates showing the propagation and generation of\n$L^p$-norms for solutions to the non-cutoff spatially homogeneous Boltzmann\nequation with soft potentials. The singularity of the collision kernel is key\nto generate regularization and inhomogeneity in the energy estimates of the\n$L^p$-norms. Our result extends \\cite{Alo19} from the hard potential cases to\nthe soft ones.\n', 'Global existence for an isotropic modification of the Boltzmann equation Motivated by the open problem of large-data global existence for the\nnon-cutoff Boltzmann equation, we introduce a model equation that in some sense\ndisregards the anisotropy of the Boltzmann collision kernel. We refer to this\nmodel equation as isotropic Boltzmann, by analogy with the isotropic Landau\nequation introduced by Krieger and Strain [Comm. Partial Differential Equations\n37(4), 2012, 647--689]. The collision operator of our isotropic Boltzmann model\nconverges to the isotropic Landau collision operator under a scaling limit that\nis analogous to the grazing collisions limit connecting (true) Boltzmann with\n(true) Landau.\n Our main result is global existence for the isotropic Boltzmann equation in\nthe space homogeneous case, for certain parts of the ""very soft potentials""\nregime in which global existence is unknown for the space homogeneous Boltzmann\nequation. The proof strategy is inspired by the work of Gualdani-Guillen [J.\nFunct. Anal. 283(6), 2022, Paper No. 109559] on isotropic Landau, and makes use\nof recent progress on weighted fractional Hardy inequalities.\n', 'High-velocity tails of the inelastic and the multi-species mixture\n Boltzmann equations We study high-velocity tails of some homogeneous Boltzmann equations on $v\n\\in \\mathbb{R}_{v}^d$. First, we consider spatially homogeneous inelastic\nBoltzmann equation with noncutoff collision kernel, in the case of moderately\nsoft potentials. We also study spatially homogeneous mixture Boltzmann\nequations : for both noncutoff collision kernel with moderately soft potentials\nand cutoff collision kernel with hard potentials. In the case of noncutoff\ninelastic Boltzmann, we obtain\n \\[\n f(t,v) \\geq a(t) e^{-b(t)|v|^p}, \\quad 2 < p < 6.213\n \\]\n by extending Cancellation lemma and spreading lemma and assuming $f\\in\nC^{\\infty}$. For the Mixture type Boltzmann equations, we prove Maxwellian\n$p=2$.\n']","[('boltzmann collision operator', 0.6726526021957397), ('spatially homogeneous boltzmann', 0.655865490436554), ('limit boltzmann', 0.6461961269378662), ('boltzmann collision', 0.6296980977058411), ('homogeneous boltzmann', 0.6208404302597046), ('boltzmann equations', 0.6170396208763123), ('solutions boltzmann', 0.588249921798706), ('linear boltzmann', 0.5847154259681702), ('boltzmann operator', 0.5845261216163635), ('linearized boltzmann', 0.5811803340911865)]" 181,181,152,181_regularity minimizers_minimizers variational_variational problems_minimizers functionals,"['regularity minimizers', 'minimizers variational', 'variational problems', 'minimizers functionals', 'regularity theory', 'partial regularity', 'lipschitz regularity', 'local minimizers', 'minimizers non', 'regularity local']","['Higher differentiability results for solutions to a class of\n non-autonomous obstacle problems with sub-quadratic growth conditions We establish some higher differentiability results of integer and fractional\norder for solution to non-autonomous obstacle problems of the form\n \\begin{equation*}\n \\min \\left\\{\\int_{\\Omega}f(x, Dv(x))\\,:\\, v\\in\n \\mathcal{K}_\\psi(\\Omega)\\right\\},\n \\end{equation*} where the function $f$ satisfies $p-$growth conditions with\nrespect to the gradient variable, for $10$ be a real number and $G$ be a graph. We say $G$ is $t$-tough if for\nevery cutset $S$ of $G$, the ratio of $|S|$ to the number of components of\n$G-S$ is at least $t$. The Toughness Conjecture of Chv\\\'atal, stating that\nthere exists a constant $t_0$ such that every $t_0$-tough graph with at least\nthree vertices is hamiltonian, is still open in general. For any given integer\n$k\\ge 1$, a graph $G$ is $(P_2\\cup kP_1)$ free if $G$ does not contain the\ndisjoint union of $P_2$ and $k$ isolated vertices as an induced subgraph.\n In this note, we show that every 4-tough and $2k$-connected $(P_2\\cup\nkP_1)$-free graph with at least three vertices is hamiltonian.\n This result in some sense is an ""extension"" of the classical\nChv\\\'{a}tal-Erd\\H{o}s Theorem that every $\\max\\{2,k\\}$-connected\n $(k+1)P_1$-free graph on at least three vertices is hamiltonian.\n', 'Hamiltonicity of $1$-tough $(P_2\\cup kP_1)$-free graphs Given a graph $H$, a graph $G$ is $H$-free if $G$ does not contain $H$ as an\ninduced subgraph. For a positive real number $t$, a non-complete graph $G$ is\nsaid to be $t$-tough if for every vertex cut $S$ of $G$, the ratio of $|S|$ to\nthe number of components of $G-S$ is at least $t$. A complete graph is said to\nbe $t$-tough for any $t>0$. Chv\\\'{a}tal\'s toughness conjecture, stating that\nthere exists a constant $t_0$ such that every $t_0$-tough graph with at least\nthree vertices is Hamiltonian, is still open in general. Chv\\\'{a}tal and\nErd\\""{o}s \\cite{CE} proved that, for any integer $k\\ge 1$, every\n$\\max\\{2,k\\}$-connected $(k+1)P_1$-free graph on at least three vertices is\nHamiltonian. Along the Chv\\\'{a}tal-Erd\\""{o}s theorem, Shi and Shan \\cite{SS}\nproved that, for any integer $k\\ge 4$, every $4$-tough $2k$-connected $(P_2\\cup\nkP_1)$-free graph with at least three vertices is Hamiltonian, and furthermore,\nthey proposed a conjecture that for any integer $k\\ge 1$, any $1$-tough\n$2k$-connected $(P_2\\cup kP_1)$-free graph is Hamiltonian. In this paper, we\nconfirm the conjecture, and furthermore, we show that if $k\\ge 3$, then the\ncondition `$2k$-connected\' may be weakened to be `$2(k-1)$-connected\'. As an\nimmediate consequence, for any integer $k\\ge 3$, every $(k-1)$-tough $(P_2\\cup\nkP_1)$-free graph is Hamiltonian. This improves the result of Hatfield and\nGrimm \\cite{HG}, stating that every $3$-tough $(P_2\\cup 3P_1)$-free graph is\nHamiltonian.\n']","[('hamiltonian graphs', 0.5885749459266663), ('hamiltonian graph', 0.5437144041061401), ('graph hamiltonian', 0.5297220349311829), ('chordal graphs', 0.4890170693397522), ('hamilton cycle', 0.4888312816619873), ('cubic graphs', 0.48171934485435486), ('free graphs', 0.4736254811286926), ('hamiltonian cycles', 0.4723476767539978), ('connected graphs', 0.4621918201446533), ('free graph', 0.46211305260658264)]" 189,189,147,189_multiple access noma_orthogonal multiple access_access noma_noma systems,"['multiple access noma', 'orthogonal multiple access', 'access noma', 'noma systems', 'performance noma', 'uplink noma', 'downlink noma', 'multiple access rsma', 'noma system', 'noma scheme']","[""Resource Allocation and Performance Analysis of Hybrid RSMA-NOMA in the\n Downlink Rate splitting multiple access (RSMA) and non-orthogonal multiple access\n(NOMA) are the key enabling multiple access techniques to enable massive\nconnectivity. However, it is unclear whether RSMA would consistently outperform\nNOMA from a system sum-rate perspective, users' fairness, as well as\nconvergence and feasibility of the resource allocation solutions. This paper\ninvestigates the weighted sum-rate maximization problem to optimize power and\nrate allocations in a hybrid RSMA-NOMA network. In the hybrid RSMA-NOMA, by\noptimally allocating the maximum power budget to each scheme, the BS operates\non NOMA and RSMA in two orthogonal channels, allowing users to simultaneously\nreceive signals on both RSMA and NOMA. Based on the successive convex\napproximation (SCA) approach, we jointly optimize the power allocation of users\nin NOMA and RSMA, the rate allocation of users in RSMA, and the power budget\nallocation for NOMA and RSMA considering successive interference cancellation\n(SIC) constraints. Numerical results demonstrate the trade-offs that hybrid\nRSMA-NOMA access offers in terms of system sum rate, fairness, convergence, and\nfeasibility of the solutions.\n"", 'Performance Analysis of Uplink Adaptive NOMA Depending on Channel\n Knowledge Non Orthogonal Multiple Access (NOMA) is a key technique to satisfy large\nusers densities in future wireless networks. However, NOMA may provide poor\nperformance compared to Orthogonal Multiple Access (OMA) due to inter-user\ninterference. In this paper, we obtain closed-form expressions of the uplink\nNOMA and OMA throughputs when no Channel State Information at Transmitter\n(CSIT) is available, and of the average data rates assuming that instantaneous\nrates should be larger than a minimum threshold when full CSIT is available.\nAnalytical comparisons of OMA and NOMA prove that there is no global dominant\nstrategy valid in all situations. Based on this conclusion, we propose a new\nmultiple-access (MA) strategy called NOMA-Adaptive (NOMA-A) that selects the\nbest MA technique between OMA and NOMA. NOMA-A aims at maximizing the sum\nthroughput in the no CSIT case, and the probability that both users are active\nin the full CSIT case. NOMA-A is shown to outperform the other strategies in\nterms of sum throughput and rate.\n', 'Partial Non-Orthogonal Multiple Access (NOMA) in Downlink Poisson\n Networks Non-orthogonal multiple access (NOMA) allows users sharing a resource-block\nto efficiently reuse spectrum and improve cell sum rate $\\mathcal{R}_{\\rm tot}$\nat the expense of increased interference. Orthogonal multiple access (OMA), on\nthe other hand, guarantees higher coverage. We introduce partial-NOMA in a\nlarge two-user downlink network to provide both throughput and reliability. The\nassociated partial overlap controls interference while still offering spectrum\nreuse. The nature of the partial overlap also allows us to employ\nreceive-filtering to further suppress interference. For signal decoding in our\npartial-NOMA setup, we propose a new technique called flexible successive\ninterference cancellation (FSIC) decoding. We plot the rate region abstraction\nand compare with OMA and NOMA. We formulate a problem to maximize\n$\\mathcal{R}_{\\rm tot}$ constrained to a minimum throughput requirement for\neach user and propose an algorithm to find a feasible resource allocation\nefficiently. Our results show that partial-NOMA allows greater flexibility in\nterms of performance. Partial-NOMA can also serve users that NOMA cannot. We\nalso show that with appropriate parameter selection and resource allocation,\npartial-NOMA can outperform NOMA.\n']","[('multiple access noma', 0.6843768954277039), ('orthogonal multiple access', 0.6039155721664429), ('access noma', 0.5809214115142822), ('noma systems', 0.5716182589530945), ('performance noma', 0.5633791089057922), ('uplink noma', 0.5567799210548401), ('downlink noma', 0.5458943247795105), ('multiple access rsma', 0.5287384390830994), ('noma system', 0.5205540657043457), ('noma scheme', 0.5203250050544739)]" 190,190,146,190_inverse scattering problems_inverse scattering_acoustic scattering_obstacle scattering,"['inverse scattering problems', 'inverse scattering', 'acoustic scattering', 'obstacle scattering', 'inverse acoustic', 'elastic scattering', 'scattering problems', 'scattering', 'scattered field', 'scattered fields']","[""Direct sampling for recovering sound soft scatterers from point source\n measurements In this paper, we consider the inverse problem of recovering a sound soft\nscatterer from the measured scattered field. The scattered field is assumed to\nbe induced by a point source on a curve/surface that is known. Here we will\npropose and analyze new direct sampling methods for this problem. The first\nmethod we consider uses a far-field transformation of the near-field data which\nwill allow us to derive explicit bounds in the resolution analysis for the\ndirect sampling method's imaging functional. Two direct sampling methods will\nbe studied using the far-field transformation. For these imaging functionals,\nwe will use the Funk-Hecke identities to study the resolution analysis. We will\nalso study a direct sampling method for the case of the given Cauchy data.\nNumerical examples are given to show the applicability of the new imaging\nfunctionals for recovering a sound soft scatterer in 2D.\n"", 'Inverse elastic scattering problems with phaseless far field data This paper is concerned with uniqueness, phase retrieval and shape\nreconstruction methods for inverse elastic scattering problems with phaseless\nfar field data. Systematically, we study two basic models, i.e., inverse\nscattering of plane waves by rigid bodies and inverse scattering of sources\nwith compact support. For both models, we show that the location of the objects\ncan not be uniquely recovered by the data. To solve this problem, we consider\nsimultaneously the incident point sources with one fixed source point and at\nmost three scattering strengths. We then establish some uniqueness results for\nsource scattering problem with multi-frequency phaseless far field data.\nFurthermore, a fast and stable phase retrieval approach is proposed based on a\nsimple geometric result which provides a stable reconstruction of a point in\nthe plane from three distances to given points. Difficulties arise for inverse\nscattering by rigid bodies due to the additional unknown far field pattern of\nthe point sources. To overcome this difficulty, we introduce an artificial\nrigid body into the system and show that the underlying rigid bodies can be\nuniquely determined by the corresponding phaseless far field data at a fixed\nfrequency. Noting that the far field pattern of the scattered field\ncorresponding to point sources is very small if the source point is far away\nfrom the scatterers, we propose an appropriate phase retrieval method for\nobstacle scattering problems, without using the artificial rigid body. Finally,\nwe propose several sampling methods for shape reconstruction with phaseless far\nfield data. Extended numerical examples in two dimensions are conducted with\nnoisy data, and the results further verify the effectiveness and robustness of\nthe proposed phase retrieval techniques and sampling methods.\n', 'Uniqueness in phaseless inverse scattering problems with superposition\n of incident point sources This paper is concerned with the uniqueness in inverse acoustic scattering\nproblems with the modulus of the far-field patterns co-produced by the obstacle\n(resp. medium) and the point sources. Based on the superposition of point\nsources as the incident waves, we overcome the difficulty of translation\ninvariance induced by a single incident plane wave, and rigorously prove that\nthe location and shape of the obstacle as well as its boundary condition or the\nrefractive index can be uniquely determined by the modulus of far-field\npatterns. This work is different from our previous work on phaseless inverse\nscattering problems [2018 Inverse Problems 34, 085002], in which the reference\nball technique and the superposition of incident waves were used, and the\nphaseless far-field data generated only by the the scatterer were considered.\nIn this paper, the phaseless far-field data co-produced by the scatterer and\nthe point sources are used, thus the configuration is practically more\nfeasible. Moreover, since the reference ball is not needed, the justification\nof uniqueness is much more clear and concise.\n']","[('inverse scattering problems', 0.6704345345497131), ('inverse scattering', 0.6469432711601257), ('acoustic scattering', 0.6152991056442261), ('obstacle scattering', 0.5765234231948853), ('inverse acoustic', 0.5524341464042664), ('elastic scattering', 0.5251167416572571), ('scattering problems', 0.5212149024009705), ('scattering', 0.5129374265670776), ('scattered field', 0.5120040774345398), ('scattered fields', 0.4765367805957794)]" 191,191,146,191_ramsey properties_ramsey theory_ramsey type_ramsey,"['ramsey properties', 'ramsey theory', 'ramsey type', 'ramsey', 'relational structures', 'infinite structures', 'structures finite', 'finite structures', 'structure finite', 'classes finite']","['A survey on big Ramsey structures In recent years, there has been much progress in the field of structural\nRamsey theory, in particular in the study of big Ramsey degrees. In all known\nexamples of infinite structures with finite big Ramsey degrees, there is in\nfact a single expansion of the structure, called a big Ramsey structure, which\ncorrectly encodes the exact big Ramsey degrees of every finite substructure\nsimultaneously. The first half of the article collects facts about this\nphenomenon that have appeared in the literature into a single cohesive\nframework, thus offering a conceptual survey of big Ramsey structures. We\npresent some original results indicating that the standard methods of proving\nfinite big Ramsey degrees automatically yield big Ramsey structures, often with\ndesirable extra properties. The second half of the article is a survey in the\nmore traditional sense, discussing numerous examples from the literature and\nshowing how they fit into our framework. We also present some general results\non how big Ramsey degrees are affected by expanding structures with unary\nfunctions.\n', 'Big Ramsey Degrees and Infinite Languages This paper investigates big Ramsey degrees of unrestricted relational\nstructures in (possibly) infinite languages. Despite significant progress in\nthe study of big Ramsey degrees, the big Ramsey degrees of many classes of\nstructures with finite small Ramsey degrees are still not well understood. We\nshow that if there are only finitely many relations of every arity greater than\none, then unrestricted relational structures have finite big Ramsey degrees,\nand give some evidence that this is tight. This is the first time finiteness of\nbig Ramsey degrees has been established for a random structure in an infinite\nlanguage. Our results represent an important step towards a better\nunderstanding of big Ramsey degrees for structures with relations of arity\ngreater than two.\n', 'On Ramsey degrees, compactness and approximability One of the consequences of the Compactness Principle in structural Ramsey\ntheory is that the small Ramsey degrees cannot exceed the corresponding big\nRamsey degrees, thereby justifying the choice of adjectives. However, it is\nunclear what happens in the realm of dual Ramsey degrees due to the lack of the\ncompactness argument that applies to that setting. In this paper we present a\nframework within which both ""direct"" and dual Ramsey statements can be stated\nand reasoned about in a uniform fashion. We introduce the notion of\napproximability which yields a general compactness argument powerful enough to\nprove statements about both ""direct"" and dual Ramsey phenomena. We conclude the\npaper with an application of the new strategies by generalizing Voigt\'s\n$\\star$-version of the Infinite Ramsey Theorem to a large class of relational\nstructures and deriving a Ramsey statement for ""loose colorings"" of enumerated\nFra\\""{\\i}ss\\\'{e} limits.\n']","[('ramsey properties', 0.8016266226768494), ('ramsey theory', 0.7822386026382446), ('ramsey type', 0.685300350189209), ('ramsey', 0.5834973454475403), ('relational structures', 0.46328988671302795), ('infinite structures', 0.45922449231147766), ('structures finite', 0.4527060091495514), ('finite structures', 0.44656842947006226), ('structure finite', 0.4026438891887665), ('classes finite', 0.39793843030929565)]" 192,192,146,192_neumann boundary conditions_homogeneous neumann boundary_neumann boundary_homogeneous neumann,"['neumann boundary conditions', 'homogeneous neumann boundary', 'neumann boundary', 'homogeneous neumann', 'parabolic elliptic', 'u_t nabla', 'chemotaxis system', 'omega u_0', 'finite time blow', 'classical solutions']","['Blow-up phenomena in a parabolic-elliptic-elliptic attraction-repulsion\n chemotaxis system with superlinear logistic degradation This paper is concerned with the attraction-repulsion chemotaxis system with\nsuperlinear logistic degradation, \\begin{align*} \\begin{cases} u_t = \\Delta u -\n\\chi \\nabla\\cdot(u \\nabla v)\n + \\xi \\nabla\\cdot (u \\nabla w) + \\lambda u - \\mu u^k, \\quad\n &x \\in \\Omega,\\ t>0,\\\\[1.05mm] 0= \\Delta v + \\alpha u - \\beta v, \\quad\n &x \\in \\Omega,\\ t>0,\\\\[1.05mm] 0= \\Delta w + \\gamma u - \\delta w, \\quad\n &x \\in \\Omega,\\ t>0, \\end{cases} \\end{align*} under homogeneous Neumann\nboundary conditions, in a ball $\\Omega \\subset \\mathbb{R}^n$ ($n \\ge 3$), with\nconstant parameters $\\lambda \\in \\mathbb{R}$, $k>1$, $\\mu, \\chi, \\xi, \\alpha,\n\\beta, \\gamma, \\delta>0$. Blow-up phenomena in the system have been well\ninvestigated in the case $\\lambda=\\mu=0$, whereas the attraction-repulsion\nchemotaxis system with logistic degradation has been not studied. Under the\ncondition that $k>1$ is close to $1$, this paper ensures a solution which blows\nup in $L^\\infty$-norm and $L^\\sigma$-norm with some $\\sigma>1$ for some\nnonnegative initial data. Moreover, a lower bound of blow-up time is derived.\n', 'Prescribed signal concentration on the boundary: Weak solvability in a\n chemotaxis-Stokes system with proliferation We study a chemotaxis-Stokes system with signal consumption and logistic\nsource terms of the form \\noindent \\begin{align*} \\left\\{ \\begin{array}{r@{\\\n}l@{\\quad}l@{\\quad}l@{\\,}c} n_{t}+u\\cdot\\!\\nabla n&=\\Delta\nn-\\nabla\\!\\cdot(n\\nabla c)+\\kappa n-\\mu n^{2},\\ &x\\in\\Omega,& t>0,\\\\\nc_{t}+u\\cdot\\!\\nabla c&=\\Delta c-nc,\\ &x\\in\\Omega,& t>0,\\\\ u_{t}&=\\Delta\nu+\\nabla P+n\\nabla\\phi,\\ &x\\in\\Omega,& t>0,\\\\ \\nabla\\cdot u&=0,\\ &x\\in\\Omega,&\nt>0,\\\\ \\big(\\nabla n-n\\nabla c\\big)\\cdot\\nu&=0,\\quad c=c_{\\star}(x),\\quad u=0,\n&x\\in\\partial\\Omega,& t>0, \\end{array}\\right. \\end{align*} where $\\kappa\\geq0$,\n$\\mu>0$ and, in contrast to the commonly investigated variants of\nchemotaxis-fluid systems, the signal concentration on the boundary of the\ndomain $\\Omega\\subset\\mathbb{R}^N$ with $N\\in\\{2,3\\}$, is a prescribed\ntime-independent nonnegative function $c_{\\star}\\in\nC^{2}\\!\\big(\\overline{\\Omega}\\big)$. Making use of the boundedness information\nentailed by the quadratic decay term of the first equation, we will show that\nthe system above has at least one global weak solution for any suitably regular\ntriplet of initial data.\n', 'A new (and optimal) result for boundedness of solution of a quasilinear\n chemotaxis--haptotaxis model (with logistic source) This article deals with an initial-boundary value problem for the coupled\nchemotaxis-haptotaxis system with nonlinear diffusion\n$$\\left\\{\\begin{array}{ll} u_t=\\nabla\\cdot( D(u)\\nabla\nu)-\\chi\\nabla\\cdot(u\\nabla v)- \\xi\\nabla\\cdot(u\\nabla w)+\\mu u(1- u-w), x\\in\n\\Omega, t>0,\\\\ \\tau v_t=\\Delta v- v +u,\\quad x\\in \\Omega, t>0,\\\\ w_t=- vw,\\quad\nx\\in \\Omega, t>0, \\end{array}\\right.$$ under homogeneous Neumann boundary\nconditions in a smooth bounded domain $\\Omega\\subset\\mathbb{R}^N(N\\geq1)$,\nwhere $\\tau\\in\\{0,1\\}$ and $\\chi$, $\\xi$ and $\\mu$ are given nonnegative\nparameters. As far as we know, this situation provides the first {\\bf rigorous}\nresult which (precisely) gives the relationship between $m,\\xi,\\chi$ and $\\mu$\nthat yields to the boundedness of the solutions. Moreover, these results\nthereby significantly extending results of previous results of several authors\n(see Remarks 1.1 and 1.2) and some optimal results are obtained.\n']","[('neumann boundary conditions', 0.5254983305931091), ('homogeneous neumann boundary', 0.47823306918144226), ('neumann boundary', 0.47104471921920776), ('homogeneous neumann', 0.42646488547325134), ('parabolic elliptic', 0.41688480973243713), ('u_t nabla', 0.36006641387939453), ('chemotaxis system', 0.3492005169391632), ('omega u_0', 0.338458389043808), ('finite time blow', 0.33299005031585693), ('classical solutions', 0.32283464074134827)]" 193,193,146,193_consensus multi agent_consensus algorithms_consensus protocol_control multi agent,"['consensus multi agent', 'consensus algorithms', 'consensus protocol', 'control multi agent', 'distributed control', 'multi agent systems', 'consensus multi', 'multi agent system', 'linear multi agent', 'multiagent systems']","['Output Consensus of Heterogeneous Multi-Agent Systems with Mismatched\n Uncertainties and Measurement Noises: An ADRC Approach In this paper, the practical output consensus problem for heterogeneous\nhigh-order leader-follower multi-agent systems under directed communication\ntopology containing a directed spanning tree and subject to large-scale\nmismatched disturbances, mismatched uncertainties, and measurement noises is\naddressed. By introducing a reversible state transformation without changing\nthe output, the actual total disturbance affecting output performance of each\nagent and matched with the control input of the transformed system is extracted\nand estimated by extended state observers. Then, the control protocols based on\nestimates of extended state observers, are designed by combing the output\nfeedback control ones to obtain output consensus and feedforward compensators\nto attenuating the total disturbance of each agent actively. It is shown with a\nrigorous proof that the outputs of all followers can track practically the\noutput of the leader, and all the states of the leader-follower multi-agent\nsystems are bounded. Some numerical simulations are performed to verify the\nvalidity of the control protocols and theoretical result.\n', 'Observer-based Leader-following Consensus for Positive Multi-agent\n Systems Over Time-varying Graphs This paper addresses the leader-following consensus problem for discrete-time\npositive multi-agent systems over time-varying graphs. We assume that the\nfollowers may have mutually different positive dynamics which can also be\ndifferent from the leader. Compared with most existing positive consensus works\nfor homogeneous multi-agent systems, the formulated problem is more general and\nchallenging due to the interplay between the positivity requirement and\nhigh-order heterogeneous dynamics. To solve the problem, we present an extended\nversion of existing observer-based design for positive multi-agent systems. By\nvirtue of the common quadratic Lyapunov function technique, we show the\nfollowers will maintain their state variables in the positive orthant and\nfinally achieve an output consensus specified by the leader. A numerical\nexample is used to verify the efficacy of our algorithms.\n', 'Distributed Event-Triggered Leader-Follower Consensus of Nonlinear\n Multi-Agent Systems We consider the distributed leader-follower consensus problem with\nevent-triggered communications. The system under consideration is a non-linear\ninput-affine multi agent system. The agents are assumed to have identical\ndynamics structure with uncertain parameters and satisfying an incremental\nstabilisability condition. A distributed control law is proposed which achieves\nconsensus based on two novel Communication Triggering Conditions (CTCs): the\nfirst one to achieve an asymptotic consensus but without any guarantees on Zeno\nbehaviour and the second one to exclude Zeno behaviour but with practical\nconsensus.\n']","[('consensus multi agent', 0.7050110101699829), ('consensus algorithms', 0.618108332157135), ('consensus protocol', 0.5975180268287659), ('control multi agent', 0.5632423162460327), ('distributed control', 0.5554451942443848), ('multi agent systems', 0.5416117310523987), ('consensus multi', 0.5307525992393494), ('multi agent system', 0.5017889738082886), ('linear multi agent', 0.48507925868034363), ('multiagent systems', 0.4227755665779114)]" 194,194,145,194_copulas_copula based_copula_dependence measures,"['copulas', 'copula based', 'copula', 'dependence measures', 'dependence properties', 'dependence structure', 'multivariate distributions', 'marginals', 'marginal distributions', 'dependence functions']","['Right-truncated Archimedean and related copulas The copulas of random vectors with standard uniform univariate margins\ntruncated from the right are considered and a general formula for such\nright-truncated conditional copulas is derived. This formula is analytical for\ncopulas that can be inverted analytically as functions of each single argument.\nThis is the case, for example, for Archimedean and related copulas. The\nresulting right-truncated Archimedean copulas are not only analytically\ntractable but can also be characterized as tilted Archimedean copulas. This\nfinding allows one, for example, to more easily derive analytical properties\nsuch as the coefficients of tail dependence or sampling procedures of\nright-truncated Archimedean copulas. As another result, one can easily obtain a\nlimiting Clayton copula for a general vector of truncation points converging to\nzero; this is an important property for (re)insurance and a fact already known\nin the special case of equal truncation points, but harder to prove without\naforementioned characterization. Furthermore, right-truncated Archimax copulas\nwith logistic stable tail dependence functions are characterized as tilted\nouter power Archimedean copulas and an analytical form of right-truncated\nnested Archimedean copulas is also derived.\n', ""Final solution to the problem of relating a true copula to an imprecise\n copula In this paper we solve in the negative the problem proposed in this journal\n(I. Montes et al., Sklar's theorem in an imprecise setting, Fuzzy Sets and\nSystems, 278 (2015), 48-66) whether an order interval defined by an imprecise\ncopula contains a copula. Namely, if $\\mathcal{C}$ is a nonempty set of\ncopulas, then $\\underline{C} = \\inf\\{C\\}_{C\\in\\mathcal{C}}$ and $\\overline{C}=\n\\sup\\{C\\}_{C\\in\\mathcal{C}}$ are quasi-copulas and the pair\n$(\\underline{C},\\overline{C})$ is an imprecise copula according to the\ndefinition introduced in the cited paper, following the ideas of $p$-boxes. We\nshow that there is an imprecise copula $(A,B)$ in this sense such that there is\nno copula $C$ whatsoever satisfying $A \\leqslant C\\leqslant B$. So, it is\nquestionable whether the proposed definition of the imprecise copula is in\naccordance with the intentions of the initiators. Our methods may be of\nindependent interest: We upgrade the ideas of Dibala et al. (Defects and\ntransformations of quasi-copulas, Kybernetika, 52 (2016), 848-865) where\npossibly negative volumes of quasi-copulas as defects from being copulas were\nstudied.\n"", 'New copulas and their applications to symmetrizations of bivariate\n copulas New copulas, based on perturbation theory, are introduced to clarify a\n\\emph{symmetrization} procedure for asymmetric copulas. We give also some\nproperties of the \\emph{symmetrized} copula. Finally, we examine families of\ncopulas with a prescribed symmetrized one. By the way, we study topologically,\nthe set of all symmetric copulas and give some of its classical and new\nproperties.\n']","[('copulas', 0.7245012521743774), ('copula based', 0.6973357200622559), ('copula', 0.6900383830070496), ('dependence measures', 0.3908790647983551), ('dependence properties', 0.35512977838516235), ('dependence structure', 0.3498140573501587), ('multivariate distributions', 0.34560227394104004), ('marginals', 0.3440547585487366), ('marginal distributions', 0.34275034070014954), ('dependence functions', 0.3343869149684906)]" 195,195,145,195_stochastic differential bsde_reflected stochastic differential_backward stochastic differential_stochastic differential equations,"['stochastic differential bsde', 'reflected stochastic differential', 'backward stochastic differential', 'stochastic differential equations', 'forward backward stochastic', 'backward stochastic', 'reflected stochastic', 'equations driven brownian', 'differential equations bsdes', 'backward sdes']","['Existence and uniqueness of solutions for multi-dimensional reflected\n BSDEs with diagonally quadratic generators In this paper, we study multi-dimensional reflected backward stochastic\ndifferential equations with diagonally quadratic generators. Using the\ncomparison theorem for diagonally quadratic BSDEs which is established recently\nin [14], we obtain the existence and uniqueness of a solution by a penalization\nmethod. Moreover, we provide a comparison theorem.\n', 'Multi-dimensional reflected BSDEs driven by $G$-Brownian motion with\n diagonal generators We consider the well-posedness problem of multi-dimensional reflected\nbackward stochastic differential equations driven by $G$-Brownian motion\n($G$-BSDEs) with diagonal generators. Two methods, i.e., the penalization\nmethod and the Picard iteration argument, are provided to prove the existence\nand uniqueness of solutions. We also study its connection with the obstacle\nproblem of a system of fully nonlinear PDEs.\n', '$G$-BSDEs with mean constraints in time-dependent intervals In this paper, we study a collection of mean-reflected backward stochastic\ndifferential equations driven by $G$-Brownian motions ($G$-BSDEs), where\n$G$-expectations are constrained in some time-dependent intervals. To establish\nwell-posedness results, we firstly construct a backward Skorokhod problem with\nsublinear expectation, and then apply that in the study of doubly\nmean-reflected $G$-BSDEs involving Lipschitz and quadratic generators under\nbounded and unbounded terminal conditions. Also we utilize fixed-point\nargumentations and $\\theta$-methods while solving these equations. Finally, we\nextend the results to multi-dimensional doubly mean-reflected $G$-BSDEs with\ndiagonal generators.\n']","[('stochastic differential bsde', 0.639890193939209), ('reflected stochastic differential', 0.6121283173561096), ('backward stochastic differential', 0.591974139213562), ('stochastic differential equations', 0.5678649544715881), ('forward backward stochastic', 0.5599536299705505), ('backward stochastic', 0.555921733379364), ('reflected stochastic', 0.5365515947341919), ('equations driven brownian', 0.527848482131958), ('differential equations bsdes', 0.5183508396148682), ('backward sdes', 0.5043823719024658)]" 196,196,144,196_hamilton jacobi theory_hamilton jacobi equations_hamiltonian vector field_hamiltonian systems,"['hamilton jacobi theory', 'hamilton jacobi equations', 'hamiltonian vector field', 'hamiltonian systems', 'contact hamiltonian systems', 'hamiltonian dynamics', 'hamiltonian mechanics', 'hamiltonian system', 'hamiltonian', 'contact hamiltonian']","['Hamilton-Jacobi Equations of Nonholonomic Magnetic Hamiltonian Systems In order to describe the impact of different geometric structures and\nconstraints for the dynamics of a Hamiltonian system, in this paper, for a\nmagnetic Hamiltonian system defined by a magnetic symplectic form, we first\ndrive precisely the geometric constraint conditions of magnetic symplectic form\nfor the magnetic Hamiltonian vector field.which are called the Type I and Type\nII of Hamilton-Jacobi equation. Secondly, for the magnetic Hamiltonian system\nwith nonholonomic constraint, we first define a distributional magnetic\nHamiltonian system, then derive its two types of Hamilton-Jacobi equation.\nMoreover, we generalize the above results to nonholonomic reducible magnetic\nHamiltonian system with symmetry. We define a nonholonomic reduced\ndistributional magnetic Hamiltonian system, and prove two types of\nHamilton-Jacobi theorem. These research work reveal the deeply internal\nrelationships of the magnetic symplectic structure, nonholonomic constraint,\nthe distributional two-form, and the dynamical vector field of the nonholonomic\nmagnetic Hamiltonian system.\n', 'The Hamilton--Jacobi theory for contact Hamiltonian systems The aim of this paper is to develop a Hamilton--Jacobi theory for contact\nHamiltonian systems. We find several forms for a suitable Hamilton-Jacobi\nequation accordingly to the Hamiltonian and the evolution vector fields for a\ngiven Hamiltonian function. We also analyze the corresponding formulation on\nthe symplectification of the contact Hamiltonian system, and establish the\nrelations between these two approaches. In the last section, some examples are\ndiscussed.\n', 'A Discrete Hamilton--Jacobi Theory for Contact Hamiltonian Dynamics In this paper, we propose a discrete Hamilton--Jacobi theory for (discrete)\nHamiltonian dynamics defined on a (discrete) contact manifold. To this end, we\nfirst provide a novel geometric Hamilton--Jacobi theory for continuous contact\nHamiltonian dynamics. Then, rooting on the discrete contact Lagrangian\nformulation, we obtain the discrete equations for Hamiltonian dynamics by the\ndiscrete Legendre transformation. Based on the discrete contact Hamilton\nequation, we construct a discrete Hamilton--Jacobi equation for contact\nHamiltonian dynamics. We show how the discrete Hamilton--Jacobi equation is\nrelated to the continuous Hamilton--Jacobi theory presented in this work. Then,\nwe propose geometric foundations of the discrete Hamilton--Jacobi equations on\ncontact manifolds in terms of discrete contact flows. At the end of the paper\nwe provide a numerical example to test the theory.\n']","[('hamilton jacobi theory', 0.694292426109314), ('hamilton jacobi equations', 0.6914938688278198), ('hamiltonian vector field', 0.6639248728752136), ('hamiltonian systems', 0.6595036387443542), ('contact hamiltonian systems', 0.6410999298095703), ('hamiltonian dynamics', 0.636786162853241), ('hamiltonian mechanics', 0.6345198750495911), ('hamiltonian system', 0.6290178298950195), ('hamiltonian', 0.613467812538147), ('contact hamiltonian', 0.6050981283187866)]" 197,197,142,197_electromagnetic scattering problems_electromagnetic scattering_wave scattering_scattering problems,"['electromagnetic scattering problems', 'electromagnetic scattering', 'wave scattering', 'scattering problems', 'elastic scattering', 'acoustic scattering', 'boundary integral equations', 'scattering', 'scattering time harmonic', 'boundary integral']","[""A highly accurate perfectly-matched-layer boundary integral equation\n solver for acoustic layered-medium problems Based on the perfectly matched layer (PML) technique, this paper develops a\nhigh-accuracy boundary integral equation (BIE) solver for acoustic scattering\nproblems in locally defected layered media in both two and three dimensions.\nThe original scattering problem is truncated onto a bounded domain by the PML.\nAssuming the vanishing of the scattered field on the PML boundary, we derive\nBIEs on local defects only in terms of using PML-transformed free-space Green's\nfunction, and the four standard integral operators: single-layer, double-layer,\ntranspose of double-layer, and hyper-singular boundary integral operators. The\nhyper-singular integral operator is transformed into a combination of\nweakly-singular integral operators and tangential derivatives. We develop a\nhigh-order Chebyshev-based rectangular-polar singular-integration solver to\ndiscretize all weakly-singular integrals. Numerical experiments for both two-\nand three-dimensional problems are carried out to demonstrate the accuracy and\nefficiency of the proposed solver.\n"", 'PML-based boundary integral equation method for electromagnetic\n scattering problems in a layered-medium This paper proposes a new boundary integral equation (BIE) methodology based\non the perfectly matched layer (PML) truncation technique for solving the\nelectromagnetic scattering problems in a multi-layered medium. Instead of using\nthe original PML stretched fields, artificial fields which are also equivalent\nto the solutions in the physical region are introduced. This significantly\nsimplifies the study of the proposed methodology to derive the PML problem.\nThen some PML transformed layer potentials and the associated boundary integral\noperators (BIOs) are defined and the corresponding jump relations are shown.\nUnder the assumption that the fields vanish on the PML boundary, the solution\nrepresentations, as well as the related BIEs and regularization of the\nhyper-singular operators, in terms of the current density functions on the\ntruncated interface, are derived. Numerical experiments are presented to\ndemonstrate the efficiency and accuracy of the method.\n', 'An adaptive finite element PML method for the open cavity scattering\n problems Consider the electromagnetic scattering of a time-harmonic plane wave by an\nopen cavity which is embedded in a perfectly electrically conducting infinite\nground plane. This paper is concerned with the numerical solutions of the\ntransverse electric and magnetic polarizations of the open cavity scattering\nproblems. In each polarization, the scattering problem is reduced equivalently\ninto a boundary value problem of the two-dimensional Helmholtz equation in a\nbounded domain by using the transparent boundary condition (TBC). An a\nposteriori estimate based adaptive finite element method with the perfectly\nmatched layer (PML) technique is developed to solve the reduced problem. The\nestimate takes account both of the finite element approximation error and the\nPML truncation error, where the latter is shown to decay exponentially with\nrespect to the PML medium parameter and the thickness of the PML layer.\nNumerical experiments are presented and compared with the adaptive finite\nelement TBC method for both polarizations to illustrate the competitive\nbehavior of the proposed method.\n']","[('electromagnetic scattering problems', 0.5893192291259766), ('electromagnetic scattering', 0.5568650960922241), ('wave scattering', 0.5562001466751099), ('scattering problems', 0.5477560758590698), ('elastic scattering', 0.533201277256012), ('acoustic scattering', 0.5224769115447998), ('boundary integral equations', 0.5158914923667908), ('scattering', 0.47872623801231384), ('scattering time harmonic', 0.45043209195137024), ('boundary integral', 0.4465225636959076)]" 198,198,141,198_cluster algebras_cluster algebra_upper cluster algebras_cluster algebra mathcal,"['cluster algebras', 'cluster algebra', 'upper cluster algebras', 'cluster algebra mathcal', 'rank cluster algebras', 'upper cluster algebra', 'algebra cluster', 'cluster categories', 'cluster theory', 'cluster structures']","['Cluster Algebras and Scattering Diagrams, Part I. Basics in Cluster\n Algebras This is a first step guide to the theory of cluster algebras. We especially\nfocus on basic notions, techniques, and results concerning seeds, cluster\npatterns, and cluster algebras.\n', 'Cluster algebras generated by projective cluster variables We introduce the notion of a lower bound cluster algebra generated by\nprojective cluster variables as a polynomial ring over the initial cluster\nvariables and the so-called projective cluster variables. We show that under an\nacyclicity assumption, the cluster algebra and the lower bound cluster algebra\ngenerated by projective cluster variables coincide. In this case we use our\nresults to construct a basis for the cluster algebra. We also show that any\ncoefficient-free cluster algebra of types $A_n$ or $\\widetilde{A}_n$ is equal\nto the corresponding lower bound cluster algebra generated by projective\ncluster variables.\n', 'F-invariant in cluster algebras In this paper, we introduce the $F$-invariant in cluster algebras using\ntropicalization. This is an analog of the $E$-invariant introduced by Derksen,\nWeyman and Zelevinsky in the additive categorification of cluster algebras and\nthe $\\mathfrak{d}$-invariant introduced by Kang, Kashiwara, Kim and Oh in the\nmonoidal categorification of (quantum) cluster algebras. We prove that the\nproduct of two cluster monomials is still a cluster monomial if and only if\ntheir $F$-invariant is zero. For cluster algebras with a compatible Poisson\nbracket, we prove that if two cluster variables are log-cannonical, then they\nare contained in the same cluster.\n Inspired by $F$-invariant, we introduce the dominant sets for seeds of\ncluster algebras as an replacement of torsion classes for $\\tau$-tilting pairs\nin $\\tau$-tilting theory and as an replacement of inversion sets in the study\nof right weak order on Weyl groups. With the help of the dominant sets, we\nprove that the oriented exchange graphs of cluster algebras are acyclic. In\nparticular, this implies that green mutations induce a partial order on the set\nof seeds (up to seed equivalence) of cluster algebras. We prove that the\noriented exchange graphs of cluster algebras coincide with the Hasse quivers of\nthe above posets of seeds.\n']","[('cluster algebras', 0.847059428691864), ('cluster algebra', 0.7769380807876587), ('upper cluster algebras', 0.775303304195404), ('cluster algebra mathcal', 0.7392396926879883), ('rank cluster algebras', 0.7300757765769958), ('upper cluster algebra', 0.7275113463401794), ('algebra cluster', 0.6941986083984375), ('cluster categories', 0.5777347087860107), ('cluster theory', 0.5650089383125305), ('cluster structures', 0.5639484524726868)]" 199,199,141,199_rank matrix recovery_matrix recovery_rank matrix completion_rank minimization,"['rank matrix recovery', 'matrix recovery', 'rank matrix completion', 'rank minimization', 'sparse low rank', 'rank matrix estimation', 'low rank matrices', 'matrix completion', 'low rank matrix', 'robust low rank']","['Low-rank matrix recovery via regularized nuclear norm minimization In this paper, we theoretically investigate the low-rank matrix recovery\nproblem in the context of the unconstrained regularized nuclear norm\nminimization (RNNM) framework. Our theoretical findings show that, the RNNM\nmethod is able to provide a robust recovery of any matrix $X$ (not necessary to\nbe exactly low-rank) from its few noisy measurements\n$\\textbf{b}=\\mathcal{A}(X)+\\textbf{n}$ with a bounded constraint\n$\\|\\textbf{n}\\|_{2}\\leq\\epsilon$, provided that the $tk$-order restricted\nisometry constant (RIC) of $\\mathcal{A}$ satisfies a certain constraint related\nto $t>0$. Specifically, the obtained recovery condition in the case of $t>4/3$\nis found to be same with the sharp condition established previously by Cai and\nZhang (2014) to guarantee the exact recovery of any rank-$k$ matrix via the\nconstrained nuclear norm minimization method. More importantly, to the best of\nour knowledge, we are the first to establish the $tk$-order RIC based\ncoefficient estimate of the robust null space property in the case of\n$01$ for the complete perturbation and low-rank\nmatrix, the condition is the optimal sufficient condition $\\delta_{2r}<1$\n\\cite{Recht et al 2010}. The numerical experiments are conducted to show better\nperformance, and provides outperformance of the nonconvex Schatten\n$p$-minimization method comparing with the convex nuclear norm minimization\napproach in the completely perturbed scenario.\n']","[('rank matrix recovery', 0.7234122157096863), ('matrix recovery', 0.66071617603302), ('rank matrix completion', 0.6258109211921692), ('rank minimization', 0.618076741695404), ('sparse low rank', 0.6007322072982788), ('rank matrix estimation', 0.5863980650901794), ('low rank matrices', 0.5834415555000305), ('matrix completion', 0.5831955671310425), ('low rank matrix', 0.567994236946106), ('robust low rank', 0.5649486780166626)]" 200,200,141,200_cayley graphs generalized_vertex transitive graphs_cayley graphs_transitive graphs,"['cayley graphs generalized', 'vertex transitive graphs', 'cayley graphs', 'transitive graphs', 'cayley graphs finite', 'cayley graphs abelian', 'normal cayley graphs', 'cayley graph', 'vertex transitive graph', 'vertex transitive']","['2-Arc-transitive Cayley graphs on alternating groups An interesting fact is that most of the known connected $2$-arc-transitive\nnonnormal Cayley graphs of small valency on finite simple groups are\n$(\\mathrm{A}_{n+1},2)$-arc-transitive Cayley graphs on $\\mathrm{A}_n$. This\nmotivates the study of $2$-arc-transitive Cayley graphs on $\\mathrm{A}_n$ for\narbitrary valency. In this paper, we characterize the automorphism groups of\nsuch graphs. In particular, we show that for a non-complete\n$(G,2)$-arc-transitive Cayley graph on $\\mathrm{A}_n$ with $G$ almost simple,\nthe socle of $G$ is either $\\mathrm{A}_{n+1}$ or $\\mathrm{A}_{n+2}$. We also\nconstruct the first infinite family of $(\\mathrm{A}_{n+2},2)$-arc-transitive\nCayley graphs on $\\mathrm{A}_n$.\n', 'The classification of two-distance transitive dihedrants A vertex transitive graph $\\Gamma$ is said to be $2$-distance transitive if\nfor each vertex $u$, the group of automorphisms of $\\Gamma$ fixing the vertex\n$u$ acts transitively on the set of vertices at distance $1$ and $2$ from $u$,\nwhile $\\Gamma$ is said to be $2$-arc transitive if its automorphism group is\ntransitive on the set of $2$-arcs. Then $2$-arc transitive graphs are\n$2$-distance transitive. The classification of $2$-arc transitive Cayley graphs\non dihedral groups was given by Du, Malni\\v{c} and Maru\\v{s}i\\v{c} in\n[Classification of 2-arc-transitive dihedrants, J. Combin. Theory Ser. B 98\n(2008), 1349--1372]. In this paper, it is shown that a connected 2-distance\ntransitive Cayley graph on the dihedral group of order $2n$ is either $2$-arc\ntransitive, or isomorphic to the complete multipartite graph $K_{m[b]}$ for\nsome $m\\geq3$ and $b\\geq2$ with $mb=2n$.\n', ""On basic $2$-arc-transitive graphs A connected graph $\\Gamma=(V,E)$ of valency at least $3$ is called a basic\n$2$-arc-transitive graph if its full automorphism group has a subgroup $G$ with\nthe following properties: (i) $G$ acts transitively on the set of $2$-arcs of\n$\\Gamma$, and (ii) every minimal normal subgroup of $G$ has at most two orbits\non $V$.\n In her papers [17,18], Praeger proved a connected $2$-arc-transitive graph of\nvalency at least $3$ is a normal cover of some basic $2$-arc-transitive graph,\nand characterized the group-theoretic structures for basic $2$-arc-transitive\ngraphs.\n Based on Praeger's theorems on $2$-arc-transitive graphs, this paper presents\na further understanding on basic $2$-arc-transitive graphs.\n""]","[('cayley graphs generalized', 0.6913042664527893), ('vertex transitive graphs', 0.6665676236152649), ('cayley graphs', 0.6574633121490479), ('transitive graphs', 0.6484103202819824), ('cayley graphs finite', 0.6435918211936951), ('cayley graphs abelian', 0.6391462683677673), ('normal cayley graphs', 0.6176884174346924), ('cayley graph', 0.6050353050231934), ('vertex transitive graph', 0.5957822799682617), ('vertex transitive', 0.5901555418968201)]" 201,201,140,201_based topology optimization_topology optimization_topology optimization framework_topology optimization problems,"['based topology optimization', 'topology optimization', 'topology optimization framework', 'topology optimization problems', 'structural optimization', 'optimization design', 'design optimization', 'optimization based', 'optimization framework', 'optimization']","['A globally convergent method to accelerate topology optimization using\n on-the-fly model reduction We present a globally convergent method to accelerate density-based topology\noptimization using projection-based reduced-order models (ROMs) and\ntrust-region methods. To accelerate topology optimization, we replace the\nlarge-scale finite element simulation, which dominates the computational cost,\nwith ROMs that reduce the cost of objective function and gradient evaluations\nby orders of magnitude. To guarantee convergence, we first introduce a\ntrust-region method that employs generalized trust-region constraints and prove\nit is globally convergent. We then devise a class of globally convergent\nROM-accelerated topology optimization methods informed by two theories: the\naforementioned trust-region theory, which identifies the ROM accuracy\nconditions required to guarantee the method converges to a critical point of\nthe original topology optimization problem; a posteriori error estimation\ntheory for projection-based ROMs, which informs ROM construction procedure to\nmeet the accuracy conditions. This leads to trust-region methods that construct\nand update the ROM on-the-fly during optimization; the methods are guaranteed\nto converge to a critical point of the original, unreduced topology\noptimization problem, regardless of starting point. Numerical experiments on\nthree different structural topology optimization problems demonstrate the\nproposed reduced topology optimization methods accelerate convergence to the\noptimal design by up to an order of magnitude.\n', 'On smooth or 0/1 designs of the fixed-mesh element-based topology\n optimization The traditional element-based topology optimization based on material\npenalization typically aims at a 0/1 design. Our numerical experiments reveal\nthat the compliance of a smooth design is overestimated when material\nproperties of boundary intermediate elements under the fixed-mesh finite\nelement analysis are interpolated with a material penalization model. This\npaper proposes a floating projection topology optimization (FPTO) method for\nseeking a smooth design using the ersatz material model or a 0/1 design using a\nmaterial penalization model. The proposed floating projection constraint\ncombining with the upper and lower bounds heuristically simulates 0/1\nconstraints of design variables in the original discrete optimization problem.\nNumerical examples demonstrate the capability of the proposed element-based\ntopology optimization approach in obtaining 0/1 or smooth designs for 2D and 3D\ncompliance minimization problems. The proposed topology optimization approach\ncan be easily implemented under the framework of the fixed-mesh finite element\nanalysis and provides an alternative way to form explicit topologies of\nstructures, especially when the ersatz material model is adopted.\n', 'A Novel Deflation Approach for Topology Optimization and Application for\n Optimization of Bipolar Plates of Electrolysis Cells Topology optimization problems usually feature multiple local minimizers. To\nguarantee convergence to local minimizers that perform best globally or to find\nlocal solutions that are desirable for practical applications due to easy\nmanufacturability or aesthetic designs, it is important to compute multiple\nlocal minimizers of topology optimization problems. Existing methods typically\nrely on Newton-type solvers during the optimization process, which makes them\nunsuitable for sensitivity-based topology optimization. In this paper, we\nintroduce a novel deflation approach to systematically find multiple local\nminimizers of general topology optimization problems. The approach is based on\na penalization of previously found local solutions in the objective. We\nvalidate our approach on the so-called two-pipes five-holes example. Finally,\nwe introduce a model for the topology optimization of bipolar plates of\nhydrogen electrolysis cells and demonstrate that our deflation approach enables\nthe discovery of novel designs for such plates.\n']","[('based topology optimization', 0.7502126693725586), ('topology optimization', 0.7472184300422668), ('topology optimization framework', 0.7439637184143066), ('topology optimization problems', 0.7359484434127808), ('structural optimization', 0.5507319569587708), ('optimization design', 0.5383301377296448), ('design optimization', 0.5210357904434204), ('optimization based', 0.4850613474845886), ('optimization framework', 0.48438480496406555), ('optimization', 0.47165849804878235)]" 202,202,140,202_cr manifolds_cr manifold_hypersurfaces complex_complex manifold,"['cr manifolds', 'cr manifold', 'hypersurfaces complex', 'complex manifold', 'real hypersurfaces', 'hypersurface complex', 'degenerate hypersurfaces', 'stein manifolds', 'real submanifolds', 'homogeneous hypersurfaces']","['Homogeneous models for Levi-degenerate CR manifolds We extend the notion of a fundamental negatively $\\mathbb Z$-graded Lie\nalgebra $\\mathfrak{m}_x=\\bigoplus_{p\\leq -1}\\mathfrak{m}_x^p$ associated to any\npoint of a Levi nondegenerate CR manifold to the class of $k$-nondegenerate CR\nmanifolds $(M,\\mathcal D,\\mathcal J)$ for all $k\\geq 2$ and call this invariant\nthe core at $x\\in M$. It consists of a $\\mathbb Z$-graded vector space\n$\\mathfrak{m}_x=\\bigoplus_{p\\leq k-2}\\mathfrak{m}_x^p$ of height $k-2$ endowed\nwith the natural algebraic structure induced by the Tanaka and Freeman\nsequences of $(M,\\mathcal D,\\mathcal J)$ and the Levi forms of higher order. In\nthe case of CR manifolds of hypersurface type we propose a definition of a\nhomogeneous model of type $\\mathfrak m$, that is, a homogeneous\n$k$-nondegenerate CR manifold $M=G/G_o$ with core $\\mathfrak m$ associated with\nan appropriate $\\mathbb Z$-graded Lie algebra $Lie(G)=\\mathfrak\ng=\\bigoplus\\mathfrak g^p$ and subalgebra $Lie(G_o)=\\mathfrak\ng_o=\\bigoplus\\mathfrak g_o^p$ of the nonnegative part $\\bigoplus_{p\\geq\n0}\\mathfrak g^p$. It generalizes the classical notion of Tanaka of homogeneous\nmodel for Levi nondegenerate CR manifolds and the tube over the future light\ncone, the unique (up to local CR diffeomorphisms) maximally homogeneous\n$5$-dimensional $2$-nondegenerate CR manifold. We investigate the basic\nproperties of cores and models and study the $7$-dimensional CR manifolds of\nhypersurface type from this perspective. We first classify cores of\n$7$-dimensional $2$-nondegenerate CR manifolds up to isomorphism and then\nconstruct homogeneous models for seven of these classes. We finally show that\nthere exists a unique core and homogeneous model in the $3$-nondegenerate\nclass.\n', ""On geometry of $2$-nondegenerate CR structures of hypersurface type and\n flag structures on leaf spaces of Levi foliations We construct canonical absolute parallelisms over real-analytic manifolds\nequipped with $2$-nondegenerate, hypersurface-type CR structures of arbitrary\nodd dimension not less than $7$ whose Levi kernel has constant rank belonging\nto a broad subclass of CR structures that we label as recoverable. For this we\ndevelop a new approach based on a reduction to a special flag structure, called\nthe dynamical Legendrian contact structure, on the leaf space of the CR\nstructure's associated Levi foliation. This extends the results of\nPorter-Zelenko [20] from the case of regular CR symbols constituting a discrete\nset in the set of all CR symbols to the case of the arbitrary CR symbols for\nwhich the original CR structure can be uniquely recovered from its\ncorresponding dynamical Legendrian contact structure. Our method clarifies the\nrelationship between the bigraded Tanaka prolongation of regular symbols\ndeveloped in Porter-Zelenko [20] and their usual Tanaka prolongation, providing\na geometric interpretation of conditions under which they are equal. Motivated\nby the search for homogeneous models with given nonregular symbol, we also\ndescribe a process of reduction from the original natural frame bundle, which\nis inevitable for structures with nonregular CR symbols. We demonstrate this\nreduction procedure for examples whose underlying manifolds have dimension $7$\nand $9$. We show that, for any fixed rank $r>1$, in the set of all CR symbols\nassociated with 2-nondegenerate, hypersurface-type CR manifolds of odd\ndimension greater than $4r+1$ with rank $r$ Levi kernel, the CR symbols not\nassociated with any homogeneous model are generic, and, for $r=1$, the same\nresult holds if the CR structure is pseudoconvex.\n"", 'On CR singular CR images We say that a CR singular submanifold $M$ has a removable CR singularity if\nthe CR structure at the CR points of $M$ extends through the singularity as an\nabstract CR structure on $M$. We study such real-analytic submanifolds, in\nwhich case removability is equivalent to $M$ being the image of a generic\nreal-analytic submanifold $N$ under a holomorphic map that is a diffeomorphism\nof $N$ onto $M$, what we call a CR image. We study the stability of the CR\nsingularity under perturbation, the associated quadratic invariants, and\nconditions for removability of a CR singularity. A lemma is also proved about\nperturbing away the zeros of holomorphic functions on CR submanifolds, which\ncould be of independent interest.\n']","[('cr manifolds', 0.6530126333236694), ('cr manifold', 0.6242998838424683), ('hypersurfaces complex', 0.5302046537399292), ('complex manifold', 0.5191347599029541), ('real hypersurfaces', 0.5047154426574707), ('hypersurface complex', 0.5035046339035034), ('degenerate hypersurfaces', 0.5001834630966187), ('stein manifolds', 0.4883904755115509), ('real submanifolds', 0.48535609245300293), ('homogeneous hypersurfaces', 0.478778600692749)]" 203,203,139,203_runge kutta methods_implicit runge kutta_explicit runge kutta_runge kutta schemes,"['runge kutta methods', 'implicit runge kutta', 'explicit runge kutta', 'runge kutta schemes', 'kutta methods', 'exponential runge kutta', 'runge kutta', 'kutta schemes', 'runge kutta rk', 'stage runge kutta']","[""A New Class of Runge-Kutta Methods for Nonlinearly Partitioned Systems This work introduces a new class of Runge-Kutta methods for solving\nnonlinearly partitioned initial value problems. These new methods, named\nnonlinearly partitioned Runge-Kutta (NPRK), generalize existing additive and\ncomponent-partitioned Runge-Kutta methods, and allow one to distribute\ndifferent types of implicitness within nonlinear terms. The paper introduces\nthe NPRK framework and discusses order conditions, linear stability, and the\nderivation of implicit-explicit and implicit-implicit NPRK integrators. The\npaper concludes with numerical experiments that demonstrate the utility of NPRK\nmethods for solving viscous Burger's and the gray thermal radiation transport\nequations.\n"", 'Projective Integration Methods in the Runge-Kutta Framework and the\n Extension to Adaptivity in Time Projective Integration methods are explicit time integration schemes for\nstiff ODEs with large spectral gaps. In this paper, we show that all existing\nProjective Integration methods can be written as Runge-Kutta methods with an\nextended Butcher tableau including many stages. We prove consistency and order\nconditions of the Projective Integration methods using the Runge-Kutta\nframework. Spatially adaptive Projective Integration methods are included via\npartitioned Runge-Kutta methods. New time adaptive Projective Integration\nschemes are derived via embedded Runge-Kutta methods and step size variation\nwhile their accuracy, stability, convergence, and error estimators are\ninvestigated analytically and numerically.\n', 'Isomeric trees and the order of Runge--Kutta methods The conditions for a Runge--Kutta method to be of order $p$ with $p\\ge 5$ for\na scalar non-autonomous problem are a proper subset of the order conditions for\na vector problem. Nevertheless, Runge--Kutta methods that were derived\nhistorically only for scalar problems happened to be of the same order for\nvector problems. We relate the order conditions for scalar problems to\nfactorisations of the Runge--Kutta trees into ""atomic stumps"" and enumerate\nthose conditions up to $p=20$. Using a special search procedure over\nunsatisfied order conditions, new Runge--Kutta methods of ""ambiguous orders""\nfive and six are constructed. These are used to verify the validity of the\nresults.\n']","[('runge kutta methods', 0.7596908807754517), ('implicit runge kutta', 0.7253571152687073), ('explicit runge kutta', 0.7182224988937378), ('runge kutta schemes', 0.6665934324264526), ('kutta methods', 0.6515488028526306), ('exponential runge kutta', 0.5916427969932556), ('runge kutta', 0.5840024948120117), ('kutta schemes', 0.5380933880805969), ('runge kutta rk', 0.532291829586029), ('stage runge kutta', 0.5319293737411499)]" 204,204,139,204_stirling numbers kinds_terms stirling numbers_stirling numbers_polynomials stirling,"['stirling numbers kinds', 'terms stirling numbers', 'stirling numbers', 'polynomials stirling', 'numbers stirling', 'stirling numbers first', 'stirling numbers second', 'terms stirling', 'stirling', 'bernoulli numbers polynomials']","['Study on r-truncated degenerate stirling numbers of the second kind The degenerate Stirling numbers of the second kind and of the first kind,\nwhich are respectively degenerate versions of the Stirling numbers of the\nsecond kind and of the first kind, appear frequently when we study various\ndegenerate versions of some special numbers and polynomials. The aim of this\npaper is to consider the r-truncated degenerate Stirling numbers of the second\nkind, which reduce to the degenerate Stirling numbers of the second for r = 1,\nand to investigate their explicit expressions, some properties and related\nidentities, in connection with several other degenerate special numbers and\npolynomials.\n', 'Some formulas for fully degenerate Bernoulli numbers and polynomials The aim of this paper is to study the fully degenerate Bernoulli polynomials\nand numbers, which are a degenerate version of Bernoulli polynomials and\nnumbers and arise naturally from the Volkenborn integral of the degenerate\nexponential functions on Zp. We find some explicit expressions for the fully\ndegenerate Bernoulli polynomials and numbers in terms of the degenerate\nStirling numbers of the second kind, the degenerate r-Stirling numbers of the\nsecond kind and of the degenerate Stirling polynomials.\n We also consider the degenerate poly-Bernoulli polynomials and derive\nexplicit representations for them in terms of the same degenerate Stirling\nnumbers and polynomials.\n', 'Multi-Stirling numbers of the second kind The multi-Stirling numbers of the second kind, the unsigned multi-Stirling\nnumbers of the first kind, the multi-Lah numbers and the multi-Bernoulli\nnumbers are all defined with the help of the multiple logarithm, and generalize\nrespectively the Stirling numbers of the second kind, the unsigned Stirling\nnumbers of the first kind, the unsigned Lah numbers and the higher-order\nBernoulli numbers . The aim of this paper is to introduce the multi-Stirling\nnumbers of the second kind and to find several identities involving those four\nnumbers defined by means of the multiple logarithm and some other special\nnumbers.\n']","[('stirling numbers kinds', 0.7485108375549316), ('terms stirling numbers', 0.7479015588760376), ('stirling numbers', 0.7401047348976135), ('polynomials stirling', 0.6981662511825562), ('numbers stirling', 0.6916183829307556), ('stirling numbers first', 0.682701826095581), ('stirling numbers second', 0.6730840802192688), ('terms stirling', 0.6224032640457153), ('stirling', 0.5626400709152222), ('bernoulli numbers polynomials', 0.5191471576690674)]" 205,205,138,205_large language models_models large language_language models_language models llms,"['large language models', 'models large language', 'language models', 'language models llms', 'large language', 'natural language', 'semantic', 'language processing', 'natural language processing', 'question answering']","['Extending Context Window of Large Language Models via Semantic\n Compression Transformer-based Large Language Models (LLMs) often impose limitations on\nthe length of the text input to ensure the generation of fluent and relevant\nresponses. This constraint restricts their applicability in scenarios involving\nlong texts. We propose a novel semantic compression method that enables\ngeneralization to texts that are 6-8 times longer, without incurring\nsignificant computational costs or requiring fine-tuning. Our proposed\nframework draws inspiration from source coding in information theory and\nemploys a pre-trained model to reduce the semantic redundancy of long inputs\nbefore passing them to the LLMs for downstream tasks. Experimental results\ndemonstrate that our method effectively extends the context window of LLMs\nacross a range of tasks including question answering, summarization, few-shot\nlearning, and information retrieval. Furthermore, the proposed semantic\ncompression method exhibits consistent fluency in text generation while\nreducing the associated computational overhead.\n', 'LLMs4OL: Large Language Models for Ontology Learning We propose the LLMs4OL approach, which utilizes Large Language Models (LLMs)\nfor Ontology Learning (OL). LLMs have shown significant advancements in natural\nlanguage processing, demonstrating their ability to capture complex language\npatterns in different knowledge domains. Our LLMs4OL paradigm investigates the\nfollowing hypothesis: \\textit{Can LLMs effectively apply their language pattern\ncapturing capability to OL, which involves automatically extracting and\nstructuring knowledge from natural language text?} To test this hypothesis, we\nconduct a comprehensive evaluation using the zero-shot prompting method. We\nevaluate nine different LLM model families for three main OL tasks: term\ntyping, taxonomy discovery, and extraction of non-taxonomic relations.\nAdditionally, the evaluations encompass diverse genres of ontological\nknowledge, including lexicosemantic knowledge in WordNet, geographical\nknowledge in GeoNames, and medical knowledge in UMLS.\n', 'The structure of the token space for large language models Large language models encode the correlational structure present in natural\nlanguage by fitting segments of utterances (tokens) into a high dimensional\nambient latent space upon which the models then operate. We assert that in\norder to develop a foundational, first-principles understanding of the behavior\nand limitations of large language models, it is crucial to understand the\ntopological and geometric structure of this token subspace. In this article, we\npresent estimators for the dimension and Ricci scalar curvature of the token\nsubspace, and apply it to three open source large language models of moderate\nsize: GPT2, LLEMMA7B, and MISTRAL7B. In all three models, using these\nmeasurements, we find that the token subspace is not a manifold, but is instead\na stratified manifold, where on each of the individual strata, the Ricci\ncurvature is significantly negative. We additionally find that the dimension\nand curvature correlate with generative fluency of the models, which suggest\nthat these findings have implications for model behavior.\n']","[('large language models', 0.6745694279670715), ('models large language', 0.6613578200340271), ('language models', 0.6285194158554077), ('language models llms', 0.6220681071281433), ('large language', 0.5030139088630676), ('natural language', 0.48940861225128174), ('semantic', 0.4731389284133911), ('language processing', 0.4725210964679718), ('natural language processing', 0.4712941348552704), ('question answering', 0.4524381756782532)]" 206,206,137,206_fractional order_nonlinear fractional_order fractional_systems fractional,"['fractional order', 'nonlinear fractional', 'order fractional', 'systems fractional', 'fractional differential equations', 'system fractional', 'fractional differential', 'fractional linear', 'generalized fractional', 'linear fractional']","[""On fractional-order maps and their synchronization We study the stability of linear fractional order maps. We show that in the\nstable region, the evolution is described by Mittag-Leffler functions and a\nwell defined effective Lyapunov exponent can be obtained in these cases. For\none-dimensional systems, this exponent can be related to the corresponding\nfractional differential equation. A fractional equivalent of map $f(x)=ax$ is\nstable for $a_c(\\alpha)1$, and $x\\in\n\\pi_{*}(R)$ an arbitrary element in positive degree. Finally, we examine the\ngeneral framework to describe the topological Hochschild homology of 2-local\nconnective self-conjugate K-theory, $ksc_2$.\n']","[('topological hochschild homology', 0.6562371253967285), ('hochschild homology', 0.6160762906074524), ('topological hochschild', 0.5628445744514465), ('cyclic homology', 0.4990852475166321), ('ring spectra', 0.46829837560653687), ('adams spectral sequence', 0.46244993805885315), ('theory spectrum', 0.4596623182296753), ('thom spectra', 0.443885862827301), ('homology', 0.433401495218277), ('ring spectrum', 0.43092745542526245)]" 209,209,135,209_blockchain_blockchains_cryptocurrencies_cryptocurrency,"['blockchain', 'blockchains', 'cryptocurrencies', 'cryptocurrency', 'bitcoin', 'cryptographic', 'decentralization', 'adversary', 'decentralized', 'consensus protocols']","['Instantaneous and limiting behavior of an n-node blockchain under cyber\n attacks from a single hacker We investigate the instantaneous and limiting behavior of an n-node\nblockchain which is under continuous monitoring of the IT department of a\ncompany but faces non-stop cyber attacks from a single hacker. The blockchain\nis functional as far as no data stored on it has been changed, deleted, or\nlocked. Once the IT department detects the attack from the hacker, it will\nimmediately re-set the blockchain, rendering all previous efforts of the hacker\nin vain. The hacker will not stop until the blockchain is dysfunctional. For\narbitrary distributions of the hacking times and detecting times, we derive the\nlimiting functional probability, instantaneous functional probability, and mean\nfunctional time of the blockchain. We also show that all these quantities are\nincreasing functions of the number of nodes, substantiating the intuition that\nthe more nodes a blockchain has, the harder it is for a hacker to succeed in a\ncyber attack.\n', 'SoK of Used Cryptography in Blockchain The underlying fundaments of blockchain are cryptography and cryptographic\nconcepts that provide reliable and secure decentralized solutions. Although\nmany recent papers study the use-cases of blockchain in different industrial\nareas, such as finance, health care, legal relations, IoT, information\nsecurity, and consensus building systems, only few studies scrutinize the\ncryptographic concepts used in blockchain. To the best of our knowledge, there\nis no Systematization of Knowledge (SoK) that gives a complete picture of the\nexisting cryptographic concepts which have been deployed or have the potential\nto be deployed in blockchain. In this paper, we thoroughly review and\nsystematize all cryptographic concepts which are already used in blockchain.\nAdditionally, we give a list of cryptographic concepts which have not yet been\napplied but have big potentials to improve the current blockchain solutions. We\nalso include possible instantiations of these cryptographic concepts in the\nblockchain domain. Last but not least, we explicitly postulate 21 challenging\nproblems that cryptographers interested in blockchain can work on.\n', 'Sensitivity-Based Optimization for Blockchain Selfish Mining In this paper, we provide a novel dynamic decision method of blockchain\nselfish mining by applying the sensitivity-based optimization theory. Our aim\nis to find the optimal dynamic blockchain-pegged policy of the dishonest mining\npool. To study the selfish mining attacks, two mining pools is designed by\nmeans of different competitive criterions, where the honest mining pool follows\na two-block leading competitive criterion, while the dishonest mining pool\nfollows a modification of two-block leading competitive criterion through using\na blockchain-pegged policy. To find the optimal blockchain-pegged policy, we\nset up a policy-based continuous-time Markov process and analyze some key\nfactors. Based on this, we discuss monotonicity and optimality of the long-run\naverage profit with respect to the blockchain-pegged reward and prove the\nstructure of the optimal blockchain-pegged policy. We hope the methodology and\nresults derived in this paper can shed light on the dynamic decision research\non the selfish mining attacks of blockchain selfish mining.\n']","[('blockchain', 0.6430567502975464), ('blockchains', 0.6253762245178223), ('cryptocurrencies', 0.5491183400154114), ('cryptocurrency', 0.5303803086280823), ('bitcoin', 0.43706247210502625), ('cryptographic', 0.41960352659225464), ('decentralization', 0.3910648822784424), ('adversary', 0.37378689646720886), ('decentralized', 0.35031116008758545), ('consensus protocols', 0.34958553314208984)]" 210,210,135,210_sasakian manifolds_sasakian manifold_sasakian structure_contact manifolds,"['sasakian manifolds', 'sasakian manifold', 'sasakian structure', 'contact manifolds', 'dimensional sasakian', 'contact manifold', 'manifolds generalized', 'manifolds', 'sasakian', 'metric manifolds']","[""Immersions into Sasakian space forms We study immersions of Sasakian manifolds into finite and infinite\ndimensional Sasakian space forms. After proving Calabi's rigidity results in\nthe Sasakian setting, we characterise all homogeneous Sasakian manifolds which\nadmit a (local) Sasakian immersion into a nonelliptic Sasakian space form.\nMoreover, we give a characterisation of homogeneous Sasakian manifolds which\ncan be embedded into the standard sphere both in the compact and noncompact\ncase.\n"", 'Characterization of Sasakian manifolds Weak contact metric manifolds, i.e., the linear complex structure on the\ncontact distribution is replaced by a nonsingular skew-symmetric tensor,\ndefined by the author and R. Wolak, allowed us to take a new look at the theory\nof contact manifolds. In this paper, we continue our study, see\narXiv:2312.11411, of a structure of this type, called a weak nearly Sasakian\nstructure, and prove two theorems characterizing Sasakian manifolds. Our main\nresult generalizes the theorem by A. Nicola - G. Dileo - I. Yudin (2018) and\nprovides a new criterion for a weak almost contact metric manifold to be\nSasakian.\n', 'Nearly Sasakian geometry and $SU(2)$-structures We carry on a systematic study of nearly Sasakian manifolds. We prove that\nany nearly Sasakian manifold admits two types of integrable distributions with\ntotally geodesic leaves which are, respectively, Sasakian or $5$-dimensional\nnearly Sasakian manifolds. As a consequence, any nearly Sasakian manifold is a\ncontact manifold. Focusing on the $5$-dimensional case, we prove that there\nexists a one-to-one correspondence between nearly Sasakian structures and a\nspecial class of nearly hypo $SU(2)$-structures. By deforming such a\n$SU(2)$-structure one obtains in fact a Sasaki-Einstein structure. Further we\nprove that both nearly Sasakian and Sasaki-Einstein $5$-manifolds are endowed\nwith supplementary nearly cosymplectic structures. We show that there is a\none-to-one correspondence between nearly cosymplectic structures and a special\nclass of hypo $SU(2)$-structures which is again strictly related to\nSasaki-Einstein structures. Furthermore, we study the orientable hypersurfaces\nof a nearly K\\""{a}hler 6-manifold and, in the last part of the paper, we define\ncanonical connections for nearly Sasakian manifolds, which play a role similar\nto the Gray connection in the context of nearly K\\""{a}hler geometry. In\ndimension $5$ we determine a connection which parallelizes all the nearly\nSasakian $SU(2)$-structure as well as the torsion tensor field. An analogous\nresult holds also for Sasaki-Einstein structures.\n']","[('sasakian manifolds', 0.8546037077903748), ('sasakian manifold', 0.8408783078193665), ('sasakian structure', 0.7040027379989624), ('contact manifolds', 0.617522120475769), ('dimensional sasakian', 0.607700765132904), ('contact manifold', 0.5900172591209412), ('manifolds generalized', 0.5639322400093079), ('manifolds', 0.5558815598487854), ('sasakian', 0.5557929873466492), ('metric manifolds', 0.5501869916915894)]" 211,211,134,211_uniform hypergraphs_uniform hypergraph_vertex uniform hypergraph_uniform hypergraph vertices,"['uniform hypergraphs', 'uniform hypergraph', 'vertex uniform hypergraph', 'uniform hypergraph vertices', 'hypergraphs', 'hypergraph', 'hypergraph vertices', 'vertex uniform', 'hypergraph mathcal', 'edges uniform']","[""Hypergraphs with arbitrarily small codegree Tur\\'an density Let $k\\geq 3$. Given a $k$-uniform hypergraph $H$, the minimum codegree\n$\\delta(H)$ is the largest $d\\in\\mathbb{N}$ such that every $(k-1)$-set of\n$V(H)$ is contained in at least $d$ edges. Given a $k$-uniform hypergraph $F$,\nthe codegree Tur\\'an density $\\gamma(F)$ of $F$ is the smallest $\\gamma \\in\n[0,1]$ such that every $k$-uniform hypergraph on $n$ vertices with\n$\\delta(H)\\geq (\\gamma + o(1))n$ contains a copy of $F$. Similarly as other\nvariants of the hypergraph Tur\\'an problem, determining the codegree Tur\\'an\ndensity of a hypergraph is in general notoriously difficult and only few\nresults are known.\n In this work, we show that for every $\\varepsilon>0$, there is a $k$-uniform\nhypergraph $F$ with $0<\\gamma(F)<\\varepsilon$. This is in contrast to the\nclassical Tur\\'an density, which cannot take any value in the interval\n$(0,k!/k^k)$ due to a fundamental result by Erd\\H{o}s.\n"", ""Hypergraphs with a quarter uniform Tur\\'an density The uniform Tur\\'an density $\\pi_{1}(F)$ of a $3$-uniform hypergraph $F$ is\nthe supremum over all $d$ for which there is an $F$-free hypergraph with the\nproperty that every linearly sized subhypergraph with density at least $d$.\nDetermining $\\pi_{1}(F)$ for given hypergraphs $F$ was suggested by Erd\\H{o}s\nand S\\'os in 1980s. In particular, they raised the questions of determining\n$\\pi_{1}(K_4^{(3)-})$ and $\\pi_{1}(K_4^{(3)})$. The former question was solved\nrecently in [Israel J. Math. 211 (2016), 349-366] and [J. Eur. Math. Soc. 20\n(2018), 1139-1159], while the latter is still a major open problem. In addition\nto $K_4^{(3)-}$, there are very few hypergraphs whose uniform Tur\\'an density\nhas been determined.\n In this paper, we give a sufficient condition for $3$-uniform hypergraphs $F$\nsatisfying $\\pi_{1}(F)=1/4$. In particular, currently all known $3$-uniform\nhypergraphs whose uniform Tur\\'an density is $1/4$, such as $K_4^{(3)-}$ and\nthe $3$-uniform hypergraphs $F^{\\star}_5$ studied in [arXiv:2211.12747],\nsatisfy this condition. Moreover, we find some intriguing $3$-uniform\nhypergraphs whose uniform Tur\\'an density is also $1/4$.\n"", 'Uniform Tur\\\'an density of cycles In the early 1980s, Erd\\H{o}s and S\\\'os initiated the study of the classical\nTur\\\'an problem with a uniformity condition: the uniform Tur\\\'an density of a\nhypergraph $H$ is the infimum over all $d$ for which any sufficiently large\nhypergraph with the property that all its linear-size subhyperghraphs have\ndensity at least $d$ contains $H$. In particular, they raise the questions of\ndetermining the uniform Tur\\\'an densities of $K_4^{(3)-}$ and $K_4^{(3)}$. The\nformer question was solved only recently in [Israel J. Math. 211 (2016),\n349-366] and [J. Eur. Math. Soc. 20 (2018), 1139-1159], while the latter still\nremains open for almost 40 years. In addition to $K_4^{(3)-}$, the only\n$3$-uniform hypergraphs whose uniform Tur\\\'an density is known are those with\nzero uniform Tur\\\'an density classified by Reiher, R\\""odl and Schacht [J.\nLondon Math. Soc. 97 (2018), 77-97] and a specific family with uniform Tur\\\'an\ndensity equal to $1/27$.\n We develop new tools for embedding hypergraphs in host hypergraphs with\npositive uniform density and apply them to completely determine the uniform\nTur\\\'an density of a fundamental family of $3$-uniform hypergraphs, namely\ntight cycles $C_\\ell^{(3)}$. The uniform Tur\\\'an density of $C_\\ell^{(3)}$,\n$\\ell\\ge 5$, is equal to $4/27$ if $\\ell$ is not divisible by three, and is\nequal to zero otherwise. The case $\\ell=5$ resolves a problem suggested by\nReiher.\n']","[('uniform hypergraphs', 0.6745749711990356), ('uniform hypergraph', 0.6396881341934204), ('vertex uniform hypergraph', 0.6321499943733215), ('uniform hypergraph vertices', 0.6197741627693176), ('hypergraphs', 0.5528275370597839), ('hypergraph', 0.486235648393631), ('hypergraph vertices', 0.4686743915081024), ('vertex uniform', 0.4661359190940857), ('hypergraph mathcal', 0.4618501663208008), ('edges uniform', 0.3937348425388336)]" 212,212,133,212_transitive tournaments_transitive tournament_tournaments_regular tournaments,"['transitive tournaments', 'transitive tournament', 'tournaments', 'regular tournaments', 'tournament', 'vertex disjoint cycles', 'every vertex', 'free vertex', 'vertex disjoint', 'free digraphs']","[""Construction, Extension and Paths of Near-Homogeneous Tournaments A homogeneous tournament is a tournament with $4t+3$ vertices such that every\narc is contained in exactly $t+1$ cycles of length $3$. Homogeneous tournaments\nare the first class of tournaments that are proved to be path extendable, which\nmeans that every nonhamiltonian path $P$ in such a tournament $T$ can be\nextended to a path $P'$ with the same initial and terminal vertex and\n$V(P')=V(P)\\cup \\{u\\}$ for a certain vertex $u\\in V(T)\\backslash V(P)$. In\norder to find more path extendable tournaments we study the generalization of\nhomogeneous tournaments called near-homogeneous tournaments, in which every arc\nis contained in $t$ or $t+1$ cycles of length $3$. Near-homogeneity has been\ndefined in tournaments with $4t+1$ vertices. In this paper, we raise a new\nmethod to construct near-homogeneous tournaments with $4t+1$ vertices. We then\nshow that the definition of near-homogeneous tournament can be extended to\ntournaments with an even number of vertices. Finally we verify path\nextendability of near-homogeneous tournaments, thus expand the class of path\nextendable tournaments.\n"", 'On unimodular tournaments A tournament is unimodular if the determinant of its skew-adjacency matrix is\n$1$. In this paper, we give some properties and constructions of unimodular\ntournaments. A unimodular tournament $T$ with skew-adjacency matrix $S$ is\ninvertible if $S^{-1}$ is the skew-adjacency matrix of a tournament. A spectral\ncharacterization of invertible tournaments is given. Lastly, we show that every\n$n$-tournament can be embedded in a unimodular tournament by adding at most $n\n- \\lfloor\\log_2(n)\\rfloor$ vertices.\n', 'Walecki tournaments with an arc that lies in a unique directed triangle A Walecki tournament is any tournament that can be formed by choosing an\norientation for each of the Hamilton cycles in the Walecki decomposition of a\ncomplete graph on an odd number of vertices. In this paper, we show that if\nsome arc in a Walecki tournament on at least $7$ vertices lies in exactly one\ndirected triangle, then there is a vertex of the tournament (the vertex\ntypically labelled $*$ in the decomposition) that is fixed under every\nautomorphism of the tournament. Furthermore, any isomorphism between such\nWalecki tournaments maps the vertex labelled $*$ in one to the vertex labelled\n$*$ in the other.\n We also show that among Walecki tournaments with a signature of even length\n$2k$, of the $2^{2k}$ possible signatures, at least $2^k$ produce tournaments\nthat have an arc that lies in a unique directed triangle (and therefore to\nwhich our result applies).\n']","[('transitive tournaments', 0.678771436214447), ('transitive tournament', 0.6662575602531433), ('tournaments', 0.6263172626495361), ('regular tournaments', 0.6193611025810242), ('tournament', 0.5587193965911865), ('vertex disjoint cycles', 0.48571351170539856), ('every vertex', 0.48487257957458496), ('free vertex', 0.4404512345790863), ('vertex disjoint', 0.43131786584854126), ('free digraphs', 0.4126645028591156)]" 213,213,132,213_contact manifolds_contact manifold_contact manifold xi_embedded contact homology,"['contact manifolds', 'contact manifold', 'contact manifold xi', 'embedded contact homology', 'contact homology', 'tight contact structures', 'contact structures', 'dimensional contact', 'contact topology', 'contact invariant']","['Bourgeois contact structures: tightness, fillability and applications Given a contact structure on a manifold $V$ together with a supporting open\nbook decomposition, Bourgeois gave an explicit construction of a contact\nstructure on $V \\times \\mathbb{T}^2$. We prove that all such structures are\nuniversally tight in dimension $5$, independent on whether the original contact\nmanifold is itself tight or overtwisted. In arbitrary dimensions, we provide\nobstructions to the existence of strong symplectic fillings of Bourgeois\nmanifolds. This gives a broad class of new examples of weakly but not strongly\nfillable contact $5$-manifolds, as well as the first examples of weakly but not\nstrongly fillable contact structures in all odd dimensions. These obstructions\nare particular instances of more general obstructions for $\\mathbb\nS^1$-invariant contact manifolds. We also obtain a classification result in\narbitrary dimensions, namely that the unit cotangent bundle of the $n$-torus\nhas a unique symplectically aspherical strong filling up to diffeomorphism.\n', 'Liouville hypersurfaces and connect sum cobordisms The purpose of this paper is to introduce Liouville hypersurfaces in contact\nmanifolds, which generalize ribbons of Legendrian graphs and pages of\nsupporting open books. Liouville hypersurfaces are used to define a gluing\noperation for contact manifolds called the Liouville connect sum. Performing\nthis operation on a contact manifold $(M, \\xi)$ gives an exact -- and in many\ncases, Weinstein -- cobordism whose concave boundary is $(M, \\xi)$ and whose\nconvex boundary is the surgered manifold. These cobordisms are used to\nestablish the existence of ""fillability"" and ""non-vanishing contact homology""\nmonoids in symplectomorphism groups of Liouville domains, study the symplectic\nfillability of a family of contact manifolds which fiber over the circle,\nassociate cobordisms to certain branched coverings of contact manifolds, and\nconstruct exact symplectic cobordisms that do not admit Weinstein structures.\n The Liouville connect sum generalizes the Weinstein handle attachment and is\nused to extend the definition of contact $(1/k)$-surgery along Legendrian knots\nin contact 3-manifolds to contact $(1/k)$-surgery along Legendrian spheres in\ncontact manifolds of arbitrary dimension. We use contact surgery to construct\nexotic contact structures on $5$- and $13$-dimensional spheres after\nestablishing that $S^{2}$ and $S^{6}$ are the only spheres along which\ngeneralized Dehn twists smoothly square to the identity mapping. The exoticity\nof these contact structures implies that Dehn twists along $S^{2}$ and $S^{6}$\ndo not symplectically square to the identity, generalizing a theorem of Seidel.\nA similar argument shows that the $(2n+1)$-dimensional contact manifold\ndetermined by an open book whose page is $(T^{*}S^{n}, -\\lambda_{can})$ and\nwhose monodromy is any negative power of a symplectic Dehn twist is not exactly\nfillable.\n', 'Tight contact structures without symplectic fillings are everywhere We show that for all $n \\geq 3$, any $(2n+1)$-dimensional manifold that\nadmits a tight contact structure, also admits a tight but non-fillable contact\nstructure, in the same almost contact class. For $n=2$, we obtain the same\nresult, provided that the first Chern class vanishes. We further construct\nLiouville but not Weinstein fillable contact structures on any Weinstein\nfillable contact manifold of dimension at least $7$ with torsion first Chern\nclass.\n']","[('contact manifolds', 0.777507483959198), ('contact manifold', 0.7404698729515076), ('contact manifold xi', 0.7092123627662659), ('embedded contact homology', 0.6127116680145264), ('contact homology', 0.6088070869445801), ('tight contact structures', 0.6034203171730042), ('contact structures', 0.5913172364234924), ('dimensional contact', 0.5758581161499023), ('contact topology', 0.5757358074188232), ('contact invariant', 0.5666598081588745)]" 214,214,132,214_dyck paths_dyck path_dyck words_dyck,"['dyck paths', 'dyck path', 'dyck words', 'dyck', 'catalan numbers', 'lattice paths', 'paths bijection', 'catalan number', 'catalan', 'paths']","['Restricted Dyck Paths on Valleys Sequence In this paper we study a subfamily of a classic lattice path, the \\emph{Dyck\npaths}, called \\emph{restricted $d$-Dyck} paths, in short $d$-Dyck. A valley of\na Dyck path $P$ is a local minimum of $P$; if the difference between the\nheights of two consecutive valleys (from left to right) is at least $d$, we say\nthat $P$ is a restricted $d$-Dyck path. The \\emph{area} of a Dyck path is the\nsum of the absolute values of $y$-components of all points in the path. We find\nthe number of peaks and the area of all paths of a given length in the set of\n$d$-Dyck paths. We give a bivariate generating function to count the number of\nthe $d$-Dyck paths with respect to the the semi-length and number of peaks.\nAfter that, we analyze in detail the case $d=-1$. Among other things, we give\nboth, the generating function and a recursive relation for the total area.\n', 'Bijections from Dyck and Motzkin meanders with catastrophes to pattern\n avoiding Dyck paths In this note, we present constructive bijections from Dyck and Motzkin\nmeanders with catastrophes to Dyck paths avoiding some patterns. As a\nbyproduct, we deduce correspondences from Dyck and Motzkin excursions to\nrestricted Dyck paths.\n', 'Rational Dyck paths and decompositions We study combinatorial properties of a rational Dyck path by decomposing it\ninto a tuple of Dyck paths. The combinatorial models such as $b$-Stirling\npermutations, $(b+1)$-ary trees, parenthesis presentations, and binary trees\nplay central roles to establish a correspondence between the rational Dyck path\nand the tuple of Dyck paths. We reinterpret two orders, the Young and the\nrotation orders, on rational Dyck paths in terms of the tuple of Dyck paths by\nuse of the decomposition. As an application, we show a duality between\n$(a,b)$-Dyck paths and $(b,a)$-Dyck paths in terms of binary trees.\n']","[('dyck paths', 0.7597846388816833), ('dyck path', 0.6825806498527527), ('dyck words', 0.6171249151229858), ('dyck', 0.5409167408943176), ('catalan numbers', 0.5318599939346313), ('lattice paths', 0.5274518728256226), ('paths bijection', 0.49759259819984436), ('catalan number', 0.4700050354003906), ('catalan', 0.4491305351257324), ('paths', 0.44229578971862793)]" 215,215,131,215_proof fermat last_proof fermat_generalized fermat_fermat last,"['proof fermat last', 'proof fermat', 'generalized fermat', 'fermat last', 'number theory', 'fermat', 'solutions diophantine', 'diophantine equations', 'diophantine', 'number solutions']","[""Remark on Fermat's Last Theorem In this short article we do not prove Fermat's last theorem. We show that the\nnumber 2 is an exceptional number in this theorem.\n"", ""On Fermat's Last Theorem for odd prime exponents We show that the Fermat equation $x^p + y^p = z^p$ has no solutions in\ncoprime positive integers $x, y, z$ for any odd prime $p$.\n"", ""The Cartesian method and Fermat's Last Theorem Fermat's Last Theorem is proved by using the philosophical and mathematical\nknowledge of 1637 when the French mathematician Pierre de Fermat claimed to\nhave a truly marvelous proof of his conjecture. Our approach consists of\nsetting three variables of Fermat's equation as integers and then evaluating\nwhether the remaining variable can be an integer as well. Pythagorean triples\nplay a fundamental role in claiming that at least an irrational number is\nneeded to satisfy Fermat's equation. As a result, we confirm that Fermat's Last\nTheorem is valid.\n""]","[('proof fermat last', 0.724285364151001), ('proof fermat', 0.689723551273346), ('generalized fermat', 0.6710357666015625), ('fermat last', 0.640187680721283), ('number theory', 0.600033700466156), ('fermat', 0.5913141965866089), ('solutions diophantine', 0.4790397584438324), ('diophantine equations', 0.4753640294075012), ('diophantine', 0.45193585753440857), ('number solutions', 0.45116502046585083)]" 216,216,130,216_generalized nash equilibrium_generalized nash_convergence nash equilibrium_nash equilibrium problems,"['generalized nash equilibrium', 'generalized nash', 'convergence nash equilibrium', 'nash equilibrium problems', 'nash equilibrium', 'nash equilibrium gne', 'computing nash', 'stochastic nash', 'nash equilibria', 'nash equilibrium ne']","[""Nash Equilibrium Seeking for Games in Second-order Systems without\n Velocity Measurement The design of Nash equilibrium seeking strategies for games in which the\ninvolved players are of second-order integrator-type dynamics is investigated\nin this paper. Noticing that velocity signals are usually noisy or not\navailable for feedback control in practical engineering systems, this paper\nsupposes that the velocity signals are not accessible for the players. To deal\nwith the absence of velocity measurements, two estimators are designed, based\non which Nash equilibrium seeking strategies are constructed. The first\nstrategy is established by employing an observer, which has the same order as\nthe players' dynamics, to estimate the unavailable system states (e.g., the\nplayers' velocities). The second strategy is designed based on a high-pass\nfilter and is motivated by the incentive to reduce the order of the closed-loop\nsystem which in turn reduces the computation costs of the seeking algorithm.\nExtensions to Nash equilibrium seeking for networked games are provided. Taking\nthe advantages of leader-following consensus protocols, it turns out that both\nthe observer-based method and the filter-based method can be adapted to deal\nwith games in distributed systems, which shows the extensibility of the\ndeveloped strategies. Through Lyapunov stability analysis, it is analytically\nproven that the players' actions can be regulated to the Nash equilibrium point\nand their velocities can be regulated to zero by utilizing the proposed\nvelocity-free Nash equilibrium seeking strategies. A numerical example is\nprovided for the verifications of the proposed algorithms.\n"", 'Stochastic generalized Nash equilibrium seeking under partial-decision\n information We consider for the first time a stochastic generalized Nash equilibrium\nproblem, i.e., with expected-value cost functions and joint feasibility\nconstraints, under partial-decision information, meaning that the agents\ncommunicate only with some trusted neighbours. We propose several distributed\nalgorithms for network games and aggregative games that we show being special\ninstances of a preconditioned forward-backward splitting method. We prove that\nthe algorithms converge to a generalized Nash equilibrium when the forward\noperator is restricted cocoercive by using the stochastic approximation scheme\nwith variance reduction to estimate the expected value of the pseudogradient.\n', ""A distributed generalized Nash equilibrium seeking algorithm based on\n extremum seeking control In this paper, a distributed non-model based seeking algorithm which combines\nthe extremum seeking control (ESC) jointly with learning algorithms is proposed\nto seek a generalized Nash equilibrium (GNE) for a class of noncooperative\ngames with coupled equality constraint. The strategy of each agent is\nrestricted by both the coupled inter-agent constraint and local inequality\nconstraints. Thanks to the ESC, it is unnecessary to know the specific\nexpressions of agents' cost functions and local constraints and to know the\nstrategies of other agents for the implementation of the proposed GNE seeking\nalgorithm. To deal with the coupled constraints, only the Lagrange multiplier\nis transmitted among agents with some prior information about the coupled\nconstraints. Moreover, a diminishing dither signal is designed in the seeking\nalgorithm to remove undesirable steady-state oscillations. The non-local\nconvergence of the designed seeking algorithm is analyzed via the singular\nperturbation theory, averaging analysis and Lyapunov stability theory.\nNumerical examples are given to verify the effectiveness of our proposed\nmethod.\n""]","[('generalized nash equilibrium', 0.6173748970031738), ('generalized nash', 0.6001880764961243), ('convergence nash equilibrium', 0.5711443424224854), ('nash equilibrium problems', 0.5536573529243469), ('nash equilibrium', 0.5495613217353821), ('nash equilibrium gne', 0.536931037902832), ('computing nash', 0.5316476821899414), ('stochastic nash', 0.5308985710144043), ('nash equilibria', 0.5159444808959961), ('nash equilibrium ne', 0.500607430934906)]" 217,217,129,217_neural networks approximation_neural network approximation_relu networks_neural networks relu,"['neural networks approximation', 'neural network approximation', 'relu networks', 'neural networks relu', 'approximation deep', 'shallow neural networks', 'relu neural networks', 'networks approximation', 'deep relu networks', 'shallow networks']","['High-Order Approximation Rates for Shallow Neural Networks with Cosine\n and ReLU$^k$ Activation Functions We study the approximation properties of shallow neural networks with an\nactivation function which is a power of the rectified linear unit.\nSpecifically, we consider the dependence of the approximation rate on the\ndimension and the smoothness in the spectral Barron space of the underlying\nfunction $f$ to be approximated. We show that as the smoothness index $s$ of\n$f$ increases, shallow neural networks with ReLU$^k$ activation function obtain\nan improved approximation rate up to a best possible rate of\n$O(n^{-(k+1)}\\log(n))$ in $L^2$, independent of the dimension $d$. The\nsignificance of this result is that the activation function ReLU$^k$ is fixed\nindependent of the dimension, while for classical methods the degree of\npolynomial approximation or the smoothness of the wavelets used would have to\nincrease in order to take advantage of the dimension dependent smoothness of\n$f$. In addition, we derive improved approximation rates for shallow neural\nnetworks with cosine activation function on the spectral Barron space. Finally,\nwe prove lower bounds showing that the approximation rates attained are optimal\nunder the given assumptions.\n', 'On the Expressive Power of Neural Networks In 1989 George Cybenko proved in a landmark paper that wide shallow neural\nnetworks can approximate arbitrary continuous functions on a compact set. This\nuniversal approximation theorem sparked a lot of follow-up research.\n Shen, Yang and Zhang determined optimal approximation rates for ReLU-networks\nin $L^p$-norms with $p \\in [1,\\infty)$. Kidger and Lyons proved a universal\napproximation theorem for deep narrow ReLU-networks. Telgarsky gave an example\nof a deep narrow ReLU-network that cannot be approximated by a wide shallow\nReLU-network unless it has exponentially many neurons.\n However, there are even more questions that still remain unresolved. Are\nthere any wide shallow ReLU-networks that cannot be approximated well by deep\nnarrow ReLU-networks? Is the universal approximation theorem still true for\nother norms like the Sobolev norm $W^{1,1}$? Do these results hold for\nactivation functions other than ReLU?\n We will answer all of those questions and more with a framework of two\nexpressive powers. The first one is well-known and counts the maximal number of\nlinear regions of a function calculated by a ReLU-network. We will improve the\nbest known bounds for this expressive power. The second one is entirely new.\n', 'Expressivity and Approximation Properties of Deep Neural Networks with\n ReLU$^k$ Activation In this paper, we investigate the expressivity and approximation properties\nof deep neural networks employing the ReLU$^k$ activation function for $k \\geq\n2$. Although deep ReLU networks can approximate polynomials effectively, deep\nReLU$^k$ networks have the capability to represent higher-degree polynomials\nprecisely. Our initial contribution is a comprehensive, constructive proof for\npolynomial representation using deep ReLU$^k$ networks. This allows us to\nestablish an upper bound on both the size and count of network parameters.\nConsequently, we are able to demonstrate a suboptimal approximation rate for\nfunctions from Sobolev spaces as well as for analytic functions. Additionally,\nthrough an exploration of the representation power of deep ReLU$^k$ networks\nfor shallow networks, we reveal that deep ReLU$^k$ networks can approximate\nfunctions from a range of variation spaces, extending beyond those generated\nsolely by the ReLU$^k$ activation function. This finding demonstrates the\nadaptability of deep ReLU$^k$ networks in approximating functions within\nvarious variation spaces.\n']","[('neural networks approximation', 0.6808028221130371), ('neural network approximation', 0.6448177695274353), ('relu networks', 0.6230483055114746), ('neural networks relu', 0.622962236404419), ('approximation deep', 0.6227438449859619), ('shallow neural networks', 0.6220395565032959), ('relu neural networks', 0.6065765619277954), ('networks approximation', 0.5805625915527344), ('deep relu networks', 0.5600453019142151), ('shallow networks', 0.5599812865257263)]" 218,218,129,218_affine springer fibers_springer correspondence_springer fibers_affine springer,"['affine springer fibers', 'springer correspondence', 'springer fibers', 'affine springer', 'springer fiber', 'springer resolution', 'grothendieck springer', 'affine grassmannian', 'character sheaves', 'equivariant perverse sheaves']","['Parabolic Multiplicative Affine Springer Fibers We introduce parabolic multiplicative affine Springer fibers, which resemble\nthe admissible union of affine Deligne Lusztig varieties in the affine flag\nvariety. We also study their global counterparts called parabolic\nmultiplicative Hitchin fibers. Their associated fibration is a global analogue\nof the Grothendieck simultaneous resolution for monoids. Using this fibration,\nwe show that the parabolic multiplicative affine Springer fibers are\nequidimensional and find their dimension.\n', ""Geometric and combinatorial properties of extended Springer fibers We consider a generalization of the Springer resolution studied in earlier\nwork of the authors, called the extended Springer resolution. In type $A$, this\nmap plays a role in Lusztig's generalized Springer correspondence comparable to\nthat of the Springer resolution in the Springer correspondence. The fibers of\nthe Springer resolution play a key part in the latter story, and connect the\ncombinatorics of tableaux to geometry. Our main results prove the same is true\nfor fibers of the extended Springer resolution -- their geometry is governed by\nthe combinatorics of tableaux. In particular, we prove that these fibers are\npaved by affines, up to the action of a finite group, and give combinatorial\nformulas for their Betti numbers. This yields, among other things, a simple\nformula for dimensions of stalks of the Lusztig sheaves arising in the study of\nthe generalized Springer correspondence, and shows that there is a close\nresemblance between each Lusztig sheaf and the Springer sheaf for a smaller\ngroup.\n"", ""A new approach to the generalized Springer correspondence The Springer resolution of the nilpotent cone is used to give a geometric\nconstruction of the irreducible representations of Weyl groups. Borho and\nMacPherson obtain the Springer correspondence by applying the decomposition\ntheorem to the Springer resolution, establishing an injective map from the set\nof irreducible Weyl group representations to simple equivariant perverse\nsheaves on the nilpotent cone. In this manuscript, we consider a generalization\nof the Springer resolution using a variety defined by the first author. Our\nmain result shows that in the type A case, applying the decomposition theorem\nto this map yields all simple perverse sheaves on the nilpotent cone with\nmultiplicity as predicted by Lusztig's generalized Springer correspondence.\n""]","[('affine springer fibers', 0.7449814677238464), ('springer correspondence', 0.6732165813446045), ('springer fibers', 0.6547508835792542), ('affine springer', 0.6232429146766663), ('springer fiber', 0.6012454628944397), ('springer resolution', 0.5476800799369812), ('grothendieck springer', 0.5152629017829895), ('affine grassmannian', 0.49460986256599426), ('character sheaves', 0.48753902316093445), ('equivariant perverse sheaves', 0.4613591730594635)]" 219,219,128,219_cyber attacks_cyber security_cyber physical systems_cybersecurity,"['cyber attacks', 'cyber security', 'cyber physical systems', 'cybersecurity', 'cyber physical system', 'attacks', 'proposed attack', 'attack strategy', 'attacks can', 'attack']","['Mathematical Modeling of Cyber Resilience We identify quantitative characteristics of responses to cyber compromises\nthat can be learned from repeatable, systematic experiments. We model a vehicle\nequipped with an autonomous cyber-defense system and which also has some\ninherent physical resilience features. When attacked by malware, this ensemble\nof cyber-physical features (i.e., ""bonware"") strives to resist and recover from\nthe performance degradation caused by the malware\'s attack. We propose\nparsimonious continuous models, and develop stochastic models to aid in\nquantifying systems\' resilience to cyber attacks.\n', 'Security of Distributed Parameter Cyber-Physical Systems: Cyber-Attack\n Detection in Linear Parabolic PDEs Security of Distributed Parameter Cyber-Physical Systems (DPCPSs) is of\ncritical importance in the face of cyber-attack threats. Although security\naspects of Cyber-Physical Systems (CPSs) modelled by Ordinary differential\nEquations (ODEs) have been extensively explored during the past decade,\nsecurity of DPCPSs has not received its due attention despite its\nsafety-critical nature. In this work, we explore the security aspects of DPCPSs\nfrom a system theoretic viewpoint. Specifically, we focus on DPCPSs modelled by\nlinear parabolic Partial Differential Equations (PDEs) subject to cyber-attacks\nin actuation channel. First, we explore the detectability of such attacks and\nderive conditions for stealthy attacks. Next, we develop a design framework for\ncyber-attack detection algorithms based on output injection observers. Such\nattack detection algorithms explicitly consider stability, robustness and\nattack sensitivity in their design. Finally, theoretical analysis and\nsimulation studies are performed to illustrate the effectiveness of the\nproposed approach.\n', 'Method for Extracting Patterns of Coordinated Network Attacks on\n Electric Power CPS based on Temporal-Topological Correlation In the analysis of coordinated network attacks on electric power\ncyber-physical system (CPS), it is difficult to restore the complete attack\npath, and the intent of the attack cannot be identified automatically. A method\nis therefore proposed for the extracting patterns of coordinated network\nattacks on electric power CPS based on temporal-topological correlation. First,\nthe attack events are aggregated according to the alarm log of the cyber space,\nand a temporal-causal Bayesian network-based cyber attack recognition algorithm\nis proposed to parse out the cyber attack sequences of the same attacker. Then,\naccording to the characteristic curves of different attack measurement data in\nphysical space, a combination of physical attack event criteria algorithm is\ndesigned to distinguish the types of physical attack events. Finally, physical\nattack events and cyber attack sequences are matched via temporal-topological\ncorrelation, frequent patterns of attack sequences are extracted, and hidden\nmulti-step attack patterns are found from scattered grid measurement data and\ninformation from alarm logs. The effectiveness and efficiency of the proposed\nmethod are verified by the testbed at Mississippi State University.\n']","[('cyber attacks', 0.5960811376571655), ('cyber security', 0.5716978311538696), ('cyber physical systems', 0.5150355100631714), ('cybersecurity', 0.5114412307739258), ('cyber physical system', 0.48084717988967896), ('attacks', 0.46749699115753174), ('proposed attack', 0.43667083978652954), ('attack strategy', 0.42761877179145813), ('attacks can', 0.41610726714134216), ('attack', 0.4049917757511139)]" 220,220,128,220_complex monge ampere_compact ahler manifold_generalized monge amp_complex monge amp,"['complex monge ampere', 'compact ahler manifold', 'generalized monge amp', 'complex monge amp', 'compact hermitian manifolds', 'plurisubharmonic functions', 'almost hermitian manifolds', 'complex hessian equations', 'compact hermitian manifold', 'complex monge']","['Quasi-plurisubharmonic envelopes 3: Solving Monge-Amp\\`ere equations on\n hermitian manifolds We develop a new approach to $L^{\\infty}$-a priori estimates for degenerate\ncomplex Monge-Amp\\`ere equations on complex manifolds. It only relies on\ncompactness and envelopes properties of quasi-plurisubharmonic functions. In a\nprequel \\cite{GL21a} we have shown how this method allows one to obtain new and\nefficient proofs of several fundamental results in K\\""ahler geometry. In\n\\cite{GL21b} we have studied the behavior of Monge-Amp\\`ere volumes on\nhermitian manifolds. We extend here the techniques of \\cite{GL21a} to the\nhermitian setting and use the bounds established in \\cite{GL21b}, producing new\nrelative a priori estimates, as well as several existence results for\ndegenerate complex Monge-Amp\\`ere equations on compact hermitian manifolds.\n', 'Weak convergence of complex Monge-Amp\\`ere operators on compact\n Hermitian manifolds Let $(X,\\omega)$ be a compact Hermitian manifold and let $\\{\\beta\\}\\in\nH^{1,1}(X,\\mathbb R)$ be a real $(1,1)$-class with a smooth representative\n$\\beta$, such that $\\int_X\\beta^n>0$. Assume that there is a bounded\n$\\beta$-plurisubharmonic function $\\rho$ on $X$. First, we provide a criterion\nfor the weak convergence of non-pluripolar complex Monge-Amp\\`ere measures\nassociated to a sequence of $\\beta$-plurisubharmonic functions. Second, this\ncriterion is utilized to solve a degenerate complex Monge-Amp\\`ere equation\nwith an $L^1$-density. Finally, an $L^\\infty$-estimate of the solution to the\ncomplex Monge-Amp\\`ere equation for a finite positive Radon measure is given.\n', 'The complex Monge-Amp\\`ere equation with a gradient term We consider the complex Monge-Amp\\`ere equation with an additional linear\ngradient term inside the determinant. We prove existence and uniqueness of\nsolutions to this equation on compact Hermitian manifolds.\n']","[('complex monge ampere', 0.5533415079116821), ('compact ahler manifold', 0.531808078289032), ('generalized monge amp', 0.4770559072494507), ('complex monge amp', 0.47291868925094604), ('compact hermitian manifolds', 0.44717714190483093), ('plurisubharmonic functions', 0.4392988979816437), ('almost hermitian manifolds', 0.43361952900886536), ('complex hessian equations', 0.42786210775375366), ('compact hermitian manifold', 0.42713242769241333), ('complex monge', 0.4194831848144531)]" 221,221,127,221_blow solutions_blowup solutions_finite time blow_blow finite time,"['blow solutions', 'blowup solutions', 'finite time blow', 'blow finite time', 'solutions blow', 'solutions semilinear heat', 'blow finite', 'self similar blow', 'blow profiles', 'blow profile']","['Blow up profiles for a quasilinear reaction-diffusion equation with\n weighted reaction We perform a thorough study of the blow up profiles associated to the\nfollowing second order reaction-diffusion equation with non-homogeneous\nreaction: $$ \\partial_tu=\\partial_{xx}(u^m) + |x|^{\\sigma}u^p, $$ in the range\nof exponents $10$. We classify blow up solutions in\nself-similar form, that are likely to represent typical blow up patterns for\ngeneral solutions. We thus show that the non-homogeneous coefficient\n$|x|^{\\sigma}$ has a strong influence on the qualitative aspects related to the\nfinite time blow up. More precisely, for $\\sigma\\sim0$, blow up profiles have\nsimilar behavior to the well-established profiles for the homogeneous case\n$\\sigma=0$, and typically \\emph{global blow up} occurs, while for $\\sigma>0$\nsufficiently large, there exist blow up profiles for which blow up \\emph{occurs\nonly at space infinity}, in strong contrast with the homogeneous case. This\nwork is a part of a larger program of understanding the influence of unbounded\nweights on the blow up behavior for reaction-diffusion equations.\n', 'Global solutions versus finite time blow-up for the supercritical fast\n diffusion equation with inhomogeneous source Solutions in self-similar form, either global in time or presenting finite\ntime blow-up, to the supercritical fast diffusion equation with spatially\ninhomogeneous source $$ \\partial_tu=\\Delta u^m+|x|^{\\sigma}u^p, \\quad\n(x,t)\\in\\mathbb{R}^N\\times(0,\\infty) $$ with $$ m_c=\\frac{(N-2)_+}{N}\\leq m<1,\n\\quad \\sigma\\in(\\max\\{-2,-N\\},\\infty), \\quad\np>\\max\\left\\{1+\\frac{\\sigma(1-m)}{2},1\\right\\} $$ are considered. It is proved\nthat global self-similar solutions with the specific tail behavior $$\nu(x,t)\\sim C(m)|x|^{-2/(1-m)}, \\qquad {\\rm as} \\ |x|\\to\\infty $$ exist exactly\nfor $p\\in(p_F(\\sigma),p_s(\\sigma))$, where $$ p_F(\\sigma)=m+\\frac{\\sigma+2}{N},\n\\qquad p_s(\\sigma)=\\left\\{\\begin{array}{ll}\\frac{m(N+2\\sigma+2)}{N-2}, &\nN\\geq3,\\\\\\infty, & N\\in\\{1,2\\}, \\end{array}\\right. $$ are the renowned Fujita\nand Sobolev critical exponents. In contrast, it is shown that self-similar\nsolutions presenting finite time blow-up exist for any $\\sigma\\in(-2,0)$ and\n$p$ as above, but do not exist for any $\\sigma\\geq0$ and\n$p\\in(p_F(\\sigma),p_s(\\sigma))$. We stress that all these results are \\emph{new\nalso in the homogeneous case $\\sigma=0$}.\n', 'Self-similar blow-up profiles for a reaction-diffusion equation with\n strong weighted reaction We study the self-similar blow-up profiles associated to the following second\norder reaction-diffusion equation with strong weighted reaction and unbounded\nweight: $$ \\partial_tu=\\partial_{xx}(u^m) + |x|^{\\sigma}u^p, $$ posed for\n$x\\in\\real$, $t\\geq0$, where $m>1$, $02(1-p)/(m-1)$. As a\nfirst outcome, we show that finite time blow-up solutions in self-similar form\nexist for $m+p>2$ and $\\sigma$ in the considered range, a fact that is\ncompletely new: in the already studied reaction-diffusion equation without\nweights there is no finite time blow-up when $p<1$. We moreover prove that, if\nthe condition $m+p>2$ is fulfilled, all the self-similar blow-up profiles are\ncompactly supported and there exist \\emph{two different interface behaviors}\nfor solutions of the equation, corresponding to two different interface\nequations. We classify the self-similar blow-up profiles having both types of\ninterfaces and show that in some cases \\emph{global blow-up} occurs, and in\nsome other cases finite time blow-up occurs \\emph{only at space infinity}. We\nalso show that there is no self-similar solution if $m+p<2$, while the critical\nrange $m+p=2$ with $\\sigma>2$ is postponed to a different work due to\nsignificant technical differences.\n']","[('blow solutions', 0.5712755918502808), ('blowup solutions', 0.5168793201446533), ('finite time blow', 0.5124731063842773), ('blow finite time', 0.49699726700782776), ('solutions blow', 0.48689979314804077), ('solutions semilinear heat', 0.4618259370326996), ('blow finite', 0.44867733120918274), ('self similar blow', 0.4087491035461426), ('blow profiles', 0.40739157795906067), ('blow profile', 0.3804416060447693)]" 222,222,127,222_triangular matrix algebras_multilinear polynomials_multilinear polynomial_upper triangular matrices,"['triangular matrix algebras', 'multilinear polynomials', 'multilinear polynomial', 'upper triangular matrices', 'noncommutative polynomials', 'matrix algebras', 'noncommutative polynomial', 'triangular matrices', 'upper triangular matrix', 'matrix algebra']","['Images of multilinear graded polynomials on upper triangular matrix\n algebras In this paper we study the images of multilinear graded polynomials on the\ngraded algebra of upper triangular matrices UT_n. For positive integers q \\leq\nn, we classify these images on UT_n endowed with a particular elementary\nZ_q-grading. As a consequence, we obtain the images of multilinear graded\npolynomials on UT_n with the natural Z_n-grading. We apply this classification\nin order to give a new condition for a multilinear polynomial in terms of\ngraded identities so that to obtain the traceless matrices in its image on the\nfull matrix algebra. We also describe the images of multilinear polynomials on\nthe graded algebras UT_2 and UT_3, for arbitrary gradings. We finish the paper\nby proving a similar result for the graded Jordan algebra UJ_2, and also for\nUJ_3 endowed with the natural elementary Z_3-grading.\n', 'Images of multilinear polynomials on $n\\times n$ upper triangular\n matrices over infinite fields In this paper we prove that the image of multilinear polynomials evaluated on\nthe algebra $UT_n(K)$ of $n\\times n$ upper triangular matrices over an infinite\nfield $K$ equals $J^r$, a power of its Jacobson ideal $J=J(UT_n(K))$. In\nparticular, this shows that the analogue of the Lvov-Kaplansky conjecture for\n$UT_n(K)$ is true, solving a conjecture of Fagundes and de Mello. To prove that\nfact, we introduce the notion of commutator-degree of a polynomial and\ncharacterize the multilinear polynomials of commutator-degree $r$ in terms of\nits coefficients. It turns out that the image of a multilinear polynomial $f$\non $UT_n(K)$ is $J^r$ if and only if $f$ has commutator degree $r$.\n', 'The image of multilinear polynomials evaluated on $3\\times 3$ upper\n triangular matrices We describe the images of multilinear polynomials of arbitrary degree\nevaluated on the $3\\times 3$ upper triangular matrix algebra over an infinite\nfield.\n']","[('triangular matrix algebras', 0.664170503616333), ('multilinear polynomials', 0.6171737909317017), ('multilinear polynomial', 0.569348156452179), ('upper triangular matrices', 0.5537323951721191), ('noncommutative polynomials', 0.5518999099731445), ('matrix algebras', 0.5478558540344238), ('noncommutative polynomial', 0.537807822227478), ('triangular matrices', 0.5081294178962708), ('upper triangular matrix', 0.4811248183250427), ('matrix algebra', 0.46658605337142944)]" 223,223,126,223_moment dirichlet functions_bounds moments_quadratic dirichlet_moment dirichlet,"['moment dirichlet functions', 'bounds moments', 'quadratic dirichlet', 'moment dirichlet', 'dirichlet functions', 'dirichlet series', 'moments quadratic', 'primitive dirichlet', 'moments functions', 'dirichlet characters']","['Bounds for moments of quadratic Dirichlet $L$-functions of prime-related\n moduli In this paper, we study the $k$-th moment of central values of the family of\nquadratic Dirichlet $L$-functions of moduli $8p$, with $p$ ranging over odd\nprimes. Assuming the truth of the generlized Riemann hypothesis, we establish\nsharp upper and lower bounds for the $k$-th power moment of these $L$-values\nfor all real $k \\geq 0$.\n', 'Upper bounds for moments of Dirichlet $L$-functions to a fixed modulus We study the $2k$-th moment of central values of the family of Dirichlet\n$L$-functions to a fixed prime modulus and establish sharp upper bounds for all\nreal $k \\in [0,2]$.\n', 'First moment of central values of quadratic Dirichlet $L$-functions We evaluate the first moment of central values of the family of quadratic\nDirichlet $L$-functions using the method of double Dirichlet series. Under the\ngeneralized Riemann hypothesis, we prove an asymptotic formula with an error\nterm of size that is the fourth root of that of the primary main term.\n']","[('moment dirichlet functions', 0.6152303814888), ('bounds moments', 0.5331991910934448), ('quadratic dirichlet', 0.5296170711517334), ('moment dirichlet', 0.5251895785331726), ('dirichlet functions', 0.5054897665977478), ('dirichlet series', 0.49832046031951904), ('moments quadratic', 0.4675029516220093), ('primitive dirichlet', 0.450280100107193), ('moments functions', 0.44535931944847107), ('dirichlet characters', 0.44008544087409973)]" 224,224,126,224_mod galois representations_adic galois representations_galois representations_galois representation,"['mod galois representations', 'adic galois representations', 'galois representations', 'galois representation', 'representations absolute galois', 'mod galois', 'adic galois', 'dimensional galois', 'absolute galois group', 'galois group']","['Galois deformation spaces with a sparsity of automorphic points Let $k/\\mathbb F_p$ denote a finite field. For any split connected reductive\ngroup $G/W(k)$ and certain CM number fields $F$, we deform certain Galois\nrepresentations $\\overline\\rho:Gal(\\overline F/F) \\to G(k)$ to continuous\nfamilies $X_{\\overline\\rho}$ of Galois representations $Gal(\\overline F/F) \\to\nG(\\overline{\\mathbb Q_p})$ lifting $\\overline\\rho$ such that the space of\npoints of $X_{\\overline\\rho}$ which are geometric (in the sense of the\nFontaine-Mazur conjecture) with parallel Hodge-Tate weights has positive\ncodimension in $X_{\\overline\\rho}$. Thus the set of points in\n$X_{\\overline\\rho}$ which could (conjecturally) be associated to automorphic\nforms is sparse. This generalizes a result of Calegari and Mazur for $F/\\mathbb\nQ$ quadratic imaginary and $G = GL_2$. The sparsity of automorphic points for\n$F$ a CM field contrasts with the situation when $F$ is a totally real field,\nwhere automorphic points are often provably dense.\n', ""Lifting and automorphy of reducible mod p Galois representations over\n global fields We extend the lifting methods of our previous paper to lift reducible odd\nrepresentations $\\bar{\\rho}:\\mathrm{Gal}(\\overline{F}/F) \\to G(k)$ of Galois\ngroups of global fields $F$ valued in Chevalley groups $G(k)$. Lifting results,\nwhen combined with automorphy lifting results pioneered by Wiles in the number\nfield case and the results on the global Langlands correspondence proved by\nDrinfeld and L. Lafforgue in the function field case, give the only known\nmethod to access modularity of mod $p$ Galois representations in both reducible\nand irreducible cases. In the reducible case this allows one to show that the\nactual representation, rather than just its semisimplification, arises from\nreduction of the geometric representation attached to a cuspidal automorphic\nrepresentation on the dual group of $G$. As a particularly concrete\napplication, we get a version of Serre's modularity conjecture for reducible,\nodd representations $\\bar{\\rho}: \\mathrm{Gal}(\\overline{\\mathbb{Q}}/\\mathbb{Q})\n\\to \\mathrm{GL}_2(k)$. This extends earlier results of Hamblen and Ramakrishna\nin this classical case and proves modularity of infinitely many extensions of\nfixed characters that are not covered by loc. cit.\n"", 'Relative deformation theory, relative Selmer groups, and lifting\n irreducible Galois representations We study irreducible odd mod $p$ Galois representations $\\bar{\\rho} \\colon\n\\mathrm{Gal}(\\overline{F}/F) \\to G(\\overline{\\mathbb{F}}_p)$, for $F$ a totally\nreal number field and $G$ a general reductive group. For $p \\gg_{G, F} 0$, we\nshow that any $\\bar{\\rho}$ that lifts locally, and at places above $p$ to de\nRham and Hodge-Tate regular representations, has a geometric $p$-adic lift. We\nalso prove non-geometric lifting results without any oddness assumption.\n']","[('mod galois representations', 0.6667165756225586), ('adic galois representations', 0.6515649557113647), ('galois representations', 0.5906094908714294), ('galois representation', 0.5586845874786377), ('representations absolute galois', 0.5374079942703247), ('mod galois', 0.5271451473236084), ('adic galois', 0.5196214318275452), ('dimensional galois', 0.44192758202552795), ('absolute galois group', 0.4343925416469574), ('galois group', 0.43356966972351074)]" 225,225,125,225_feynman integrals_feynman integral_mellin barnes integrals_barnes integrals,"['feynman integrals', 'feynman integral', 'mellin barnes integrals', 'barnes integrals', 'feynman', 'feynman diagrams', 'iterated integrals', 'feynman graphs', 'feynman diagram', 'integrals can']","['Yangian Bootstrap for Massive Feynman Integrals We extend the study of the recently discovered Yangian symmetry of massive\nFeynman integrals and its relation to massive momentum space conformal\nsymmetry. After proving the symmetry statements in detail at one and two loop\norders, we employ the conformal and Yangian constraints to bootstrap various\none-loop examples of massive Feynman integrals. In particular, we explore the\ninterplay between Yangian symmetry and hypergeometric expressions of the\nconsidered integrals. Based on these examples we conjecture single series\nrepresentations for all dual conformal one-loop integrals in D spacetime\ndimensions with generic massive propagators.\n', 'On $\\varepsilon$-factorised bases and pure Feynman integrals We investigate $\\varepsilon$-factorised differential equations, uniform\ntranscendental weight and purity for Feynman integrals. We are in particular\ninterested in Feynman integrals beyond the ones which evaluate to multiple\npolylogarithms. We show that a $\\varepsilon$-factorised differential equation\ndoes not necessarily lead to Feynman integrals of uniform transcendental\nweight. We also point out that a proposed definition of purity works locally,\nbut not globally.\n', 'Taming Calabi-Yau Feynman integrals: The four-loop equal-mass banana\n integral Certain Feynman integrals are associated to Calabi-Yau geometries. We\ndemonstrate how these integrals can be computed with the method of differential\nequations. The four-loop equal-mass banana integral is the simplest Feynman\nintegral whose geometry is a non-trivial Calabi-Yau manifold. We show that its\ndifferential equation can be cast into an $\\varepsilon$-factorised form. This\nallows us to obtain the solution to any desired order in the dimensional\nregularisation parameter $\\varepsilon$. The method generalises to other\nCalabi-Yau Feynman integrals. Our calculation also shows that the four-loop\nbanana integral is only minimally more complicated than the corresponding\nFeynman integrals at two or three loops.\n']","[('feynman integrals', 0.7403555512428284), ('feynman integral', 0.6683647036552429), ('mellin barnes integrals', 0.5219870805740356), ('barnes integrals', 0.4940842390060425), ('feynman', 0.4880666434764862), ('feynman diagrams', 0.45908239483833313), ('iterated integrals', 0.4505249559879303), ('feynman graphs', 0.4475223124027252), ('feynman diagram', 0.42262721061706543), ('integrals can', 0.3868654668331146)]" 226,226,125,226_cosmological models_cosmologies_cosmology_cosmological,"['cosmological models', 'cosmologies', 'cosmology', 'cosmological', 'cosmological constant', 'spacetimes', 'spacetime', 'generalized scalar', 'global dynamics', 'friedmann lema']","[""Global dynamics in Einstein-Gauss-Bonnet scalar field cosmology with\n matter We study the dynamics of the field equations in a four-dimensional isotropic\nand homogeneous spatially flat Friedmann--Lema\\^{\\i}tre--Robertson--Walker\ngeometry in the context of Einstein-Gauss-Bonnet theory with a matter source\nand a scalar field coupled to the Gauss-Bonnet scalar. In this theory, the\nGauss-Bonnet term contributes to the field equations. The mass of the scalar\nfield depends on the potential function and the Gauss-Bonnet term. For the\nscalar field potential, we consider the exponential function and the coupling\nfunction between the scalar field and the Gauss-Bonnet scalar is considered to\nbe the linear function. Moreover, the scalar field can have a phantom\nbehaviour. We consider a set of dimensionless variables and write the field\nequations into a system or algebraic-differential equations. For the latter, we\ninvestigate the equilibrium points and their stability properties. In order to\nperform a global analysis of the asymptotic dynamics, we use compactified\nvariables. This gravitational theory can explain the Universe's recent and past\nacceleration phases. Therefore, it can be used as a toy model for studying\ninflation or as a dark energy candidate.\n"", ""Dynamical system analysis in multiscalar-torsion cosmology We explore the phase-space of a multiscalar-torsion gravitational theory\nwithin a cosmological framework characterized by a spatially flat\nFriedmann-Lema\\^{\\i}tre-Robertson-Walker model. Our investigation focuses on\nteleparallelism and involves a gravitational model featuring two scalar fields,\nwhere one scalar field is coupled to the torsion scalar. We consider coupling\nin the two scalar fields' kinetic and potential components. We employ\nexponential functions for the scalar field potentials and analyze the field\nequations' equilibrium points to reconstruct the cosmological evolution.\nRemarkably, we discover many equilibrium points in this multiscalar field\nmodel, capable of describing various eras of cosmological evolution. Hence,\nthis model can be used to describe the early and late time acceleration phases\nof the universe and as a unification model for the elements of the dark sector\nof the universe.\n"", 'Averaging Generalized Scalar Field Cosmologies I: Locally Rotationally\n Symmetric Bianchi III and open Friedmann-Lema\\^itre-Robertson-Walker models Scalar field cosmologies with a generalized harmonic potential and a matter\nfluid with a barotropic Equation of State (EoS) with barotropic index $\\gamma$\nfor Locally Rotationally Symmetric (LRS) Bianchi III metric and open\nFriedmann-Lema\\^itre-Robertson-Walker (FLRW) metric are investigated. Methods\nfrom the theory of averaging of nonlinear dynamical systems are used to prove\nthat time-dependent systems and their corresponding time-averaged versions have\nthe same late-time dynamics. Therefore, simple time-averaged systems determine\nthe future asymptotic behavior. Depending on values of barotropic index\n$\\gamma$ late-time attractors of physical interests for LRS Bianchi III metric\nare Bianchi III flat spacetime, matter dominated FLRW universe (mimicking de\nSitter, quintessence or zero acceleration solutions) and matter-curvature\nscaling solution. For open FLRW metric late-time attractors are a matter\ndominated FLRW universe and Milne solution. With this approach, oscillations\nentering nonlinear system through Klein-Gordon (KG) equation can be controlled\nand smoothed out as the Hubble factor $H$ - acting as a time-dependent\nperturbation parameter - tends monotonically to zero. Numerical simulations are\npresented as evidence of such behaviour.\n']","[('cosmological models', 0.6457900404930115), ('cosmologies', 0.5900131464004517), ('cosmology', 0.5771521329879761), ('cosmological', 0.5542184710502625), ('cosmological constant', 0.5383117198944092), ('spacetimes', 0.41688090562820435), ('spacetime', 0.4100401699542999), ('generalized scalar', 0.4018734395503998), ('global dynamics', 0.38388553261756897), ('friedmann lema', 0.3836749792098999)]" 227,227,124,227_finite posets_boolean lattices_finite poset_boolean lattice,"['finite posets', 'boolean lattices', 'finite poset', 'boolean lattice', 'ramsey number', 'lattices', 'two posets', 'lattice', 'fixed poset', 'posets poset']","['Poset Ramsey number $R(P,Q_n)$. III. Chain Compositions and Antichains An induced subposet $(P_2,\\le_2)$ of a poset $(P_1,\\le_1)$ is a subset of\n$P_1$ such that for every two $X,Y\\in P_2$, $X\\le_2 Y$ if and only if $X\\le_1\nY$. The Boolean lattice $Q_n$ of dimension $n$ is the poset consisting of all\nsubsets of $\\{1,\\dots,n\\}$ ordered by inclusion. Given two posets $P_1$ and\n$P_2$ the poset Ramsey number $R(P_1,P_2)$ is the smallest integer $N$ such\nthat in any blue/red coloring of the elements of $Q_N$ there is either a\nmonochromatically blue induced subposet isomorphic to $P_1$ or a\nmonochromatically red induced subposet isomorphic to $P_2$.\n We provide upper bounds on $R(P,Q_n)$ for two classes of $P$: parallel\ncompositions of chains, i.e.\\ posets consisting of disjoint chains which are\npairwise element-wise incomparable, as well as subdivided $Q_2$, which are\nposets obtained from two parallel chains by adding a common minimal and a\ncommon maximal element. This completes the determination of $R(P,Q_n)$ for\nposets $P$ with at most $4$ elements. If $P$ is an antichain $A_t$ on $t$\nelements, we show that $R(A_t,Q_n)=n+3$ for $3\\le t\\le \\log \\log n$.\nAdditionally, we briefly survey proof techniques in the poset Ramsey setting\n$P$ versus $Q_n$.\n', 'Erd\\H{o}s-Hajnal problems for posets We say that a poset $(Q,\\le_{Q})$ contains an induced copy of a poset\n$(P,\\le_P)$ if there is an injective function $\\phi\\colon P\\to Q$ such that for\nevery two $X,Y\\in P$,\\;\\;$X\\le_P Y$ if and only if $\\phi(X)\\le_Q \\phi(Y)$. We\ndenote the Boolean lattice $(2^{[n]},\\subseteq)$ by $Q_n$. Given a fixed\n$2$-coloring $c$ of a poset $P$, the poset Erd\\H{o}s-Hajnal number of this\ncolored poset is the smallest integer $N$ such that every $2$-coloring of the\nBoolean lattice $Q_N$ contains an induced copy of $P$ colored as in $c$, or a\nmonochromatic induced copy of $Q_n$. We present bounds on the poset\nErd\\H{o}s-Hajnal number of general colored posets, antichains, chains, and\nsmall Boolean lattices. Let the poset Ramsey number $R(Q_n,Q_n)$ be the least\n$N$ such that every $2$-coloring of $Q_N$ contains a monochromatic induced copy\nof $Q_n$. As a corollary, we show that $R(Q_n,Q_n)> 2.02n$, improving on the\nbest known lower bound $2n+1$ by Cox and Stolee \\cite{CS}.\n', ""Poset Ramsey numbers: large Boolean lattice versus a fixed poset Given partially ordered sets (posets) $(P, \\leq_P)$ and $(P', \\leq_{P'})$, we\nsay that $P'$ contains a copy of $P$ if for some injective function $f:\nP\\rightarrow P'$ and for any $X, Y\\in P$, $X\\leq _P Y$ if and only of\n$f(X)\\leq_{P'} f(Y)$. For any posets $P$ and $Q$, the poset Ramsey number\n$R(P,Q)$ is the least positive integer $N$ such that no matter how the elements\nof an $N$-dimensional Boolean lattice are colored in blue and red, there is\neither a copy of $P$ with all blue elements or a copy of $Q$ with all red\nelements. We focus on a poset Ramsey number $R(P, Q_n)$ for a fixed poset $P$\nand an $n$-dimensional Boolean lattice $Q_n$, as $n$ grows large. We show a\nsharp jump in behaviour of this number as a function of $n$ depending on\nwhether or not $P$ contains a copy of either a poset $V$, i.e. a poset on\nelements $A, B, C$ such that $B>C$, $A>C$, and $A$ and $B$ incomparable, or a\nposet $\\Lambda$, its symmetric counterpart. Specifically, we prove that if $P$\ncontains a copy of $V$ or $\\Lambda$ then $R(P, Q_n) \\geq n +\\frac{1}{15}\n\\frac{n}{\\log n}$. Otherwise $R(P, Q_n) \\leq n + c(P)$ for a constant $c(P)$.\nThis gives the first non-marginal improvement of a lower bound on poset Ramsey\nnumbers and as a consequence gives $R(Q_2, Q_n) = n + \\Theta (\\frac{n}{\\log\nn})$.\n""]","[('finite posets', 0.5902584791183472), ('boolean lattices', 0.5295491814613342), ('finite poset', 0.5266969799995422), ('boolean lattice', 0.5074249505996704), ('ramsey number', 0.47793805599212646), ('lattices', 0.44697749614715576), ('two posets', 0.43520626425743103), ('lattice', 0.4315113425254822), ('fixed poset', 0.4097329378128052), ('posets poset', 0.39669737219810486)]" 228,228,123,228_diophantine approximations_simultaneous diophantine approximation_diophantine approximation_multiplicative diophantine approximation,"['diophantine approximations', 'simultaneous diophantine approximation', 'diophantine approximation', 'multiplicative diophantine approximation', 'approximation points', 'diophantine properties', 'approximations', 'approximation systems', 'duffin schaeffer conjecture', 'theory diophantine']","[""Independence inheritance and Diophantine approximation for systems of\n linear forms The classical Khintchine-Groshev theorem is a generalization of Khintchine's\ntheorem on simultaneous Diophantine approximation, from approximation of points\nin $\\mathbb R^m$ to approximation of systems of linear forms in $\\mathbb\nR^{nm}$. In this paper, we present an inhomogeneous version of the\nKhintchine-Groshev theorem which does not carry a monotonicity assumption when\n$nm>2$. Our results bring the inhomogeneous theory almost in line with the\nhomogeneous theory, where it is known by a result of Beresnevich and Velani\n(2010) that monotonicity is not required when $nm>1$. That result resolved a\nconjecture of Beresnevich, Bernik, Dodson, and Velani (2009), and our work\nresolves almost every case of the natural inhomogeneous generalization of that\nconjecture. Regarding the two cases where $nm=2$, we are able to remove\nmonotonicity by assuming extra divergence of a measure sum, akin to a linear\nforms version of the Duffin-Schaeffer conjecture. When $nm=1$ it is known by\nwork of Duffin and Schaeffer (1941) that the monotonicity assumption cannot be\ndropped.\n The key new result is an independence inheritance phenomenon; the underlying\nidea is that the sets involved in the $((n+k)\\times m)$-dimensional\nKhintchine-Groshev theorem ($k\\geq 0$) are always $k$-levels more\nprobabilistically independent than the sets involved the $(n\\times\nm)$-dimensional theorem. Hence, it is shown that Khintchine's theorem itself\nunderpins the Khintchine-Groshev theory.\n"", 'Geometry of Diophantine exponents Diophantine exponents are ones of the simplest quantitative characteristics\nresponsible for the approximation properties of linear subspaces of a Euclidean\nspace. This survey is aimed at describing the current state of the area of\nDiophantine approximation which studies Diophantine exponents and relations\nthey satisfy. We discuss classical Diophantine exponents arising in the problem\nof approximating zero with the set of the values of several linear forms at\ninteger points, their analogues in Diophantine approximation with weights,\nmultiplicative Diophantine exponents, and Diophantine exponents of lattices. We\npay special attention to the transference principle.\n', ""Littlewood and Duffin--Schaeffer-type problems in diophantine\n approximation Gallagher's theorem describes the multiplicative diophantine approximation\nrate of a typical vector. We establish a fully-inhomogeneous version of\nGallagher's theorem, a diophantine fibre refinement, and a sharp and unexpected\nthreshold for Liouville fibres. Along the way, we prove an inhomogeneous\nversion of the Duffin--Schaeffer conjecture for a class of non-monotonic\napproximation functions.\n""]","[('diophantine approximations', 0.6262028813362122), ('simultaneous diophantine approximation', 0.597880482673645), ('diophantine approximation', 0.578723132610321), ('multiplicative diophantine approximation', 0.5503103137016296), ('approximation points', 0.45639529824256897), ('diophantine properties', 0.4476146101951599), ('approximations', 0.44029951095581055), ('approximation systems', 0.4380536377429962), ('duffin schaeffer conjecture', 0.4339927136898041), ('theory diophantine', 0.431474894285202)]" 229,229,122,229_theory operads_symmetric operad_operads_koszul dual,"['theory operads', 'symmetric operad', 'operads', 'koszul dual', 'algebra operad', 'operadic', 'koszul duality', 'operad mathcal', 'operad', 'colored operads']","['Koszul duality for operadic categories The aim of this sequel to arXiv:1812.02935 is to set up the cornerstones of\nKoszul duality and Koszulity in the context of operads over a large class of\noperadic categories. In particular, for these operadic categories we will study\nconcrete examples of binary quadratic operads, describe their Koszul duals and\nprove that they are Koszul. This includes operads whose algebras are the most\nimportant operad- and PROP-like structures such as the classical operads, their\nvariants such as cyclic, modular or wheeled operads, and also diverse versions\nof PROPs such as properads, dioperads, 1/2PROPs, and still more exotic objects\nsuch as permutads and pre-permutads.\n', 'Cliff operads: a hierarchy of operads on words A new hierarchy of operads over the linear spans of $\\delta$-cliffs, which\nare some words of integers, is introduced. These operads are intended to be\nanalogues of the operad of permutations, also known as the associative\nsymmetric operad. We obtain operads whose partial compositions can be described\nin terms of intervals of the lattice of $\\delta$-cliffs. These operads are very\npeculiar in the world of the combinatorial operads since, despite to the\nrelative simplicity for their construction, they are infinitely generated and\nthey have nonquadratic and nonhomogeneous nontrivial relations. We provide a\ngeneral construction for some of their quotients. We use it to endow the spaces\nof permutations, $m$-increasing trees, $c$-rectangular paths, and $m$-Dyck\npaths with operad structures. The operads on $c$-rectangular paths admit, as\nKoszul duals, operads generalizing the duplicial and triplicial operads.\n', 'Operads on graphs: extending the pre-Lie operad and general construction The overall aim of this paper is to define a structure of graph operads, thus\ngeneralizing the celebrated pre-Lie operad on rooted trees. More precisely, we\ndefine two operads on multigraphs, and exhibit a non trivial link between them\nand the pre-Lie and Kontsevich- Willwacher operads. We study one of these\noperads in more detail. While its structure is too involved to exhibit a\ndescription by generators and relations, we show that it has interesting\nfinitely generated sub-operads, with links with the commutative and the\nmagmatic commutative operads. In particular, one of them is Koszul and this\nallows us to compute its Koszul dual. Finally, we introduce a new framework on\nspecies and operads and a general way to define operads on multigraphs.\n']","[('theory operads', 0.668623685836792), ('symmetric operad', 0.6179003119468689), ('operads', 0.5704854726791382), ('koszul dual', 0.5642994046211243), ('algebra operad', 0.5589103102684021), ('operadic', 0.5419183373451233), ('koszul duality', 0.5412489175796509), ('operad mathcal', 0.5288982391357422), ('operad', 0.48933860659599304), ('colored operads', 0.468279093503952)]" 230,230,121,230_adversarial training_adversarial robustness_adversarial attack_adversarial learning,"['adversarial training', 'adversarial robustness', 'adversarial attack', 'adversarial learning', 'adversarial perturbations', 'robustness adversarial', 'adversarially robust', 'adversarial', 'adversarial perturbation', 'models adversarial']","['On the existence of solutions to adversarial training in multiclass\n classification We study three models of the problem of adversarial training in multiclass\nclassification designed to construct robust classifiers against adversarial\nperturbations of data in the agnostic-classifier setting. We prove the\nexistence of Borel measurable robust classifiers in each model and provide a\nunified perspective of the adversarial training problem, expanding the\nconnections with optimal transport initiated by the authors in previous work\nand developing new connections between adversarial training in the multiclass\nsetting and total variation regularization. As a corollary of our results, we\nprove the existence of Borel measurable solutions to the agnostic adversarial\ntraining problem in the binary classification setting, a result that improves\nresults in the literature of adversarial training, where robust classifiers\nwere only known to exist within the enlarged universal $\\sigma$-algebra of the\nfeature space.\n', 'Asymptotic Behavior of Adversarial Training Estimator under\n $\\ell_\\infty$-Perturbation Adversarial training has been proposed to protect machine learning models\nagainst adversarial attacks. This paper focuses on adversarial training under\n$\\ell_\\infty$-perturbation, which has recently attracted much research\nattention. The asymptotic behavior of the adversarial training estimator is\ninvestigated in the generalized linear model. The results imply that the\nasymptotic distribution of the adversarial training estimator under\n$\\ell_\\infty$-perturbation could put a positive probability mass at $0$ when\nthe true parameter is $0$, providing a theoretical guarantee of the associated\nsparsity-recovery ability. Alternatively, a two-step procedure is proposed --\nadaptive adversarial training, which could further improve the performance of\nadversarial training under $\\ell_\\infty$-perturbation. Specifically, the\nproposed procedure could achieve asymptotic variable-selection consistency and\nunbiasedness. Numerical experiments are conducted to show the sparsity-recovery\nability of adversarial training under $\\ell_\\infty$-perturbation and to compare\nthe empirical performance between classic adversarial training and adaptive\nadversarial training.\n', 'Asymptotic Behavior of Adversarial Training in Binary Classification It has been consistently reported that many machine learning models are\nsusceptible to adversarial attacks i.e., small additive adversarial\nperturbations applied to data points can cause misclassification. Adversarial\ntraining using empirical risk minimization is considered to be the\nstate-of-the-art method for defense against adversarial attacks. Despite being\nsuccessful in practice, several problems in understanding generalization\nperformance of adversarial training remain open. In this paper, we derive\nprecise theoretical predictions for the performance of adversarial training in\nbinary classification. We consider the high-dimensional regime where the\ndimension of data grows with the size of the training data-set at a constant\nratio. Our results provide exact asymptotics for standard and adversarial test\nerrors of the estimators obtained by adversarial training with $\\ell_q$-norm\nbounded perturbations ($q \\ge 1$) for both discriminative binary models and\ngenerative Gaussian-mixture models with correlated features. Furthermore, we\nuse these sharp predictions to uncover several intriguing observations on the\nrole of various parameters including the over-parameterization ratio, the data\nmodel, and the attack budget on the adversarial and standard errors.\n']","[('adversarial training', 0.7706649899482727), ('adversarial robustness', 0.7449741959571838), ('adversarial attack', 0.7358807921409607), ('adversarial learning', 0.7340698838233948), ('adversarial perturbations', 0.7311572432518005), ('robustness adversarial', 0.7292900085449219), ('adversarially robust', 0.7230783700942993), ('adversarial', 0.722339928150177), ('adversarial perturbation', 0.7183722257614136), ('models adversarial', 0.7179685831069946)]" 231,231,120,231_symplectic integrators_preserving integrators_explicit symplectic_numerical integrators,"['symplectic integrators', 'preserving integrators', 'explicit symplectic', 'numerical integrators', 'integrators based', 'symplectic geometric', 'integrators', 'construct symplectic', 'symplecticity', 'symplectic']","[""Variational integrators for non-autonomous systems with applications to\n stabilization of multi-agent formations Numerical methods that preserve geometric invariants of the system, such as\nenergy, momentum or the symplectic form, are called geometric integrators.\nVariational integrators are an important class of geometric integrators. The\ngeneral idea for those variational integrators is to discretize Hamilton's\nprinciple rather than the equations of motion in a way that preserves some of\nthe invariants of the original system. In this paper we construct variational\nintegrators with fixed time step for time-dependent Lagrangian systems\nmodelling an important class of autonomous dissipative systems. These\nintegrators are derived via a family of discrete Lagrangian functions each one\nfor a fixed time-step. This allows to recover at each step on the set of\ndiscrete sequences the preservation properties of variational integrators for\nautonomous Lagrangian systems, such as symplecticity or backward error analysis\nfor these systems. We also present a discrete Noether theorem for this class of\nsystems. Applications of the results are shown for the problem of formation\nstabilization of multi-agent systems.\n"", 'The existence of explicit symplectic integrators for general\n nonseparable Hamiltonian systems The existence of explicit symplectic integrators for general nonseparable\nHamiltonian systems is an open and important problem in both numerical analysis\nand computing in science and engineering, as explicit integrators are usually\nmore efficient than the implicit integrators of the same order of accuracy. Up\nto now, all responses to this problem are negative. That is, there exist\nexplicit symplectic integrators only for some special nonseparable Hamiltonian\nsystems, whereas the universal design involving explicit symplectic integrators\nfor general nonseparable Hamiltonian systems has not yet been studied\nsufficiently. In this paper, we present a constructive proof for the existence\nof explicit symplectic integrators for general nonseparable Hamiltonian systems\nvia finding explicit symplectic mappings under which the special submanifold of\nthe extended phase space is invariant. It turns out that the proposed explicit\nintegrators are symplectic in both the extended phase space and the original\nphase space. Moreover, on the basis of the global modified Hamiltonians of the\nproposed integrators, the backward error analysis is made via a parameter\nrelaxation and restriction technique to show the linear growth of global errors\nand the near-preservation of first integrals. In particular, the effective\nestimated time interval is nearly the same as classical implicit symplectic\nintegrators when applied to (near-) integrable Hamiltonian systems. Numerical\nexperiments with a completely integrable nonseparable Hamiltonian and a\nnonintegrable nonseparable Hamiltonian illustrate the good long-term behavior\nand high efficiency of the explicit symplectic integrators proposed and\nanalyzed in this paper.\n', ""Adaptive Hamiltonian Variational Integrators and Symplectic Accelerated\n Optimization It is well known that symplectic integrators lose their near energy\npreservation properties when variable step sizes are used. The most common\napproach to combine adaptive step sizes and symplectic integrators involves the\nPoincar\\'e transformation of the original Hamiltonian. In this article, we\nprovide a framework for the construction of variational integrators using the\nPoincar\\'e transformation. Since the transformed Hamiltonian is typically\ndegenerate, the use of Hamiltonian variational integrators based on Type II or\nType III generating functions is required instead of the more traditional\nLagrangian variational integrators based on Type I generating functions. Error\nanalysis is provided and numerical tests based on the Taylor variational\nintegrator approach of Schmitt, Shingel, Leok (2018) to time-adaptive\nvariational integration of Kepler's 2-Body problem are presented. Finally, we\nuse our adaptive framework together with the variational approach to\naccelerated optimization presented in Wibisono, Wilson, Jordan (2016) to design\nefficient variational and non-variational explicit integrators for symplectic\naccelerated optimization.\n""]","[('symplectic integrators', 0.7407421469688416), ('preserving integrators', 0.6379668712615967), ('explicit symplectic', 0.6196940541267395), ('numerical integrators', 0.6090173721313477), ('integrators based', 0.5934515595436096), ('symplectic geometric', 0.5702683329582214), ('integrators', 0.5688220262527466), ('construct symplectic', 0.5579388737678528), ('symplecticity', 0.5496183037757874), ('symplectic', 0.5482276082038879)]" 232,232,120,232_group testing_testing algorithms_testing group_testing,"['group testing', 'testing algorithms', 'testing group', 'testing', 'tests', 'tests can', 'testing can', 'screening', 'test results', 'test']","['Efficient pooling designs and screening performance in group testing for\n two type defectives Group testing is utilized in the case when we want to find a few defectives\namong large amount of items. Testing n items one by one requires n tests, but\nif the ratio of defectives is small, group testing is an efficient way to\nreduce the number of tests. Many research have been developed for group testing\nfor a single type of defectives. In this paper, we consider the case where two\ntypes of defective A and B exist. For two types of defectives, we develop a\nbelief propagation algorithm to compute marginal posterior probability of\ndefectives. Furthermore, we construct several kinds of collections of pools in\norder to test for A and B. And by utilizing our belief propagation algorithm,\nwe evaluate the performance of group testing by conducting simulations.\n', 'Improved non-adaptive algorithms for threshold group testing with a gap The basic goal of threshold group testing is to identify up to $d$ defective\nitems among a population of $n$ items, where $d$ is usually much smaller than\n$n$. The outcome of a test on a subset of items is positive if the subset has\nat least $u$ defective items, negative if it has up to $\\ell$ defective items,\nwhere $0\\leq\\ell0$, i.e., threshold group testing with a gap. Note that\nthe results presented here are also applicable to the case $g = 0$; however,\nthe results are not as efficient as those in related work. Currently, a few\nreported studies have investigated test designs and decoding algorithms for\nidentifying defective items. Most of the previous studies have not been\nfeasible because there are numerous constraints on their problem settings or\nthe decoding complexities of their proposed schemes are relatively large.\nTherefore, it is compulsory to reduce the number of tests as well as the\ndecoding complexity, i.e., the time for identifying the defective items, for\nachieving practical schemes.\n The work presented here makes five contributions. The first is a more\naccurate theorem for a non-adaptive algorithm for threshold group testing\nproposed by Chen and Fu. The second is an improvement in the construction of\ndisjunct matrices, which are the main tools for tackling (threshold) group\ntesting and other tasks such as constructing cover-free families or learning\nhidden graphs. The third and fourth contributions are a reduced exact upper\nbound on the number of tests and a reduced asymptotic bound on the decoding\ntime for identifying defective items in a noisy setting on test outcomes. The\nfifth contribution is a simulation on the number of tests of the resulting\nimprovements for previous work and the proposed theorems.\n', 'Noisy Group Testing with Side Information Group testing has recently attracted significant attention from the research\ncommunity due to its applications in diagnostic virology. An instance of the\ngroup testing problem includes a ground set of individuals which includes a\nsmall subset of infected individuals. The group testing procedure consists of a\nnumber of tests, such that each test indicates whether or not a given subset of\nindividuals includes one or more infected individuals. The goal of the group\ntesting procedure is to identify the subset of infected individuals with the\nminimum number of tests. Motivated by practical scenarios, such as testing for\nviral diseases, this paper focuses on the following group testing settings: (i)\nthe group testing procedure is noisy, i.e., the outcome of the group testing\nprocedure can be flipped with a certain probability; (ii) there is a certain\namount of side information on the distribution of the infected individuals\navailable to the group testing algorithm. The paper makes the following\ncontributions. First, we propose a probabilistic model, referred to as an\ninteraction model, that captures the side information about the probability\ndistribution of the infected individuals. Next, we present a decoding scheme,\nbased on the belief propagation, that leverages the interaction model to\nimprove the decoding accuracy. Our results indicate that the proposed algorithm\nachieves higher success probability and lower false-negative and false-positive\nrates when compared to the traditional belief propagation especially in the\nhigh noise regime.\n']","[('group testing', 0.6833682656288147), ('testing algorithms', 0.6146312355995178), ('testing group', 0.6007912158966064), ('testing', 0.46701154112815857), ('tests', 0.44760212302207947), ('tests can', 0.4161634147167206), ('testing can', 0.40549060702323914), ('screening', 0.39370203018188477), ('test results', 0.3800652325153351), ('test', 0.37797024846076965)]" 233,233,120,233_supersolvable groups_sylow subgroups_soluble groups_maximal groups,"['supersolvable groups', 'sylow subgroups', 'soluble groups', 'maximal groups', 'subgroups prime', 'sylow subgroup', 'maximal subgroups', 'group maximal', 'subgroups finite groups', 'every maximal subgroup']","['Finite groups with some subgroups of prime power order satisfying the\n partial $ \\Pi $-property Let $ H $ be a subgroup of a finite group $ G $. We say that $ H $ satisfies\nthe partial $ \\Pi $-property in $ G $ if there exists a $G$-chief series $\n\\varGamma_{G}: 1 =G_{0} < G_{1} < \\cdot\\cdot\\cdot < G_{n}= G $ of $ G $ such\nthat $ | G / G_{i-1} : N_{G/G_{i-1}} (HG_{i-1}/G_{i-1}\\cap G_{i}/G_{i-1})| $ is\na $ \\pi (HG_{i-1}/G_{i-1}\\cap G_{i}/G_{i-1}) $-number for every $ G $-chief\nfactor $ G_{i}/G_{i-1} $ of $ \\varGamma_{G} $, $1\\leq i\\leq n$. In this paper,\nwe investigate the structure of a finite group $ G $ under the assumption that\nsome subgroups of prime power order satisfy the partial $ \\Pi $-property.\n', 'On the partial $ \\Pi $-property of some subgroups of prime power order\n of finite groups Let $ H $ be a subgroup of a finite group $ G $. We say that $ H $ satisfies\nthe partial $ \\Pi $-property in $ G $ if if there exists a chief series $\n\\varGamma_{G}: 1 =G_{0} < G_{1} < \\cdot\\cdot\\cdot < G_{n}= G $ of $ G $ such\nthat for every $ G $-chief factor $ G_{i}/G_{i-1} (1\\leq i\\leq n) $ of $\n\\varGamma_{G} $, $ | G / G_{i-1} : N_{G/G_{i-1}} (HG_{i-1}/G_{i-1}\\cap\nG_{i}/G_{i-1})| $ is a $ \\pi (HG_{i-1}/G_{i-1}\\cap G_{i}/G_{i-1}) $-number. In\nthis paper, we study the influence of some subgroups of prime power order\nsatisfying the partial $ \\Pi $-property on the structure of a finite group.\n', 'On the partial $\\Pi$-property of second minimal or second maximal\n subgroups of Sylow subgroups of finite groups Let $ H $ be a subgroup of a finite group $ G $. We say that $ H $ satisfies\nthe partial $ \\Pi $-property in $ G $ if if there exists a chief series $\n\\varGamma_{G}: 1 =G_{0} < G_{1} < \\cdot\\cdot\\cdot < G_{n}= G $ of $ G $ such\nthat for every $ G $-chief factor $ G_{i}/G_{i-1} $ $ (1\\leq i\\leq n) $ of $\n\\varGamma_{G} $, $ | G / G_{i-1} : N_{G/G_{i-1}} (HG_{i-1}/G_{i-1}\\cap\nG_{i}/G_{i-1})| $ is a $ \\pi (HG_{i-1}/G_{i-1}\\cap G_{i}/G_{i-1}) $-number. In\nthis paper, we study the influence of some second minimal or second maximal\nsubgroups of a Sylow subgroup satisfying the partial $ \\Pi $-property on the\nstructure of a finite group.\n']","[('supersolvable groups', 0.5386922359466553), ('sylow subgroups', 0.536287784576416), ('soluble groups', 0.5306892395019531), ('maximal groups', 0.5230377912521362), ('subgroups prime', 0.515872597694397), ('sylow subgroup', 0.5152130126953125), ('maximal subgroups', 0.5071394443511963), ('group maximal', 0.49213021993637085), ('subgroups finite groups', 0.49095532298088074), ('every maximal subgroup', 0.4833085536956787)]" 234,234,119,234_zero divisor graphs_zero divisor graph_divisor graphs_divisor graph,"['zero divisor graphs', 'zero divisor graph', 'divisor graphs', 'divisor graph', 'zero divisors', 'zero divisor', 'divisors', 'finite rings', 'artinian rings', 'graphs finite']","['Induced subgraphs of zero-divisor graphs The zero-divisor graph of a finite commutative ring with unity is the graph\nwhose vertex set is the set of zero-divisors in the ring, with $a$ and $b$\nadjacent if $ab=0$. We show that the class of zero-divisor graphs is universal,\nin the sense that every finite graph is isomorphic to an induced subgraph of a\nzero-divisor graph. This remains true for various restricted classes of rings,\nincluding boolean rings, products of fields, and local rings. But in more\nrestricted classes, the zero-divisor graphs do not form a universal family. For\nexample, the zero-divisor graph of a local ring whose maximal ideal is\nprincipal is a threshold graph; and every threshold graph is embeddable in the\nzero-divisor graph of such a ring. More generally, we give necessary and\nsufficient conditions on a non-local ring for which its zero-divisor graph to\nbe a threshold graph. In addition, we show that there is a countable local ring\nwhose zero-divisor graph embeds the Rado graph, and hence every finite or\ncountable graph, as induced subgraph. Finally, we consider embeddings in\nrelated graphs such as the $2$-dimensional dot product graph.\n', 'Laplacian spectrum of weakly zero-divisor graph of the ring\n $\\mathbb{Z}_{n}$ Let $R$ be a commutative ring with unity. The weakly zero-divisor graph\n$W\\Gamma(R)$ of the ring $R$ is the simple undirected graph whose vertices are\nnonzero zero-divisors of $R$ and two vertices $x$, $y$ are adjacent if and only\nif there exists $r\\in {\\rm ann}(x)$ and $s \\in {\\rm ann}(y)$ such that $rs =0$.\nThe zero-divisor graph of a ring is a spanning subgraph of the weakly\nzero-divisor graph. It is known that the zero-divisor graph of the ring\n$\\mathbb{Z}_{{p^t}}$, where $p$ is a prime, is the Laplacian integral. In this\npaper, we obtain the Laplacian spectrum of the weakly zero-divisor graph\n$W\\Gamma(\\mathbb{Z}_{n})$ of the ring $\\mathbb{Z}_{n}$ and show that\n$W\\Gamma(\\mathbb{Z}_{n})$ is Laplacian integral for arbitrary $n$.\n', 'The characteristic equation and Wiener index of a compressed zero\n divisor graph The Zero divisor Graph of a commutative ring $R$, denoted by $\\Gamma[R]$, is\na graph whose vertices are non-zero zero divisors of R and two vertices are\nadjacent if their product is zero. The compressed zero divisor graph\n$\\Gamma_E[R]$ is the (undirected) graph whose vertices are the equivalence\nclasses such that distinct vertices [r] and [s] are adjacent if and only if rs\n= 0. In this paper we derive the characteristic polynomial and Wiener index of\nthe Compressed zero divisor graph $\\Gamma_{E}[\\mathbb{Z}_m]$ where $m=p^n$ with\nprime $p$.\n']","[('zero divisor graphs', 0.7219559550285339), ('zero divisor graph', 0.6612548232078552), ('divisor graphs', 0.6396285891532898), ('divisor graph', 0.5746139883995056), ('zero divisors', 0.5641082525253296), ('zero divisor', 0.5036260485649109), ('divisors', 0.45058122277259827), ('finite rings', 0.4177694022655487), ('artinian rings', 0.4163259267807007), ('graphs finite', 0.4075069725513458)]" 235,235,118,235_rigid graphs_graphs rigid_global rigidity_globally rigid,"['rigid graphs', 'graphs rigid', 'global rigidity', 'globally rigid', 'combinatorial rigidity', 'locally rigid', 'rigidity theory', 'infinitesimal rigidity', 'infinitesimally rigid', 'rigidity']","['Characterizing Generic Global Rigidity A d-dimensional framework is a graph and a map from its vertices to E^d. Such\na framework is globally rigid if it is the only framework in E^d with the same\ngraph and edge lengths, up to rigid motions. For which underlying graphs is a\ngeneric framework globally rigid? We answer this question by proving a\nconjecture by Connelly, that his sufficient condition is also necessary: a\ngeneric framework is globally rigid if and only if it has a stress matrix with\nkernel of dimension d+1, the minimum possible.\n An alternate version of the condition comes from considering the geometry of\nthe length-squared mapping l: the graph is generically locally rigid iff the\nrank of l is maximal, and it is generically globally rigid iff the rank of the\nGauss map on the image of l is maximal.\n We also show that this condition is efficiently checkable with a randomized\nalgorithm, and prove that if a graph is not generically globally rigid then it\nis flexible one dimension higher.\n', ""Uniquely realisable graphs in polyhedral normed spaces A framework (a straight-line embedding of a graph into a normed space\nallowing edges to cross) is globally rigid if any other framework with the same\nedge lengths with respect to the chosen norm is an isometric copy. We\ninvestigate global rigidity in polyhedral normed spaces: normed spaces where\nthe unit ball is a polytope. We first provide a deterministic algorithm for\nchecking whether or not a framework in a polyhedral normed space is globally\nrigid. After showing that determining if a framework is globally rigid is\nNP-Hard, we then provide necessary conditions for global rigidity for generic\nframeworks. We obtain stronger results for generic frameworks in\n$\\ell_\\infty^d$ (the vector space $\\mathbb{R}^d$ equipped with the\n$\\ell_\\infty$ metric) including an exact characterisation of global rigidity\nwhen $d=2$, and an easily-computable sufficient condition for global rigidity\nusing edge colourings. Our 2-dimensional characterisation also has a surprising\nconsequence: Hendrickson's global rigidity condition fails for generic\nframeworks in $\\ell_\\infty^2$.\n"", 'Minimally globally rigid graphs A graph $G = (V,E)$ is globally rigid in $\\mathbb{R}^d$ if for any generic\nplacement $p : V \\rightarrow \\mathbb{R}^d$ of the vertices, the edge lengths\n$||p(u) - p(v)||, uv \\in E$ uniquely determine $p$, up to congruence. In this\npaper we consider minimally globally rigid graphs, in which the deletion of an\narbitrary edge destroys global rigidity. We prove that if $G=(V,E)$ is\nminimally globally rigid in $\\mathbb{R}^d$ on at least $d+2$ vertices, then\n$|E|\\leq (d+1)|V|-\\binom{d+2}{2}$. This implies that the minimum degree of $G$\nis at most $2d+1$. We also show that the only graph in which the upper bound on\nthe number of edges is attained is the complete graph $K_{d+2}$. It follows\nthat every minimally globally rigid graph in $\\mathbb{R}^d$ on at least $d+3$\nvertices is flexible in $\\mathbb{R}^{d+1}$. As a counterpart to our main result\non the sparsity of minimally globally rigid graphs, we show that in two\ndimensions, dense graphs always contain nontrivial globally rigid subgraphs.\nMore precisely, if some graph $G=(V,E)$ satisfies $|E|\\geq 5|V|$, then $G$\ncontains a subgraph on at least seven vertices that is globally rigid in\n$\\mathbb{R}^2$. If the well-known ""sufficient connectivity conjecture"" is true,\nthen our methods also extend to higher dimensions. Finally, we discuss a\nconjectured strengthening of our main result, which states that if a pair of\nvertices $\\{u,v\\}$ is linked in $G$ in $\\mathbb{R}^{d+1}$, then $\\{u,v\\}$ is\nglobally linked in $G$ in $\\mathbb{R}^d$. We prove this conjecture in the\n$d=1,2$ cases, along with a variety of related results.\n']","[('rigid graphs', 0.6816964745521545), ('graphs rigid', 0.6437137126922607), ('global rigidity', 0.6178087592124939), ('globally rigid', 0.6158517003059387), ('combinatorial rigidity', 0.5606987476348877), ('locally rigid', 0.5557151436805725), ('rigidity theory', 0.5473677515983582), ('infinitesimal rigidity', 0.531781792640686), ('infinitesimally rigid', 0.5274031758308411), ('rigidity', 0.5153154730796814)]" 236,236,118,236_wrapped fukaya category_fukaya categories_fukaya category_wrapped fukaya,"['wrapped fukaya category', 'fukaya categories', 'fukaya category', 'wrapped fukaya', 'fukaya', 'weinstein manifold', 'lefschetz fibrations', 'category symplectic', 'symplectic cohomology', 'symplectic topology']","['Recollements of partially wrapped Fukaya categories and surface cuts In this paper we use recollements to investigate partially wrapped Fukaya\ncategories of surfaces with marked points. In particular, we show that cutting\nsurfaces gives rise to recollements of the corresponding partially wrapped\nFukaya categories. Our approach is based on the fact that the partially wrapped\nFukaya category of a surface with marked points is triangle equivalent to the\nperfect derived category of a homologically smooth and proper graded gentle\nalgebra with zero differential as shown by Haiden, Katzarkov and Kontsevich.\nUsing this, we study particular generators of partially wrapped Fukaya\ncategories, namely full exceptional sequences, silting objects and\nsimple-minded collections. In particular, we fully characterise the existence\nof full exceptional sequences and we give an example of a partially wrapped\nFukaya category which does not admit a silting object, that is a generator with\nno positive self-extensions.\n', 'Prime-localized Weinstein subdomains For any high-dimensional Weinstein domain and finite collection of primes, we\nconstruct a Weinstein subdomain whose wrapped Fukaya category is a localization\nof the original wrapped Fukaya category away from the given primes. When the\noriginal domain is a cotangent bundle, these subdomains form a decreasing\nlattice whose order cannot be reversed.\n Furthermore, we classify the possible wrapped Fukaya categories of Weinstein\nsubdomains of a cotangent bundle of a simply connected, spin manifold, showing\nthat they all coincide with one of these prime localizations. In the process,\nwe describe which twisted complexes in the wrapped Fukaya category of a\ncotangent bundle of a sphere are isomorphic to genuine Lagrangians.\n', 'Sectorial descent for wrapped Fukaya categories We develop a set of tools for doing computations in and of (partially)\nwrapped Fukaya categories. In particular, we prove (1) a descent (cosheaf)\nproperty for the wrapped Fukaya category with respect to so-called Weinstein\nsectorial coverings and (2) that the partially wrapped Fukaya category of a\nWeinstein manifold with respect to a mostly Legendrian stop is generated by the\ncocores of the critical handles and the linking disks to the stop. We also\nprove (3) a `stop removal equals localization\' result, and (4) that the\nFukaya--Seidel category of a Lefschetz fibration with Liouville fiber is\ngenerated by the Lefschetz thimbles. These results are derived from three main\ningredients, also of independent use: (5) a K\\""unneth formula (6) an exact\ntriangle in the Fukaya category associated to wrapping a Lagrangian through a\nLegendrian stop at infinity and (7) a geometric criterion for when a\npushforward functor between wrapped Fukaya categories of Liouville sectors is\nfully faithful.\n']","[('wrapped fukaya category', 0.8007586002349854), ('fukaya categories', 0.7849248647689819), ('fukaya category', 0.7511608600616455), ('wrapped fukaya', 0.6805127263069153), ('fukaya', 0.580398440361023), ('weinstein manifold', 0.5370914340019226), ('lefschetz fibrations', 0.48869144916534424), ('category symplectic', 0.46650996804237366), ('symplectic cohomology', 0.39568957686424255), ('symplectic topology', 0.3822401762008667)]" 237,237,117,237_field theory tqft_theory tqft_tqft_tqfts,"['field theory tqft', 'theory tqft', 'tqft', 'tqfts', 'topological field theories', 'quantum invariants', 'topological theories', 'topological quantum field', 'quantum field theories', 'topological field theory']","['3d TQFTs and 3-manifold invariants This is an invited contribution to the 2nd edition of the Encyclopedia of\nMathematical Physics. We give an overview of 3-dimensional topological quantum\nfield theories (TQFTs) and the corresponding quantum invariants of 3-manifolds.\nWe recall the main algebraic concepts and constructions, such as modular and\nspherical fusion categories, the Witten-Reshetikhin-Turaev and Turaev-Viro\ntheories, and the relation between these two TQFTs. We also briefly discuss\ngeneralizations of these constructions by providing a (non-exhaustive) review\nof some recent works on 3-dimensional extended TQFTs, defect TQFTs, homotopy\nQFTs, and non-semisimple TQFTs.\n', 'Alterfold Topological Quantum Field Theory We introduce the 3-alterfold topological quantum field theory (TQFT) by\nextending the quantum invariant of 3-alterfolds. The bases of the TQFT are\nexplicitly characterized and the Levin-Wen model is naturally interpreted in\n3-alterfold TQFT bases. By naturally considering the RT TQFT and TV TQFT as\nsub-TQFTs within the 3-alterfold TQFT, we establish their equivalence. The\n3-alterfold TQFT is unitary when the input fusion category is unitary.\nAdditionally, we extend the 3-alterfold TQFT to the Morita context and\ndemonstrate that Morita equivalent fusion categories yield equivalent TV TQFTs.\nWe also provide a simple pictorial proof of complete positivity criteria for\nunitary categorization when the 3-alterfold TQFT is unitary. Expanding our\nscope to high-genus surfaces by replacing the torus, we introduce the high\ngenus topological indicators and proving the equivariance under the mapping\nclass group actions.\n', ""Internal Reshetikhin-Turaev TQFT A 3-dimensional topological quantum field theory (TQFT) is a symmetric\nmonoidal functor from the category of 3-cobordisms to the category of vector\nspaces. Such TQFTs provide in particular numerical invariants of closed\n3-manifolds such as the Reshetikhin-Turaev invariants and representations of\nthe mapping class group of closed surfaces. In 1994, using a modular category,\nTuraev explains how to construct a TQFT. In this article, we describe a\ngeneralization of this construction starting from a ribbon category\n$\\mathcal{C}$ with coend. We present a cobordism by a special kind of tangle\nand we associate to the latter a morphism defined between tensorial products of\nthe coend as described by Lyubashenko in 1994. Composing with an\n\\emph{admissible} color and using extension of Kirby calculus on 3-cobordisms,\nthis morphism gives rise to an \\emph{internal} TQFT which takes values in the\nsymmetric monoidal subcategory of transparent objects of $\\mathcal{C}$. When\nthe category $\\mathcal{C}$ is modular, this subcategory is equivalent to the\ncategory of vector spaces. When the category $\\mathcal{C}$ is premodular and\nnormalizable with invertible dimension, our TQFT is a lift of Turaev's one\nassociated to the modularization of $\\mathcal{C}$.\n""]","[('field theory tqft', 0.6776611804962158), ('theory tqft', 0.6675843596458435), ('tqft', 0.6016784310340881), ('tqfts', 0.5927795767784119), ('topological field theories', 0.5793330669403076), ('quantum invariants', 0.5318775773048401), ('topological theories', 0.5271878838539124), ('topological quantum field', 0.5161888003349304), ('quantum field theories', 0.49912288784980774), ('topological field theory', 0.4962679445743561)]" 238,238,117,238_pt symmetric quantum_mathcal pt symmetry_hermitian theories_pt symmetry,"['pt symmetric quantum', 'mathcal pt symmetry', 'hermitian theories', 'pt symmetry', 'mathcal pt symmetric', 'non hermitian physics', 'hermitian physics', 'hermitian systems', 'non hermitian systems', 'non hermitian hamiltonians']","['Energy levels for $\\mathcal{PT}$-symmetric deformation of the Mathieu\n equation We propose a non-Hermitian deformation of the Mathieu equation that preserves\n$\\mathcal{PT}$ symmetry and study its spectrum and the transition from\n$\\mathcal{PT}$-unbroken to $\\mathcal{PT}$-broken phases. We show that our model\nnot only reproduces behaviors expected by the literature but also indicates the\nexistence of a richer structure for the spectrum. We also discuss the influence\nof the boundary condition and the model parameters in the exceptional line that\nmarks the $\\mathcal{PT}$ breaking.\n', 'Distinguishability Transitions in Non-Unitary Boson Sampling Dynamics We discover novel transitions characterized by distinguishability of bosons\nin non-unitary dynamics with parity-time ($\\mathcal{PT}$) symmetry. We show\nthat $\\mathcal{PT}$ symmetry breaking, a unique transition in non-Hermitian\nopen systems, enhances regions in which bosons can be regarded as\ndistinguishable. This means that classical computers can sample the boson\ndistributions efficiently in these regions by sampling the distribution of\ndistinguishable particles. In a $\\mathcal{PT}$-symmetric phase, we find one\ndynamical transition upon which the distribution of bosons deviates from that\nof distinguishable particles, when bosons are initially put at distant sites.\nIf the system enters a $\\mathcal{PT}$-broken phase, the threshold time for the\ntransition is suddenly prolonged, since dynamics of each boson is diffusive\n(ballistic) in the $\\mathcal{PT}$-broken ($\\mathcal{PT}$-symmetric) phase.\nFurthermore, the $\\mathcal{PT}$-broken phase also exhibits a notable dynamical\ntransition on a longer time scale, at which the bosons again become\ndistinguishable. This transition, and hence the classical easiness of sampling\nbosons in long times, are true for generic postselected non-unitary quantum\ndynamics, while it is absent in unitary dynamics of isolated quantum systems.\n$\\mathcal{PT}$ symmetry breaking can also be characterized by the efficiency of\na classical algorithm based on the rank of matrices, which can (cannot)\nefficiently compute the photon distribution in the long-time regime of the\n$\\mathcal{PT}$-broken ($\\mathcal{PT}$-symmetric) phase.\n', '$\\mathcal{PT}$-Symmetry in Hartree-Fock Theory $\\mathcal{PT}$-symmetry --- invariance with respect to combined space\nreflection $\\mathcal{P}$ and time reversal $\\mathcal{T}$ --- provides a weaker\ncondition than (Dirac) Hermiticity for ensuring a real energy spectrum of a\ngeneral non-Hermitian Hamiltonian. $\\mathcal{PT}$-symmetric Hamiltonians\ntherefore form an intermediate class between Hermitian and non-Hermitian\nHamiltonians. In this work, we derive the conditions for\n$\\mathcal{PT}$-symmetry in the context of electronic structure theory, and\nspecifically, within the Hartree-Fock (HF) approximation. We show that the HF\norbitals are symmetric with respect to the $\\mathcal{PT}$ operator \\textit{if\nand only if} the effective Fock Hamiltonian is $\\mathcal{PT}$-symmetric, and\n\\textit{vice versa}. By extension, if an optimal self-consistent solution is\ninvariant under $\\mathcal{PT}$, then its eigenvalues and corresponding HF\nenergy must be real. Moreover, we demonstrate how one can construct explicitly\n$\\mathcal{PT}$-symmetric Slater determinants by forming $\\mathcal{PT}$ doublets\n(i.e. pairing each occupied orbital with its $\\mathcal{PT}$-transformed\nanalogue), allowing $\\mathcal{PT}$-symmetry to be conserved throughout the\nself-consistent process. Finally, considering the \\ce{H2} molecule as an\nillustrative example, we observe $\\mathcal{PT}$-symmetry in the HF energy\nlandscape and find that the symmetry-broken unrestricted HF wave functions\n(i.e. diradical configurations) are $\\mathcal{PT}$-symmetric, while the\nsymmetry-broken restricted HF wave functions (i.e. ionic configurations) break\n$\\mathcal{PT}$-symmetry.\n']","[('pt symmetric quantum', 0.6522996425628662), ('mathcal pt symmetry', 0.651544988155365), ('hermitian theories', 0.5931118726730347), ('pt symmetry', 0.5889074206352234), ('mathcal pt symmetric', 0.5683639645576477), ('non hermitian physics', 0.5647793412208557), ('hermitian physics', 0.5559107065200806), ('hermitian systems', 0.5536679029464722), ('non hermitian systems', 0.5474528670310974), ('non hermitian hamiltonians', 0.5457854270935059)]" 239,239,117,239_hawkes processes_hawkes process_hawkes_point processes,"['hawkes processes', 'hawkes process', 'hawkes', 'point processes', 'markovian', 'marked point processes', 'point process', 'counting processes', 'process exponential', 'processes self']","['Precise deviations for Hawkes processes Hawkes process is a class of simple point processes with self-exciting and\nclustering properties. Hawkes process has been widely applied in finance,\nneuroscience, social networks, criminology, seismology, and many other fields.\nIn this paper, we study precise deviations for Hawkes processes for large time\nasymptotics, that strictly extends and improves the existing results in the\nliterature. Numerical illustrations will also be provided.\n', 'Spatiotemporal Hawkes processes with a graphon-induced connectivity\n structure We introduce a spatiotemporal self-exciting point process $(N_t(x))$,\nboundedly finite both over time $[0,\\infty)$ and space $\\mathscr X$, with\nexcitation structure determined by a graphon $W$ on $\\mathscr{X}^2$. This\ngraphon Hawkes process generalizes both the multivariate Hawkes process and the\nHawkes process on a countable network, and despite being infinite-dimensional,\nit is surprisingly tractable. After proving existence, uniqueness and stability\nresults, we show, both in the annealed and in the quenched case, that for\ncompact, Euclidean $\\mathscr X\\subset\\mathbb R^m$, any graphon Hawkes process\ncan be obtained as the suitable limit of $d$-dimensional Hawkes processes\n$\\tilde N^d$, as $d\\to\\infty$. Furthermore, in the stable regime, we establish\nan FLLN and an FCLT for our infinite-dimensional process on compact $\\mathscr\nX\\subset\\mathbb R^m$, while in the unstable regime we prove divergence of\n$N_T(\\mathscr X)/T$, as $T\\to\\infty$. Finally, we exploit a cluster\nrepresentation to derive fixed-point equations for the Laplace functional of\n$N$, for which we set up a recursive approximation procedure. We apply these\nresults to show that, starting with multivariate Hawkes processes $\\tilde\nN^d_t$ converging to stable graphon Hawkes processes, the limits $d\\to\\infty$\nand $t\\to\\infty$ commute.\n', ""The Malliavin-Stein method for Hawkes functionals In this paper, following Nourdin-Peccati's methodology, we combine the\nMalliavin calculus and Stein's method to provide general bounds on the\nWasserstein distance between functionals of a compound Hawkes process and a\ngiven Gaussian density. To achieve this, we rely on the Poisson embedding\nrepresentation of an Hawkes process to provide a Malliavin calculus for the\nHawkes processes, and more generally for compound Hawkes processes. As an\napplication, we close a gap in the literature by providing the first\nBerry-Ess\\'een bounds associated to Central Limit Theorems for the compound\nHawkes process.\n""]","[('hawkes processes', 0.774686872959137), ('hawkes process', 0.7314311861991882), ('hawkes', 0.5601485371589661), ('point processes', 0.4460737407207489), ('markovian', 0.4298159182071686), ('marked point processes', 0.3798469007015228), ('point process', 0.3725115954875946), ('counting processes', 0.35615548491477966), ('process exponential', 0.34971559047698975), ('processes self', 0.33359622955322266)]" 240,240,117,240_macroscopic traffic flow_traffic flows_traffic models_traffic flow,"['macroscopic traffic flow', 'traffic flows', 'traffic models', 'traffic flow', 'vehicular traffic', 'macroscopic traffic', 'traffic density', 'mixed traffic', 'traffic', 'flow models']","[""Stabilizing Traffic via Autonomous Vehicles: A Continuum Mean Field Game\n Approach This paper presents scalable traffic stability analysis for both pure\nautonomous vehicle (AV) traffic and mixed traffic based on continuum traffic\nflow models. Human vehicles are modeled by a non-equilibrium traffic flow\nmodel, i.e., Aw-Rascle-Zhang (ARZ), which is unstable. AVs are modeled by the\nmean field game which assumes AVs are rational agents with anticipation\ncapacities. It is shown from linear stability analysis and numerical\nexperiments that AVs help stabilize the traffic. Further, we quantify the\nimpact of AV's penetration rate and controller design on the traffic stability.\nThe results may provide insights for AV manufacturers and city planners.\n"", 'Shock formation in traffic flow models with nonlocal look ahead and\n behind flux In this work, we study a Lighthill-Whitham-Richard (LWR) type traffic flow\nmodel with a non-local flux. We identify a threshold condition for shock\nformation for traffic flow models with Arrhenius look-ahead-behind (i.e.,\nnudging) dynamics with concave-convex flux.\n', 'A model for traffic flow on a road with variable widths We propose a model describing the traffic flow on a road with variable widths\nin this paper. The model, which is modified the Aw-Rascle model, is not\nconservative because of the source term. We obtain the elementary waves of the\nnew traffic flow model, including rarefaction waves, shock waves, contact\ndiscontinuities and stationary waves. The Riemann problems of the system for\nthe traffic flow are solved and some numerical results are given, which are\nalmost the same as the theoretical ones.\n']","[('macroscopic traffic flow', 0.7126469016075134), ('traffic flows', 0.6992964744567871), ('traffic models', 0.6849449872970581), ('traffic flow', 0.6745254397392273), ('vehicular traffic', 0.5950113534927368), ('macroscopic traffic', 0.5467821955680847), ('traffic density', 0.5459271669387817), ('mixed traffic', 0.5351182818412781), ('traffic', 0.5244625210762024), ('flow models', 0.48833101987838745)]" 241,241,116,241_motivic cohomology_theory motives_motives_motivic galois groups,"['motivic cohomology', 'theory motives', 'motives', 'motivic galois groups', 'motivic galois', 'hodge modules', 'motive', 'cohomology theories', 'adic cohomology', 'etale cohomology']","['Mixed Motives A mixed Weil cohomology with values in an abelian rigid tensor category is a\ncohomological functor on Voevodsky\'s category of motives which is satisfying\nK\\""unneth formula and such that its restriction to Chow motives is a Weil\ncohomology. We show that the universal mixed Weil cohomology exists. Nori\nmotives can be recovered as a universal enrichment of Betti cohomology via a\nlocalisation. This new picture is drawing some consequences with respect to the\ntheory of mixed motives in arbitrary characteristic.\n', ""On the Nori and Hodge realisations of Voevodsky motives We show that the derived category of perverse Nori motives and mixed Hodge\nmodules are the derived categories of their constructible hearts. This enables\nus to construct $\\infty$-categorical lifts of the six operations and therefore\nto obtain realisation functors from the category of Voevodsky \\'etale motives\nto the derived categories of perverse Nori motives and mixed Hodge modules that\ncommute with the operations. We give a proof that the realisation induces an\nequivalence of categories between Artin motives in the category of \\'etale\nmotives and Artin motives in the derived category of Nori motives. We also\nprove that if a motivic $t$-structure exists then Voevodsky \\'etale motives and\nthe derived category of perverse Nori motives are equivalent. Finally we give a\npresentation of the indization of the derived category of perverse Nori motives\nas a category of modules in Voevodsky \\'etale motives that gives a continuity\nresult for perverse Nori motives.\n"", ""Artin motives in relative Nori and Voevodsky motives Over a scheme of finite type over a field of characteristic zero, we prove\nthat Nori an Voevodsky categories of relative Artin motives, that is the full\nsubcategories generated by the motives of \\'etale morphisms in relative Nori\nand Voevodsky motives, are canonically equivalent. As an application, we show\nthat over a normal base of characteristic zero an Artin motive is dualisable if\nand only if it lies in the thick category spanned by the motives of finite\n\\'etale schemes. We finish with an application to motivic Galois groups and\nobtain an analogue of the classical exact sequence of \\'etale fundamental\ngroups relating a variety over a field and its base change to the algebraic\nclosure.\n""]","[('motivic cohomology', 0.6652988791465759), ('theory motives', 0.6034061312675476), ('motives', 0.5855648517608643), ('motivic galois groups', 0.550028383731842), ('motivic galois', 0.523547351360321), ('hodge modules', 0.4959140121936798), ('motive', 0.4810596704483032), ('cohomology theories', 0.4721367657184601), ('adic cohomology', 0.4556986689567566), ('etale cohomology', 0.4549354314804077)]" 242,242,115,242_minkowski theory_brunn minkowski theory_classical minkowski_minkowski case,"['minkowski theory', 'brunn minkowski theory', 'classical minkowski', 'minkowski case', 'minkowski type', 'minkowski inequality', 'curvature measures', 'curvature measure', 'minkowski', 'convex solutions']","['Nonuniqueness of solutions to the $L_p$ chord Minkowski problem This paper explores the nonuniqueness of solutions to the $L_p$ chord\nMinkowski problem for negative $p.$ The $L_p$ chord Minkowski problem was\nrecently posed by Lutwak, Xi, Yang and Zhang, which seeks to determine the\nnecessary and sufficient conditions for a given finite Borel measure such that\nit is the $L_p$ chord measure of a convex body, and it includes the chord\nMinkowski problem and the $L_p$ Minkowski problem.\n', 'Uniqueness and continuity of the solution to $L_p$ dual Minkowski\n problem Lutwak, Yang and Zhang \\cite{LYZ2018} introduced the $L_p$ dual curvature\nmeasure that unifies several other geometric measures in dual Brunn-Minkowski\ntheory and Brunn- Minkowski theory. Motivated by works in \\cite{LYZ2018}, we\nconsider the uniqueness and continuity of the solution to the $L_p$ dual\nMinkowski problem. To extend the important work (Theorem \\ref{uniquepolytope})\nof LYZ to the case for general convex bodies, we establish some new\nMinkowski-type inequalities which are closely related to the optimization\nproblem associated with the $L_p$ dual Minkowski problem. When $q< p$, the\nuniqueness of the solution to the $L_p$ dual Minkowski problem for general\nconvex bodies is obtained. Moreover, we obtain the continuity of the solution\nto the $L_p$ dual Minkowski problem for convex bodies.\n', 'Orlicz-Minkowski flows We study the long-time existence and behavior for a class of anisotropic\nnon-homogeneous Gauss curvature flows whose stationary solutions, if exist,\nsolve the regular Orlicz-Minkowski problems. As an application, we obtain old\nand new results for the regular even Orlicz-Minkowski problems; the\ncorresponding $L_p$ version is the even $L_p$-Minkowski problem for $p>-n-1$.\nMoreover, employing a parabolic approximation method, we give new proofs of\nsome of the existence results for the general Orlicz-Minkowski problems; the\n$L_p$ versions are the even $L_p$-Minkowski problem for $p>0$ and the\n$L_p$-Minkowski problem for $p>1$. In the final section, we use a curvature\nflow with no global term to solve a class of $L_p$-Christoffel-Minkowski type\nproblems.\n']","[('minkowski theory', 0.6209728121757507), ('brunn minkowski theory', 0.5855619311332703), ('classical minkowski', 0.5763428807258606), ('minkowski case', 0.5649783611297607), ('minkowski type', 0.5459316968917847), ('minkowski inequality', 0.5372933745384216), ('curvature measures', 0.523510754108429), ('curvature measure', 0.504081666469574), ('minkowski', 0.47424018383026123), ('convex solutions', 0.4647621512413025)]" 243,243,115,243_models tumor_tumor growth_tumour growth_diffusion equations,"['models tumor', 'tumor growth', 'tumour growth', 'diffusion equations', 'diffusion', 'cancer invasion', 'tumor cells', 'tumour cells', 'reaction diffusion equations', 'reaction diffusion']","['Interface Dynamics in a Two-phase Tumor Growth Model We study a tumor growth model in two space dimensions, where proliferation of\nthe tumor cells leads to expansion of the tumor domain and migration of\nsurrounding normal tissues into the exterior vacuum. The model features two\nmoving interfaces separating the tumor, the normal tissue, and the exterior\nvacuum. We prove local-in-time existence and uniqueness of strong solutions for\ntheir evolution starting from a nearly radial initial configuration. It is\nassumed that the tumor has lower mobility than the normal tissue, which is in\nline with the well-known Saffman-Taylor condition in viscous fingering.\n', 'Tumor Growth with Nutrients: Regularity and Stability In this paper we study a tumor growth model with nutrients. The model\npresents dynamic patch solutions due to the contact inhibition among the tumor\ncells. We show that when the nutrients do not diffuse and the cells do not die,\nthe tumor density exhibits regularizing dynamics. In particular, we provide\ncontraction estimates, exponential rate of asymptotic convergence, and boundary\nregularity of the tumor patch. These results are in sharp contrast to the\nmodels either with nutrient diffusion or with death rate in tumor cells.\n', ""Tumor growth with nutrients: stability of the tumor patches In this paper, we study a tumor growth model with nutrients. The contact\ninhibition for the tumor cells, presented in the model, results in the\nevolution of a congested tumor patch. We study the regularity of the tumor\npatch as the nutrients' diffusion strength $D$ diminishes. In particular, we\nshow that for small $D>0$ the boundary of the tumor patch stays in a small\nneighborhood of the smooth tumor patch boundary obtained with $D=0$, uniformly\nwith respect to the Hausdorff distance.\n""]","[('models tumor', 0.5862960815429688), ('tumor growth', 0.5228114724159241), ('tumour growth', 0.4892469346523285), ('diffusion equations', 0.47837868332862854), ('diffusion', 0.47539329528808594), ('cancer invasion', 0.4587196111679077), ('tumor cells', 0.4544416666030884), ('tumour cells', 0.4396587610244751), ('reaction diffusion equations', 0.43511709570884705), ('reaction diffusion', 0.41377004981040955)]" 244,244,115,244_steklov eigenvalues_steklov eigenfunctions_steklov eigenvalue_lower bounds eigenvalues,"['steklov eigenvalues', 'steklov eigenfunctions', 'steklov eigenvalue', 'lower bounds eigenvalues', 'eigenvalues laplacian', 'eigenvalue laplacian', 'bounds eigenvalues', 'first eigenvalue laplacian', 'steklov problems', 'compact manifolds']","['Higher dimensional surgery and Steklov eigenvalues We show that for compact Riemannian manifolds of dimension at least $3$ with\nnonempty boundary, we can modify the manifold by performing surgeries of\ncodimension $2$ or higher, while keeping the Steklov spectrum nearly unchanged.\nThis shows that certain changes in the topology of a domain do not have an\neffect when considering shape optimization questions for Steklov eigenvalues in\ndimensions $3$ and higher. Our result generalizes the 1-dimensional surgery in\n[FS2] to higher dimensional surgeries and to higher eigenvalues. It is proved\nin [FS2] that the unit ball does not maximize the first nonzero normalized\nSteklov eigenvalue among contractible domains in $\\mathbb{R}^n$, for $n \\geq\n3$. We show that this is also true for higher Steklov eigenvalues. Using\nsimilar ideas we show that in $\\mathbb{R}^n$, for $n\\geq 3$, the $j$-th\nnormalized Steklov eigenvalue is not maximized in the limit by a sequence of\ncontractible domains degenerating to the disjoint union of $j$ unit balls, in\ncontrast to the case in dimension $2$ [GP1].\n', ""Large Steklov eigenvalues via homogenisation on manifolds Using methods in the spirit of deterministic homogenisation theory we obtain\nconvergence of the Steklov eigenvalues of a sequence of domains in a Riemannian\nmanifold to weighted Laplace eigenvalues of that manifold. The domains are\nobtained by removing small geodesic balls that are asymptotically densely\nuniformly distributed as their radius tends to zero. We use this relationship\nto construct manifolds that have large Steklov eigenvalues.\n In dimension two, and with constant weight equal to 1, we prove that\nKokarev's upper bound of $8\\pi$ for the first nonzero normalised Steklov\neigenvalue on orientable surfaces of genus 0 is saturated. For other\ntopological types and eigenvalue indices, we also obtain lower bounds on the\nbest upper bound for the eigenvalue in terms of Laplace maximisers. For the\nfirst two eigenvalues, these lower bounds become equalities. A surprising\nconsequence is the existence of free boundary minimal surfaces immersed in the\nunit ball by first Steklov eigenfunctions and with area strictly larger than\n$2\\pi$. This was previously thought to be impossible. We provide numerical\nevidence that some of the already known examples of free boundary minimal\nsurfaces have these properties and also exhibit simulations of new free\nboundary minimal surfaces of genus 0 in the unit ball with even larger area.\nThe first nonzero Steklov eigenvalue of all these examples is equal to 1, as a\nconsequence of their symmetries and topology, so that they verify a general\nconjecture by Fraser and Li.\n In dimension three and larger, we prove that the isoperimetric inequality of\nColbois--El Soufi--Girouard is sharp and implies an upper bound for weighted\nLaplace eigenvalues. We also show that in any manifold with a fixed metric, one\ncan construct by varying the weight a domain with connected boundary whose\nfirst nonzero normalised Steklov eigenvalue is arbitrarily large.\n"", 'Applications of possibly hidden symmetry to Steklov and mixed Steklov\n problems on surfaces We consider three different questions related to the Steklov and mixed\nSteklov problems on surfaces. These questions are connected by the techniques\nthat we use to study them, which exploit symmetry in various ways even though\nthe surfaces we study do not necessarily have inherent symmetry.\n In the spirit of the celebrated Hersch-Payne-Schiffer and Weinstock\ninequalities for Steklov eigenvalues, we obtain a sharp isoperimetric\ninequality for the mixed Steklov eigenvalues considering the interplay between\nthe eigenvalues of the mixed Steklov-Neumann and Steklov-Dirichlet eigenvalues.\n In 1980, Bandle showed that the unit disk maximizes the $k$th nonzero\nnormalized Steklov eigenvalue on simply connected domains with rotational\nsymmetry of order $p$ when $k\\le p-1$. We discuss whether the disk remains the\nmaximizer in the class of simply connected rotationally symmetric domains when\n$k\\geq p$. In particular, we show that for $k$ large enough, the upper bound\nconverges to the Hersch-Payne-Schiffer upper bound.\n We give full asymptotics for mixed Steklov problems on arbitrary surfaces,\nassuming some conditions at the meeting points of the Steklov boundary with the\nDirichlet or Neumann boundary.\n']","[('steklov eigenvalues', 0.6988528966903687), ('steklov eigenfunctions', 0.6718385815620422), ('steklov eigenvalue', 0.6662712097167969), ('lower bounds eigenvalues', 0.5108889937400818), ('eigenvalues laplacian', 0.5057592988014221), ('eigenvalue laplacian', 0.4989107847213745), ('bounds eigenvalues', 0.4933505952358246), ('first eigenvalue laplacian', 0.4730517268180847), ('steklov problems', 0.44795340299606323), ('compact manifolds', 0.4373243451118469)]" 245,245,114,245_splitting algorithms_douglas rachford splitting_forward backward splitting_convex optimization problems,"['splitting algorithms', 'douglas rachford splitting', 'forward backward splitting', 'convex optimization problems', 'backward splitting', 'operator splitting', 'monotone inclusion problems', 'maximal monotone operators', 'maximally monotone operators', 'monotone operators']","['Forward-Reflected-Backward and Shadow-Douglas--Rachford with partial\n inverse for Solving Monotone Inclusions In this article, we study two methods for solving monotone inclusions in real\nHilbert spaces involving the sum of a maximally monotone operator, a\nmonotone-Lipschitzian operator, a cocoercive operator, and a normal cone to a\nvector subspace. Our algorithms split and exploits the intrinsic properties of\neach operator involved in the inclusion. We derive our methods by combining\npartial inverse techniques with the forward-reflected-backward algorithm and\nwith the shadow-Douglas--Rachford algorithm, respectively. Our methods inherit\nthe advantages of those methods, requiring only one activation of the\nLipschitzian operator, one activation of the cocoercive operator, two\nprojections onto the closed vector subspace, and one calculation of the\nresolvent of the maximally monotone operator. Additionally, to allow larger\nstep-sizes in one of the proposed methods, we revisit FSDR by extending its\nconvergence for larger step-sizes. Furthermore, we provide methods for solving\nmonotone inclusions involving a sum of maximally monotone operators and for\nsolving a system of primal-dual inclusions involving a mixture of sums, linear\ncompositions, parallel sums, Lipschitzian operators, cocoercive operators, and\nnormal cones. We apply our methods to constrained composite convex optimization\nproblems as a specific example. Finally, in order to compare our methods with\nexisting methods in the literature, we provide numerical experiments on\nconstrained total variation least-squares optimization problems and computed\ntomography inverse problems. We obtain promising numerical results.\n', 'An outer reflected forward-backward splitting algorithm for solving\n monotone inclusions Monotone inclusions have wide applications in solving various convex\noptimization problems arising in signal and image processing, machine learning,\nand medical image reconstruction. In this paper, we propose a new splitting\nalgorithm for finding a zero of the sum of a maximally monotone operator, a\nmonotone Lipschitzian operator, and a cocoercive operator, which is called\nouter reflected forward-backward splitting algorithm. Under mild conditions on\nthe iterative parameters, we prove the convergence of the proposed algorithm.\nAs applications, we employ the proposed algorithm to solve composite monotone\ninclusions involving monotone Lipschitzian operator, cocoercive operator, and\nthe parallel sum of operators. The advantage of the obtained algorithm is that\nit is a completely splitting algorithm, in which the Lipschitzian operator and\nthe cocoercive operator are processed via explicit steps and the maximally\nmonotone operators are processed via their resolvents.\n', 'Four-operator splitting algorithms for solving monotone inclusions Monotone inclusions involving the sum of three maximally monotone operators\nor more have received much attention in recent years. In this paper, we propose\nthree splitting algorithms for finding a zero of the sum of four monotone\noperators, which are two maximally monotone operators, one monotone Lipschitz\noperator, and one cocoercive operator. These three splitting algorithms are\nbased on the forward-reflected-Douglas-Rachford splitting algorithm,\nbackward-forward-reflected-backward splitting algorithm, and\nbackward-reflected-forward-backward splitting algorithm, respectively. As\napplications, we apply the proposed algorithms to solve the monotone inclusions\nproblem involving a finite sum of maximally monotone operators. Numerical\nresults on the Projection on Minkowski sums of convex sets demonstrate the\neffectiveness of the proposed algorithms.\n']","[('splitting algorithms', 0.5318504571914673), ('douglas rachford splitting', 0.5208746194839478), ('forward backward splitting', 0.5129674673080444), ('convex optimization problems', 0.5128394961357117), ('backward splitting', 0.4967433214187622), ('operator splitting', 0.4952457547187805), ('monotone inclusion problems', 0.4916916787624359), ('maximal monotone operators', 0.4850763976573944), ('maximally monotone operators', 0.4774269461631775), ('monotone operators', 0.4671781659126282)]" 246,246,114,246_theoretical fusion categories_fusion categories_fusion category_braided tensor categories,"['theoretical fusion categories', 'fusion categories', 'fusion category', 'braided tensor categories', 'braided tensor category', 'group theoretical fusion', 'braided monoidal category', 'group fusion', 'fusion rings', 'modular categories']","['Fiber 2-Functors and Tambara-Yamagami Fusion 2-Categories We introduce group-theoretical fusion 2-categories, a strong categorification\nof the notion of a group-theoretical fusion 1-category. Physically speaking,\nsuch fusion 2-categories arise by gauging subgroups of a global symmetry. We\nshow that group-theoretical fusion 2-categories are completely characterized by\nthe property that the braided fusion 1-category of endomorphisms of the\nmonoidal unit is Tannakian. Then, we describe the underlying finite semisimple\n2-category of group-theoretical fusion 2-categories, and, more generally, of\ncertain 2-categories of bimodules. We also partially describe the fusion rules\nof group-theoretical fusion 2-categories, and investigate the group gradings of\nsuch fusion 2-categories. Using our previous results, we classify fusion\n2-categories admitting a fiber 2-functor. Next, we study fusion 2-categories\nwith a Tambara-Yamagami defect, that is $\\mathbb{Z}/2$-graded fusion\n2-categories whose non-trivially graded factor is $\\mathbf{2Vect}$. We classify\nthese fusion 2-categories, and examine more closely the more restrictive notion\nof Tambara-Yamagami fusion 2-categories. Throughout, we give many examples to\nillustrate our various results.\n', 'Drinfeld Centers and Morita Equivalence Classes of Fusion 2-Categories We prove that the Drinfeld center of a fusion 2-category is invariant under\nMorita equivalence. We go on to show that the concept of Morita equivalence\nbetween connected fusion 2-categories recovers exactly the notion of Witt\nequivalence between braided fusion 1-categories. A strongly fusion 2-category\nis a fusion 2-category whose braided fusion 1-category of endomorphisms of the\nmonoidal unit is $\\mathbf{Vect}$ or $\\mathbf{SVect}$. We prove that every\nfusion 2-category is Morita equivalent to the 2-Deligne tensor product of a\nstrongly fusion 2-category and an invertible fusion 2-category. We proceed to\nshow that every fusion 2-category is Morita equivalent to a connected fusion\n2-category. As a consequence, we find that every rigid algebra in a fusion\n2-category is separable. This implies in particular that every fusion\n2-category is separable. Conjecturally, separability ensures that a fusion\n2-category is 4-dualizable. We define the dimension of a fusion 2-category, and\nprove that it is always non-zero. Finally, we show that the Drinfeld center of\nany fusion 2-category is a finite semisimple 2-category.\n', 'Near-integral fusion We abstract the study of irreducible characters of finite groups vanishing on\nall but two conjugacy classes, initiated by S. Gagola, to irreducible\ncharacters of fusion rings whose kernel has maximal rank. These near-integral\nfusion rings include the near-groups which are currently one of the most\nabundant sources of novel examples of fusion categories to date. We generalize\nmany of the known results on near-group fusion categories from the literature\nto near-integral fusion categories and characterize when such categories are\nbraided. In particular, braided near-integral fusion categories describe all\nbraided fusion categories which are almost symmetrically braided. This novel\nresult allows a digestible characterization of the over $300$ braided\nequivalence classes of premodular fusion categories of rank $6$ or less.\n']","[('theoretical fusion categories', 0.7476836442947388), ('fusion categories', 0.7262428998947144), ('fusion category', 0.675487220287323), ('braided tensor categories', 0.607650101184845), ('braided tensor category', 0.5879489183425903), ('group theoretical fusion', 0.5688756704330444), ('braided monoidal category', 0.5681727528572083), ('group fusion', 0.5354735851287842), ('fusion rings', 0.5155060291290283), ('modular categories', 0.511906623840332)]" 247,247,114,247_weighted shift operators_shift operators_hypercyclicity_hypercyclic,"['weighted shift operators', 'shift operators', 'hypercyclicity', 'hypercyclic', 'weighted shifts', 'backward shifts', 'shift operator', 'composition operators', 'weighted shift', 'composition operators spaces']","['Chaos and frequent hypercyclicity for composition operators The notions of chaos and frequent hypercyclicity enjoy an intimate\nrelationship in linear dynamics. Indeed, after a series of partial results, it\nwas shown by Bayart and Rusza in 2015 that for backward weighted shifts on\n$\\ell_p(\\mathbb{Z})$, the notions chaos and frequent hypercyclicity coincide.\nIt is with some effort that one shows that these two notions are distinct.\nBayart and Grivaux in 2007 constructed a non-chaotic frequently hypercyclic\nweighted shift on $c_0$. It was only in 2017 that Menet settled negatively\nwhether every chaotic operator is frequently hypercylic. In this article, we\nshow that for a large class of composition operators on $L^p$-spaces the\nnotions of chaos and frequent hypercyclicity coincide. Moreover, in this\nparticular class an invertible operator is frequently hypercyclic if and only\nif its inverse is frequently hypercyclic. This is in contrast to a very recent\nresult of Menet where an invertible frequently hypercyclic operator on $\\ell_1$\nwhose inverse is not frequently hypercyclic is constructed.\n', 'Recurrence properties of hypercyclic operators We generalize the notions of hypercyclic operators, $\\mathfrak{U}$-frequently\nhypercyclic operators and frequently hypercyclic operators by introducing a new\nnotion of hypercyclicity, called $\\mathcal{A}$-frequent hypercyclicity. We then\nstate an $\\mathcal{A}$-Frequent Hypercyclicity Criterion, inspired from the\nHypercyclicity Criterion and the Frequent Hypercyclicity Criterion, and we show\nthat this criterion characterizes the $\\mathcal{A}$-frequent hypercyclicity for\nweighted shifts. We finish by investigating which kind of properties of density\ncan have the sets ${N(x, U)=\\{n\\in \\mathbb{N}:T^nx\\in U\\}}$ for a given\nhypercyclic operator and study the new notion of reiteratively hypercyclic\noperators.\n', ""Hereditarily frequently hypercyclic operators and disjoint frequent\n hypercyclicity We introduce and study the notion of hereditary frequent hypercyclicity,\nwhich is a reinforcement of the well known concept of frequent hypercyclicity.\nThis notion is useful for the study of the dynamical properties of direct sums\nof operators; in particular, a basic observation is that the direct sum of a\nhereditarily frequently hypercyclic operator with any frequently hypercyclic\noperator is frequently hypercyclic. Among other results, we show that operators\nsatisfying the Frequent Hypercyclicity Criterion are hereditarily frequently\nhypercyclic, as well as a large class of operators whose unimodular\neigenvectors are spanning with respect to the Lebesgue measure. On the other\nhand, we exhibit two frequently hypercyclic weighted shifts $B_w,B_{w'}$ on\n$c_0(\\mathbb{Z}_+)$ whose direct sum $B_w\\oplus B_{w'}$ is not\n$\\mathcal{U}$-frequently hypercyclic (so that neither of them is hereditarily\nfrequently hypercyclic), and we construct a $C$-type operator on\n$\\ell_p(\\mathbb{Z}_+)$, $1\\le p<\\infty$ which is frequently hypercyclic but not\nhereditarily frequently hypercyclic. We also solve several problems concerning\ndisjoint frequent hypercyclicity: we show that for every $N\\in\\mathbb{N}$, any\ndisjoint frequently hypercyclic $N$-tuple of operators $(T_1,\\dots ,T_N)$ can\nbe extended to a disjoint frequently hypercyclic $(N+1)$-tuple $(T_1,\\dots\n,T_N, T_{N+1})$ as soon as the underlying space supports a hereditarily\nfrequently hypercyclic operator; we construct a disjoint frequently hypercyclic\npair which is not densely disjoint hypercyclic; and we show that the pair\n$(D,\\tau_a)$ is disjoint frequently hypercyclic, where $D$ is the derivation\noperator acting on the space of entire functions and $\\tau_a$ is the operator\nof translation by $a\\in\\mathbb{C}\\setminus\\{ 0\\}$. Part of our results are in\nfact obtained in the general setting of Furstenberg families.\n""]","[('weighted shift operators', 0.5368105173110962), ('shift operators', 0.5061630606651306), ('hypercyclicity', 0.4970144033432007), ('hypercyclic', 0.475775808095932), ('weighted shifts', 0.46123939752578735), ('backward shifts', 0.4205475151538849), ('shift operator', 0.413607120513916), ('composition operators', 0.4075131118297577), ('weighted shift', 0.3942015767097473), ('composition operators spaces', 0.3793664574623108)]" 248,248,114,248_fracture mechanics_crack propagation_phase field models_cracks,"['fracture mechanics', 'crack propagation', 'phase field models', 'cracks', 'phase field', 'fracture', 'phase field approximation', 'crack', 'brittle materials', 'phase field variable']","['Crack opening calculation in phase-field modeling of fluid-filled\n fracture: A robust and efficient strain-based method The phase-field method has become popular for the numerical modeling of\nfluid-filled fractures, thanks to its ability to represent complex fracture\ngeometry without algorithms. However, the algorithm-free representation of\nfracture geometry poses a significant challenge in calculating the crack\nopening (aperture) of phase-field fracture, which governs the fracture\npermeability and hence the overall hydromechanical behavior. Although several\napproaches have been devised to compute the crack opening of phase-field\nfracture, they require a sophisticated algorithm for post-processing the\nphase-field values or an additional parameter sensitive to the element size and\nalignment. Here, we develop a novel method for calculating the crack opening of\nfluid-filled phase-field fracture, which enables one to obtain the crack\nopening without additional algorithms or parameters. We transform the\ndisplacement-jump-based kinematics of a fracture into a continuous strain-based\nversion, insert it into a force balance equation on the fracture, and apply the\nphase-field approximation. Through this procedure, we obtain a simple equation\nfor the crack opening which can be calculated with quantities at individual\nmaterial points. We verify the proposed method with analytical and numerical\nsolutions obtained based on discrete representations of fractures,\ndemonstrating its capability to calculate the crack opening regardless of the\nelement size or alignment.\n', ""An assessment of phase field fracture: crack initiation and growth The phase field paradigm, in combination with a suitable variational\nstructure, has opened a path for using Griffith's energy balance to predict the\nfracture of solids. These so-called phase field fracture methods have gained\nsignificant popularity over the past decade, and are now part of commercial\nfinite element packages and engineering fitness-for-service assessments. Crack\npaths can be predicted, in arbitrary geometries and dimensions, based on a\nglobal energy minimisation - without the need for \\textit{ad hoc} criteria. In\nthis work, we review the fundamentals of phase field fracture methods and\nexamine their capabilities in delivering predictions in agreement with the\nclassical fracture mechanics theory pioneered by Griffith. The two most widely\nused phase field fracture models are implemented in the context of the finite\nelement method, and several paradigmatic boundary value problems are addressed\nto gain insight into their predictive abilities across all cracking stages;\nboth the initiation of growth and stable crack propagation are investigated. In\naddition, we examine the effectiveness of phase field models with an internal\nmaterial length scale in capturing size effects and the transition flaw size\nconcept. Our results show that phase field fracture methods satisfactorily\napproximate classical fracture mechanics predictions and can also reconcile\nstress and toughness criteria for fracture. The accuracy of the approximation\nis however dependent on modelling and constitutive choices; we provide a\nrationale for these differences and identify suitable approaches for delivering\nphase field fracture predictions that are in good agreement with\nwell-established fracture mechanics paradigms.\n"", 'Phase-Field Modeling of Fracture under Compression and Confinement in\n Anisotropic Geomaterials Strongly anisotropic geomaterials undergo fracture under compressive loading.\nThis paper applies a phase-field fracture model to study this fracture process.\nWhile phase-field fracture models have several advantages, they provide\nunphysical predictions when the stress state is complex and includes\ncompression that can cause crack faces to contact.\n Building on a phase-field model that accounts for compressive traction across\nthe crack face, this paper extends the model to anisotropic fracture. The key\nfeatures include: (1) a homogenized anisotropic elastic response and\nstrongly-anisotropic model for the work to fracture; (2) an effective damage\nresponse that accounts consistently for compressive traction across the crack\nface, that is derived from the anisotropic elastic response; (3) a regularized\ncrack normal field that overcomes the shortcomings of the isotropic setting,\nand enables the correct crack response, both across and transverse to the crack\nface.\n To test the model, we first compare the predictions to phase-field fracture\nevolution calculations in a fully-resolved layered specimen with spatial\ninhomogeneity, and show that it captures the overall patterns of crack growth.\nWe then apply the model to previously-reported experimental observations of\nfracture evolution in laboratory specimens of shales under compression with\nconfinement, and find that it predicts well the observed crack patterns in a\nbroad range of loading conditions. We further apply the model to predict the\ngrowth of wing cracks under compression and confinement. The effective crack\nresponse model enables us to treat the initial crack simply as a non-singular\ndamaged zone within the computational domain, thereby allowing for easy and\ngeneral computations.\n']","[('fracture mechanics', 0.6148492097854614), ('crack propagation', 0.5927866101264954), ('phase field models', 0.48513129353523254), ('cracks', 0.4414796829223633), ('phase field', 0.42910003662109375), ('fracture', 0.4243416488170624), ('phase field approximation', 0.4207246005535126), ('crack', 0.3993440568447113), ('brittle materials', 0.3897194564342499), ('phase field variable', 0.38832569122314453)]" 249,249,114,249_nakajima quiver varieties_quiver varieties_quiver variety_nakajima quiver,"['nakajima quiver varieties', 'quiver varieties', 'quiver variety', 'nakajima quiver', 'type quiver', 'quiver representations', 'associated quiver', 'quivers', 'representations quiver', 'quiver']","[""Quiver description of Cherkis bow varieties and Nakajima quiver\n varieties We provide a quiver description for Cherkis bow varieties in arbitrary type.\nWe explain how this generalizes the construction of Nakajima quiver varieties.\nWe give criteria for stability, non-emptiness, smoothness and discuss\ndeformations. In the appendix, we discuss the relation between the quiver\ndescription and the original Cherkis' construction of bow varieties.\n"", 'Translation quiver varieties We introduce a framework of translation quiver varieties which includes\nNakajima quiver varieties as well as their graded and cyclic versions. An\nimportant feature of translation quiver varieties is that the sets of their\nfixed points under toric actions can be again realized as translation quiver\nvarieties. This allows one to simplify quiver varieties in several steps. We\nprove that translation quiver varieties are smooth, pure and have Tate motivic\nclasses. We also describe an algorithm to compute those motivic classes.\n', 'Namikawa-Weyl groups of affinizations of smooth Nakajima quiver\n varieties We give a description of the Namikawa-Weyl group of affinizations of smooth\nNakajima quiver varieties using combinatorial data of the underlying quiver,\nand compute some explicit examples. This extends a result of McGerty and Nevins\nfor quiver varieties coming from Dynkin quivers.\n']","[('nakajima quiver varieties', 0.8527599573135376), ('quiver varieties', 0.8057842254638672), ('quiver variety', 0.7712709307670593), ('nakajima quiver', 0.7052549719810486), ('type quiver', 0.6929800510406494), ('quiver representations', 0.6717305183410645), ('associated quiver', 0.6604915261268616), ('quivers', 0.6315149068832397), ('representations quiver', 0.6116652488708496), ('quiver', 0.6109452247619629)]" 250,250,114,250_smooth fano threefolds_fano threefolds_fano threefold_fano manifolds,"['smooth fano threefolds', 'fano threefolds', 'fano threefold', 'fano manifolds', 'fano varieties', 'fano folds', 'fano fold', 'fano variety', 'threefolds picard rank', 'stability fano']","['K-stable Fano threefolds of rank 2 and degree 30 We find all K-stable smooth Fano threefolds in the family No. 2.22.\n', 'K-moduli of Fano threefolds in family 3.10 We find all K-polystable limits of smooth Fano threefolds in family 3.10.\n', 'On K-moduli of Fano threefolds with degree 28 and Picard rank 4 We analyse the local structure of the K-moduli space of Fano varieties at a\ntoric singular K-polystable Fano 3-fold, which deforms to smooth Fano 3-folds\nwith anticanonical volume 28 and Picard rank 4. In particular, by constructing\nan algebraic deformation of this toric singular Fano, we show that the\nirreducible component of K-moduli parametrising these smooth Fano 3-folds is a\nrational surface.\n']","[('smooth fano threefolds', 0.7833970189094543), ('fano threefolds', 0.6963886022567749), ('fano threefold', 0.6647604703903198), ('fano manifolds', 0.6531844735145569), ('fano varieties', 0.6394033432006836), ('fano folds', 0.5972851514816284), ('fano fold', 0.5794104933738708), ('fano variety', 0.5452010631561279), ('threefolds picard rank', 0.5448037385940552), ('stability fano', 0.5354028940200806)]" 251,251,114,251_camassa holm_camassa holm ch_holm_holm ch,"['camassa holm', 'camassa holm ch', 'holm', 'holm ch', 'weak solutions', 'solitary wave solutions', 'wave solutions', 'soliton solutions', 'dissipative solutions', 'conserved quantities']","['Global conservative solution for the periodic $\\mu$-Camassa-Holm\n equation In this paper we mainly investigate the periodic $\\mu$-Camassa-Holm equation.\nWe show the existence of global conservative solutions to the Cauchy problem of\nthe periodic $\\mu$-Camassa-Holm equation. The result is obtained by introducing\na coordinate transformation into Lagrangian coordinates. Our solutions depend\ncontinuously on the initial data and has a semigroup property.\n', 'The conservative Camassa-Holm flow with step-like irregular initial data We extend the inverse spectral transform for the conservative Camassa-Holm flow on the line to a class of initial data that requires strong decay at one endpoint but only mild boundedness-type conditions at the other endpoint. The latter condition appears to be close to optimal in a certain sense for the well-posedness of the conservative Camassa-Holm flow. As a byproduct of our approach, we also find a family of new (almost) conservation laws for the Camassa-Holm equation, which could not be deduced from its bi-Hamiltonian structure before and which are connected to certain Besov-type norms (however, in a rather involved way). These results appear to be new even under positivity assumptions on the corresponding momentum, in which case the conservative Camassa-Holm flow coincides with the classical Camassa-Holm flow and no blow-ups occur.', 'Orbital stability of periodic peakons for a new higher-order\n $\\mu$-Camassa-Holm equation Consideration here is a higher-order $\\mu$-Camassa-Holm equation, which is a\nhigher-order extension of the $\\mu$-Camassa-Holm equation and retains some\nproperties of the $\\mu$-Camassa-Holm equation and the modified\n$\\mu$-Camassa-Holm equation. By utilizing the inequalities with the maximum and\nminimum of the solution related to the first three conservation laws, we\nestablish that the periodic peakons of this equation are orbitally stable under\nsmall perturbations in the energy space.\n']","[('camassa holm', 0.5147959589958191), ('camassa holm ch', 0.506384015083313), ('holm', 0.49900007247924805), ('holm ch', 0.4753722548484802), ('weak solutions', 0.4382557272911072), ('solitary wave solutions', 0.4220978319644928), ('wave solutions', 0.4086909294128418), ('soliton solutions', 0.3728395104408264), ('dissipative solutions', 0.35266926884651184), ('conserved quantities', 0.3507448732852936)]" 252,252,113,252_solutions fractional laplacian_fractional laplacians_fractional laplacian equations_fractional laplacian,"['solutions fractional laplacian', 'fractional laplacians', 'fractional laplacian equations', 'fractional laplacian', 'involving fractional laplacian', 'fractional laplacian operator', 'fractional sobolev regularity', 'fractional laplace operator', 'fractional elliptic', 'fractional laplace']","[""Hopf's lemmas and boundary behaviour of solutions to the fractional\n Laplacian in Orlicz-Sobolev spaces In this article we study different extensions of the celebrated Hopf's\nboundary lemma within the context of a family of nonlocal, nonlinear and\nnonstandard growth operators. More precisely, we examine the behavior of\nsolutions of the fractional $a-$Laplacian operator near the boundary of a\ndomain satisfying the interior ball condition. Our approach addresses problems\ninvolving both constant-sign and sign-changing potentials.\n"", ""Boundary behavior of solutions to fractional $p$-Laplacian equation In this work, a generalized Hopf's lemma and a global boundary Harnack\ninequality are proved for solutions to fractional $p$-Laplacian equations.\nThen, the isolation of the first $(s,p)$-eigenvalue is shown in bounded open\nsets satisfying the Wiener criterion.\n"", 'Critical concave convex Ambrosetti-Prodi type problem for fractional\n $p$-Laplacian In this paper we consider a class of critical concave convex Ambrosetti-Prodi\ntype problems for the fractional $p$-Laplacian operator. By applying the\nLinking Theorem and the Mountain Pass Theorem as well, the interaction of the\nnonlinearities with the first eigenvalue of fractional $p$-Laplacian will be\nused to prove existence and multiplicity of solutions.\n']","[('solutions fractional laplacian', 0.7772558927536011), ('fractional laplacians', 0.754524827003479), ('fractional laplacian equations', 0.740452766418457), ('fractional laplacian', 0.7299390435218811), ('involving fractional laplacian', 0.7298989295959473), ('fractional laplacian operator', 0.7229564189910889), ('fractional sobolev regularity', 0.638395369052887), ('fractional laplace operator', 0.6246540546417236), ('fractional elliptic', 0.6013185977935791), ('fractional laplace', 0.5937572717666626)]" 253,253,113,253_hom lie algebras_hom lie algebra_cohomology deformations_cohomology lie,"['hom lie algebras', 'hom lie algebra', 'cohomology deformations', 'cohomology lie', 'post lie algebras', 'algebra cohomology', 'lie algebras', 'cohomology theory', 'graded lie algebra', 'lie algebra also']","['Derivation Hom-Lie 2-algebras and non-abelian extensions of Hom-Lie\n algebras In this paper, we introduce the notion of a derivation of a Hom-Lie algebra\nand construct the corresponding strict Hom-Lie 2-algebra, which is called the\nderivation Hom-Lie 2-algebra. As applications, we study non-abelian extensions\nof Hom-Lie algebras. We show that iso- morphism classes of diagonal non-abelian\nextensions of a Hom-Lie algebra g by a Hom-Lie algebra h are in one-to-one\ncorrespondence with homotopy classes of morphisms from g to the derivation\nHom-Lie 2-algebra DER(h).\n', 'On compatible Hom-Lie triple systems In this paper, we consider compatible Hom-Lie triple systems. Compatible\nHom-Lie triple systems are characterized as Maurer-Cartan elements in a\nsuitable bidifferential graded Lie algebra. We also define a cohomology theory\nfor compatible Hom-Lie triple systems. As applications of cohomology, we study\nabelian extensions and deformations of compatible Hom-Lie triple systems.\n', 'Cohomology and deformations of compatible Hom-Lie algebras In this paper, we consider compatible Hom-Lie algebras as a twisted version\nof compatible Lie algebras. Compatible Hom-Lie algebras are characterized as\nMaurer-Cartan elements in a suitable bidifferential graded Lie algebra. We also\ndefine a cohomology theory for compatible Hom-Lie algebras generalizing the\nrecent work of Liu, Sheng and Bai. As applications of cohomology, we study\nabelian extensions and deformations of compatible Hom-Lie algebras.\n']","[('hom lie algebras', 0.7682440280914307), ('hom lie algebra', 0.7461919188499451), ('cohomology deformations', 0.6236709356307983), ('cohomology lie', 0.6023072600364685), ('post lie algebras', 0.5936297178268433), ('algebra cohomology', 0.5768364071846008), ('lie algebras', 0.5675768256187439), ('cohomology theory', 0.5641571879386902), ('graded lie algebra', 0.5518754720687866), ('lie algebra also', 0.5384639501571655)]" 254,254,113,254_ldpc decoding_ldpc codes_check ldpc codes_parity check ldpc,"['ldpc decoding', 'ldpc codes', 'check ldpc codes', 'parity check ldpc', 'ldpc code', 'parity check codes', 'binary ldpc', 'decoding performance', 'propagation bp decoding', 'check ldpc']","['Probabilistic Shaping for Asymmetric Channels and Low-Density\n Parity-Check Codes An algorithm is proposed to encode low-density parity-check (LDPC) codes into\ncodewords with a non-uniform distribution. This enables power-efficient\nsignalling for asymmetric channels. We show gains of 0.9 dB for additive white\nGaussian noise (AWGN) channels with on-off keying modulation using 5G LDPC\ncodes.\n', 'Low Density Parity Check Code (LDPC Codes) Overview This paper basically expresses the core fundamentals and brief overview of\nthe research of R. G. GALLAGER [1] on Low-Density Parity-Check (LDPC) codes and\nvarious parameters related to LDPC codes like, encoding and decoding of LDPC\ncodes, code rate, parity check matrix, tanner graph. We also discuss advantages\nand applications as well as the usage of LDPC codes in 5G technology. We have\nsimulated encoding and decoding of LDPC codes and have acquired results in\nterms of BER vs SNR graph in MATLAB software. This report was submitted as an\nassignment in Nirma University\n', 'Finite-Length Scaling of Spatially Coupled LDPC Codes Under Window\n Decoding Over the BEC We analyze the finite-length performance of spatially coupled low-density\nparity-check (SC-LDPC) codes under window decoding over the binary erasure\nchannel. In particular, we propose a refinement of the scaling law by Olmos and\nUrbanke for the frame error rate (FER) of terminated SC-LDPC ensembles under\nfull belief propagation (BP) decoding. The refined scaling law models the\ndecoding process as two independent Ornstein-Uhlenbeck processes, in\ncorrespondence to the two decoding waves that propagate toward the center of\nthe coupled chain for terminated SC-LDPC codes. We then extend the proposed\nscaling law to predict the performance of (terminated) SC-LDPC code ensembles\nunder the more practical sliding window decoding. Finally, we extend this\nframework to predict the bit error rate (BER) and block error rate (BLER) of\nSC-LDPC code ensembles. The proposed scaling law yields very accurate\npredictions of the FER, BLER, and BER for both full BP and window decoding.\n']","[('ldpc decoding', 0.6862438917160034), ('ldpc codes', 0.6800639033317566), ('check ldpc codes', 0.6510904431343079), ('parity check ldpc', 0.6033275127410889), ('ldpc code', 0.592729389667511), ('parity check codes', 0.5911148190498352), ('binary ldpc', 0.583713710308075), ('decoding performance', 0.5176470875740051), ('propagation bp decoding', 0.5075864791870117), ('check ldpc', 0.5019153952598572)]" 255,255,113,255_stabilizing controllers_stabilizing controller_robust controller_control nonlinear systems,"['stabilizing controllers', 'stabilizing controller', 'robust controller', 'control nonlinear systems', 'state feedback controller', 'robust control', 'feedback controllers', 'robust stability', 'feedback controller', 'controller synthesis']","['Closed-Loop Identification of Stabilized Models Using Dual Input-Output\n Parameterization This paper introduces a dual input-output parameterization (dual IOP) for the\nidentification of linear time-invariant systems from closed-loop data. It draws\ninspiration from the recent input-output parameterization developed to\nsynthesize a stabilizing controller. The controller is parameterized in terms\nof closed-loop transfer functions, from the external disturbances to the input\nand output of the system, constrained to lie in a given subspace. Analogously,\nthe dual IOP method parameterizes the unknown plant with analogous closed-loop\ntransfer functions, also referred to as dual parameters. In this case, these\nclosed-loop transfer functions are constrained to lie in an affine subspace\nguaranteeing that the identified plant is \\emph{stabilized} by the known\ncontroller. Compared with existing closed-loop identification techniques\nguaranteeing closed-loop stability, such as the dual Youla parameterization,\nthe dual IOP neither requires a doubly-coprime factorization of the controller\nnor a nominal plant that is stabilized by the controller. The dual IOP does not\ndepend on the order and the state-space realization of the controller either,\nas in the dual system-level parameterization. Simulation shows that the dual\nIOP outperforms the existing benchmark methods.\n', 'Direct Data Driven Control Using Noisy Measurements This paper presents a novel direct data-driven control framework for solving the linear quadratic regulator (LQR) under disturbances and noisy state measurements. The system dynamics are assumed unknown, and the LQR solution is learned using only a single trajectory of noisy input-output data while bypassing system identification. Our approach guarantees mean-square stability (MSS) and optimal performance by leveraging convex optimization techniques that incorporate noise statistics directly into the controller synthesis. First, we establish a theoretical result showing that the MSS of an uncertain data-driven system implies the MSS of the true closed-loop system. Building on this, we develop a robust stability condition using linear matrix inequalities (LMIs) that yields a stabilizing controller gain from noisy measurements. Finally, we formulate a data-driven LQR problem as a semidefinite program (SDP) that computes an optimal gain, minimizing the steady-state covariance. Extensive simulations on benchmark systems -- including a rotary inverted pendulum and an active suspension system -- demonstrate the superior robustness and accuracy of our method compared to existing data-driven LQR approaches. The proposed framework offers a practical and theoretically grounded solution for controller design in noise-corrupted environments where system identification is infeasible.', 'Synthesis of Dissipative Systems Using Input-State Data This paper deals with the data-driven synthesis of dissipative linear systems\nin discrete time. We collect finitely many noisy data samples with which we\nsynthesise a controller that makes all systems that explain the data\ndissipative with respect to a given quadratic supply rate. By adopting the\ninformativity approach, we introduce the notion of informativity for\nclosed-loop dissipativity. Under certain assumptions on the noise and the\nsystem, with the help of tools for quadratic matrix inequalities, we provide\nnecessary and sufficient conditions for informativity for closed-loop\ndissipativity. We also provide a recipe to design suitable controllers by means\nof data-based linear matrix inequalities. This main result comprises two parts,\nto account for both the cases that the output matrices are known or unknown.\nLastly, we illustrate our findings with an example, for which we want to design\na data-driven controller achieving (strict) passivity.\n']","[('stabilizing controllers', 0.5247434973716736), ('stabilizing controller', 0.5041810274124146), ('robust controller', 0.5025574564933777), ('control nonlinear systems', 0.4979483187198639), ('state feedback controller', 0.4814956486225128), ('robust control', 0.4755575954914093), ('feedback controllers', 0.47344040870666504), ('robust stability', 0.4728104770183563), ('feedback controller', 0.45167770981788635), ('controller synthesis', 0.4475046694278717)]" 256,256,112,256_motivic spectra_motivic homotopy_motivic cohomology_motivic analogue,"['motivic spectra', 'motivic homotopy', 'motivic cohomology', 'motivic analogue', 'equivariant motivic', 'etale motivic', 'theory motivic', 'cohomology theories', 'base schemes', 'motivic']","['Motivic infinite loop spaces We prove a recognition principle for motivic infinite P1-loop spaces over a\nperfect field. This is achieved by developing a theory of framed motivic\nspaces, which is a motivic analogue of the theory of E-infinity-spaces. A\nframed motivic space is a motivic space equipped with transfers along finite\nsyntomic morphisms with trivialized cotangent complex in K-theory. Our main\nresult is that grouplike framed motivic spaces are equivalent to the full\nsubcategory of motivic spectra generated under colimits by suspension spectra.\nAs a consequence, we deduce some representability results for suspension\nspectra of smooth varieties, and in particular for the motivic sphere spectrum,\nin terms of Hilbert schemes of points in affine spaces.\n', 'Norms in motivic homotopy theory If $f:S\' \\to S$ is a finite locally free morphism of schemes, we construct a\nsymmetric monoidal ""norm"" functor $f_\\otimes: \\mathcal H_*(S\') \\to\\mathcal\nH_*(S)$, where $\\mathcal H_*(S)$ is the pointed unstable motivic homotopy\ncategory over $S$. If $f$ is finite \\\'etale, we show that it stabilizes to a\nfunctor $f_\\otimes: \\mathcal{SH}(S\') \\to \\mathcal{SH}(S)$, where\n$\\mathcal{SH}(S)$ is the $\\mathbb P^1$-stable motivic homotopy category over\n$S$. Using these norm functors, we define the notion of a normed motivic\nspectrum, which is an enhancement of a motivic $E_\\infty$-ring spectrum. The\nmain content of this text is a detailed study of the norm functors and of\nnormed motivic spectra, and the construction of examples. In particular: we\ninvestigate the interaction of norms with Grothendieck\'s Galois theory, with\nBetti realization, and with Voevodsky\'s slice filtration; we prove that the\nnorm functors categorify Rost\'s multiplicative transfers on Grothendieck-Witt\nrings; and we construct normed spectrum structures on the motivic cohomology\nspectrum $H\\mathbb Z$, the homotopy K-theory spectrum $KGL$, and the algebraic\ncobordism spectrum $MGL$. The normed spectrum structure on $H\\mathbb Z$ is a\ncommon refinement of Fulton and MacPherson\'s mutliplicative transfers on Chow\ngroups and of Voevodsky\'s power operations in motivic cohomology.\n', 'The localization theorem for framed motivic spaces We prove the analog of the Morel-Voevodsky localization theorem for framed\nmotivic spaces. We deduce that framed motivic spectra are equivalent to motivic\nspectra over arbitrary schemes, and we give a new construction of the motivic\ncohomology of arbitrary schemes.\n']","[('motivic spectra', 0.7046006917953491), ('motivic homotopy', 0.6923215389251709), ('motivic cohomology', 0.6898288726806641), ('motivic analogue', 0.5817579627037048), ('equivariant motivic', 0.5183833241462708), ('etale motivic', 0.5031164288520813), ('theory motivic', 0.5018592476844788), ('cohomology theories', 0.4726020395755768), ('base schemes', 0.449385404586792), ('motivic', 0.43356120586395264)]" 257,257,112,257_private information retrieval_private information_information leakage_information retrieval pir,"['private information retrieval', 'private information', 'information leakage', 'information retrieval pir', 'revealing information', 'retrieval pir', 'privacy', 'information theoretic', 'privately', 'private']","['The Capacity of Single-Server Weakly-Private Information Retrieval A private information retrieval (PIR) protocol guarantees that a user can\nprivately retrieve files stored in a database without revealing any information\nabout the identity of the requested file. Existing information-theoretic PIR\nprotocols ensure perfect privacy, i.e., zero information leakage to the servers\nstoring the database, but at the cost of high download. In this work, we\npresent weakly-private information retrieval (WPIR) schemes that trade off\nperfect privacy to improve the download cost when the database is stored on a\nsingle server. We study the tradeoff between the download cost and information\nleakage in terms of mutual information (MI) and maximal leakage (MaxL) privacy\nmetrics. By relating the WPIR problem to rate-distortion theory, the\ndownload-leakage function, which is defined as the minimum required download\ncost of all single-server WPIR schemes for a given level of information leakage\nand a fixed file size, is introduced. By characterizing the download-leakage\nfunction for the MI and MaxL metrics, the capacity of single-server WPIR is\nfully described.\n', 'Pliable Private Information Retrieval We formulate a new variant of the private information retrieval (PIR) problem\nwhere the user is pliable, i.e., interested in any message from a desired\nsubset of the available dataset, denoted as pliable private information\nretrieval (PPIR). We consider a setup where a dataset consisting of $f$\nmessages is replicated in $n$ noncolluding databases and classified into\n$\\Gamma$ classes. For this setup, the user wishes to retrieve any $\\lambda\\geq\n1$ messages from multiple desired classes, i.e., $\\eta\\geq 1$, while revealing\nno information about the identity of the desired classes to the databases. We\nterm this problem multi-message PPIR (M-PPIR) and introduce the single-message\nPPIR (PPIR) problem as an elementary special case of M-PPIR. We first derive\nconverse bounds on the M-PPIR rate, which is defined as the ratio of the\ndesired amount of information and the total amount of downloaded information,\nfollowed by the corresponding achievable schemes. As a result, we show that the\nPPIR capacity, i.e., the maximum achievable PPIR rate, for $n$ noncolluding\ndatabases matches the capacity of PIR with $n$ databases and $\\Gamma$ messages.\nThus, enabling flexibility, i.e., pliability, where privacy is only guaranteed\nfor classes, but not for messages as in classical PIR, allows to trade-off\nprivacy versus download rate. A similar insight is shown to hold for the\ngeneral case of M-PPIR.\n', 'Semantic Private Information Retrieval We investigate the problem of semantic private information retrieval\n(semantic PIR). In semantic PIR, a user retrieves a message out of $K$\nindependent messages stored in $N$ replicated and non-colluding databases\nwithout revealing the identity of the desired message to any individual\ndatabase. The messages come with \\emph{different semantics}, i.e., the messages\nare allowed to have \\emph{non-uniform a priori probabilities} denoted by\n$(p_i>0,\\: i \\in [K])$, which are a proxy for their respective popularity of\nretrieval, and \\emph{arbitrary message sizes} $(L_i,\\: i \\in [K])$. This is a\ngeneralization of the classical private information retrieval (PIR) problem,\nwhere messages are assumed to have equal a priori probabilities and equal\nmessage sizes. We derive the semantic PIR capacity for general $K$, $N$. The\nresults show that the semantic PIR capacity depends on the number of databases\n$N$, the number of messages $K$, the a priori probability distribution of\nmessages $p_i$, and the message sizes $L_i$. We present two achievable semantic\nPIR schemes: The first one is a deterministic scheme which is based on message\nasymmetry. This scheme employs non-uniform subpacketization. The second scheme\nis probabilistic and is based on choosing one query set out of multiple options\nat random to retrieve the required message without the need for exponential\nsubpacketization. We derive necessary and sufficient conditions for the\nsemantic PIR capacity to exceed the classical PIR capacity with equal priors\nand sizes. Our results show that the semantic PIR capacity can be larger than\nthe classical PIR capacity when longer messages have higher popularities.\nHowever, when messages are equal-length, the non-uniform priors cannot be\nexploited to improve the retrieval rate over the classical PIR capacity.\n']","[('private information retrieval', 0.6929699182510376), ('private information', 0.5506483316421509), ('information leakage', 0.47718000411987305), ('information retrieval pir', 0.4686659276485443), ('revealing information', 0.4662775695323944), ('retrieval pir', 0.4616197347640991), ('privacy', 0.4530813992023468), ('information theoretic', 0.4067840278148651), ('privately', 0.37498316168785095), ('private', 0.3675479292869568)]" 258,258,112,258_levy processes_similar markov processes_markov processes_quasi stationary distributions,"['levy processes', 'similar markov processes', 'markov processes', 'quasi stationary distributions', 'spectrally negative evy', 'markov process', 'semi markov', 'spectrally positive evy', 'quasi stationary distribution', 'negative evy processes']","[""Exit problems for positive self-similar Markov processes with one-sided\n jumps A systematic exposition of scale functions is given for positive self-similar\nMarkov processes (pssMp) with one-sided jumps. The scale functions express as\nconvolution series of the usual scale functions associated with spectrally\none-sided L\\'evy processes that underly the pssMp through the Lamperti\ntransform. This theory is then brought to bear on solving the spatio-temporal:\n(i) two-sided exit problem; (ii) joint first passage problem upwards for the\nthe pssMp and its multiplicative drawdown (resp. drawup) in the spectrally\nnegative (resp. positive) case.\n"", ""Stable L\\'evy processes in a cone Ba\\~nuelos and Bogdan (2004) and Bogdan, Palmowski and Wang (2016) analyse\nthe asymptotic tail distribution of the first time a stable (L\\'evy) process in\ndimension $d\\geq 2$ exists a cone. We use these results to develop the notion\nof a stable process conditioned to remain in a cone as well as the the notion\nof a stable process conditioned to absorb continuously at the apex of a cone\n(without leaving the cone). As self-similar Markov processes we examine some of\ntheir fundamental properties through the lens of its Lamperti-Kiu\ndecomposition. In particular we are interested to understand the underlying\nstructure of the Markov additive process that drives such processes. As a\nconsequence of our interrogation of the underlying MAP, we are able to provide\nan answer by example to the open question: If the modulator of a MAP has a\nstationary distribution, under what conditions does its ascending ladder MAP\nhave a stationary distribution?\n We show how the two forms of conditioning are dual to one another. Moreover,\nwe construct the recurrent extension of the stable process killed on exiting a\ncone, showing that it again remains in the class of self-similar Markov\nprocesses.\n In the spirit of several very recent works, the results presented here show\nthat many previously unknown results of stable processes, which have long since\nbeen understood for Brownian motion, or are easily proved for Brownian motion,\nbecome accessible by appealing to the notion of the stable process as a\nself-similar Markov process, in addition to its special status as a L\\'evy\nprocesses with a semi-tractable potential analysis.\n"", ""Existence of quasi-stationary distributions for spectrally positive\n L\\'evy processes on the half-line For spectrally positive L\\'evy processes killed on exiting the half-line,\nexistence of a quasi-stationary distribution is characterized by the\nexponential integrability of the exit time, the Laplace exponent and the\nnon-negativity of the scale functions. It is proven that if there is a\nquasi-stationary distribution, there are necessarily infinitely many ones and\nthe set of quasi-stationary distributions is characterized. A sufficient\ncondition for the minimal quasi-stationary distribution to be the Yaglom limit\nis given.\n""]","[('levy processes', 0.6097230315208435), ('similar markov processes', 0.5755704045295715), ('markov processes', 0.5668426156044006), ('quasi stationary distributions', 0.5549851059913635), ('spectrally negative evy', 0.5439596772193909), ('markov process', 0.532330334186554), ('semi markov', 0.5247262120246887), ('spectrally positive evy', 0.5192314386367798), ('quasi stationary distribution', 0.5141048431396484), ('negative evy processes', 0.5109459757804871)]" 259,259,111,259_path algebras_algebras graded_graded ideals_path algebra,"['path algebras', 'algebras graded', 'graded ideals', 'path algebra', 'algebra graded', 'leavitt', 'algebras finite', 'graded theory', 'graph algebras', 'graded ideal']","[""On the ideals of ultragraph Leavitt path algebras In this article, we provide an explicit description of a set of generators\nfor any ideal of an ultragraph Leavitt path algebra. We provide several\nadditional consequences of this description, including information about\ngenerating sets for graded ideals, the graded uniqueness and Cuntz-Krieger\ntheorems, the semiprimeness, and the semiprimitivity of ultragraph Leavitt path\nalgebras, a complete characterization of the prime and primitive ideals of an\nultragraph Leavitt path algebra. We also show that every primitive ideal of an\nultragraph Leavitt path algebra is exactly the annihilator of a Chen simple\nmodule. Consequently, we prove Exel's Effros-Hahn conjecture on primitive\nideals in the ultragraph Leavitt path algebra setting (a conclusion that is\nalso new in the context of Leavitt path algebras of graphs).\n"", 'A Generic Quotient of a Leavitt Path Algebra is a Leavitt Path Algebra We provide a complete answer to the question ""When is a quotient of a Leavitt\npath algebra isomorphic to a Leavitt path algebra?"" in terms of the interaction\nof the kernel of the quotient homomorphism with the cycles of the digraph. A\nkey ingredient is the characterization of finitely generated projective\n(Leavitt path algebra) modules whose endomorphism algebras are finite\ndimensional. We define a stratification and a parametrization of the ideal\nspace of a Leavitt path algebra and show that a generic quotient of a Leavitt\npath algebra is a Leavitt path algebra. Along the way we show that the lattice\nof graded ideals of a Leavitt path algebra is a Morita invariant, hence\nindependent of the grading. Contrary to most algebraic properties of Leavitt\npath algebras, our criterion for a quotient to be isomorphic to a Leavitt path\nalgebra is not independent of the field of coefficients. We end this article by\npointing out an intriguing connection with quantum spaces.\n', 'Realizing ultragraph Leavitt path algebras as Steinberg algebras In this article, we realize ultragraph Leavitt path algebras as Steinberg\nalgebras. This realization allows us to use the groupoid approach to obtain\nstructural results about these algebras. Using skew product groupoid, we show\nthat ultragraph Leavitt path algebras are graded von Neumann regular rings. We\ncharacterize strongly graded ultragraph Leavitt path algebras and show that\nevery ultragraph Leavitt path algebra is semiprimitive. Moreover, we\ncharacterize irreducible representations of ultragraph Leavitt path algebras.\nWe also show that ultragraph Leavitt path algebras can be realized as\nCuntz-Pimsner rings.\n']","[('path algebras', 0.5984772443771362), ('algebras graded', 0.5896286368370056), ('graded ideals', 0.5194516777992249), ('path algebra', 0.5113569498062134), ('algebra graded', 0.5056569576263428), ('leavitt', 0.48732703924179077), ('algebras finite', 0.4813289940357208), ('graded theory', 0.47535547614097595), ('graph algebras', 0.47326353192329407), ('graded ideal', 0.4670443832874298)]" 260,260,111,260_random polytopes_random polytope_convex hulls_convex hull points,"['random polytopes', 'random polytope', 'convex hulls', 'convex hull points', 'polytopes', 'convex bodies', 'convex hull', 'polytope', 'convex body', 'stochastic geometry']","['Beta Polytopes and Beta Cones: An Exactly Solvable Model in Geometric\n Probability Let $X_1,\\ldots, X_n$ be independent random points in the unit ball of\n$\\mathbb R^d$ such that $X_i$ follows a beta distribution with the density\nproportional to $(1-\\|x\\|^2)^{\\beta_i}1_{\\{\\|x\\| <1\\}}$. Here, $\\beta_1,\\ldots,\n\\beta_n> -1$ are parameters. We study random polytopes of the form\n$[X_1,\\ldots,X_n]$, called beta polytopes. We determine explicitly expected\nvalues of several functionals of these polytopes including the number of\n$k$-dimensional faces, the volume, the intrinsic volumes, the total $k$-volume\nof the $k$-skeleton, various angle sums, and the $S$-functional which\ngeneralizes and unifies many of the above examples. We identify and study the\ncentral object needed to analyze beta polytopes: beta cones. For these, we\ndetermine explicitly expected values of several functionals including the solid\nangle, conic intrinsic volumes and the number of $k$-dimensional faces. We\nidentify expected conic intrinsic volumes of beta cones as a crucial quantity\nneeded to express all the functionals mentioned above. We obtain a formula for\nthese expected conic intrinsic volumes in terms of a function $\\Theta$ for\nwhich we provide an explicit integral representation. The proofs combine\nmethods from integral and stochastic geometry with the study of the analytic\nproperties of the function $\\Theta$.\n', ""Beta polytopes and Poisson polyhedra: $f$-vectors and angles We study random polytopes of the form $[X_1,\\ldots,X_n]$ defined as convex\nhulls of independent and identically distributed random points $X_1,\\ldots,X_n$\nin $\\mathbb{R}^d$ with one of the following densities: $$ f_{d,\\beta} (x) =\nc_{d,\\beta} (1-\\|x\\|^2)^{\\beta}, \\qquad \\|x\\| < 1, \\quad \\text{(beta\ndistribution, $\\beta>-1$)} $$ or $$ \\tilde f_{d,\\beta} (x) =\n\\tilde{c}_{d,\\beta} (1+\\|x\\|^2)^{-\\beta}, \\qquad x\\in\\mathbb{R}^d, \\quad\n\\text{(beta' distribution, $\\beta>d/2$)}. $$ This setting also includes the\nuniform distribution on the unit sphere and the standard normal distribution as\nlimiting cases. We derive exact and asymptotic formulae for the expected number\nof $k$-faces of $[X_1,\\ldots,X_n]$ for arbitrary $k\\in\\{0,1,\\ldots,d-1\\}$. We\nprove that for any such $k$ this expected number is strictly monotonically\nincreasing with $n$. Also, we compute the expected internal and external angles\nof these polytopes at faces of every dimension and, more generally, the\nexpected conic intrinsic volumes of their tangent cones. By passing to the\nlarge $n$ limit in the beta' case, we compute the expected $f$-vector of the\nconvex hull of Poisson point processes with power-law intensity function. Using\nconvex duality, we derive exact formulae for the expected number of $k$-faces\nof the zero cell for a class of isotropic Poisson hyperplane tessellations in\n$\\mathbb R^d$. This family includes the zero cell of a classical stationary and\nisotropic Poisson hyperplane tessellation and the typical cell of a stationary\nPoisson--Voronoi tessellation as special cases. In addition, we prove precise\nlimit theorems for this $f$-vector in the high-dimensional regime, as\n$d\\to\\infty$. Finally, we relate the $d$-dimensional beta and beta'\ndistributions to the generalized Pareto distributions known in extreme-value\ntheory.\n"", ""Angles of Random Simplices and Face Numbers of Random Polytopes Pick $d+1$ points uniformly at random on the unit sphere in $\\mathbb R^d$.\nWhat is the expected value of the angle sum of the simplex spanned by these\npoints? Choose $n$ points uniformly at random in the $d$-dimensional ball. What\nis the expected number of faces of their convex hull? We answer these and some\nrelated questions of stochastic geometry. To this end, we compute expected\ninternal angles of random simplices whose vertices are independent random\npoints sampled from one of the following $d$-dimensional distributions: (i) the\nbeta distribution with the density proportional to $(1-\\|x\\|^2)^{\\beta}$, where\n$x$ is belongs to the unit ball in $\\mathbb R^d$; (ii) the beta' distribution\nwith the density proportional to $(1+\\|x\\|^2)^{-\\beta}$, where\n$x\\in\\mathbb{R}^{d}$. These results imply explicit formulae for the expected\nface numbers of the following random polytopes: (a) the typical Poisson-Voronoi\ncell; (b) the zero cell of the Poisson hyperplane tessellation; (c) beta and\nbeta' polytopes defined as convex hulls of i.i.d. samples from the\ncorresponding distributions.\n""]","[('random polytopes', 0.6208714246749878), ('random polytope', 0.5794429183006287), ('convex hulls', 0.5036776065826416), ('convex hull points', 0.48666200041770935), ('polytopes', 0.47826090455055237), ('convex bodies', 0.47437044978141785), ('convex hull', 0.4537370502948761), ('polytope', 0.4377724826335907), ('convex body', 0.4335496723651886), ('stochastic geometry', 0.4201650321483612)]" 261,261,111,261_sturm liouville operators_sturm liouville operator_inverse spectral theory_inverse spectral,"['sturm liouville operators', 'sturm liouville operator', 'inverse spectral theory', 'inverse spectral', 'liouville operators', 'spectral problems', 'liouville operator', 'sturm liouville problems', 'spectral parameter', 'sturm liouville type']","['Spectrum completion and inverse Sturm-Liouville problems Given a finite set of eigenvalues of a regular Sturm-Liouville problem for\nthe equation -y{\\prime}{\\prime}+q(x)y={\\lambda}y, the potential q(x) of which\nis unknown. We show the possibility to compute more eigenvalues without any\nadditional information on the potential q(x). Moreover, considering the\nSturm-Liouville problem with the boundary conditions y{\\prime}(0)-hy(0)=0 and\ny{\\prime}({\\pi})+Hy({\\pi})=0, where h, H are some constants, we complete its\nspectrum without additional information neither on the potential q(x) nor on\nthe constants h and H. The eigenvalues are computed with a uniform absolute\naccuracy. Based on this result we propose a new method for numerical solution\nof the inverse Sturm-Liouville problem of recovering the potential from two\nspectra. The method includes the completion of the spectra in the first step\nand reduction to a system of linear algebraic equations in the second. The\npotential q(x) is recovered from the first component of the solution vector.\nThe approach is based on special Neumann series of Bessel functions\nrepresentations for solutions of Sturm-Liouville equations possessing\nremarkable properties and leads to an efficient numerical algorithm for solving\ninverse Sturm-Liouville problems.\n', 'Local solvability and stability of the inverse problem for the\n non-self-adjoint Sturm-Liouville operator We consider the non-self-adjoint Sturm-Liouville operator on a finite\ninterval. The inverse spectral problem is studied, which consists in recovering\nthis operator from its eigenvalues and generalized weight numbers. We prove\nlocal solvability and stability of this inverse problem, relying on the method\nof spectral mappings. Possible splitting of multiple eigenvalues is taken into\naccount.\n', 'Inverse Sturm-Liouville problem with analytical functions in the\n boundary condition The inverse spectral problem is studied for the Sturm-Liouville operator with\na complex-valued potential and arbitrary entire functions in one of the\nboundary conditions. We obtain necessary and sufficient conditions for\nuniqueness, and develop a constructive algorithm for the inverse problem\nsolution. The main results are applied to the Hochstadt-Lieberman half-inverse\nproblem. As an auxiliary proposition, we prove local solvability and stability\nfor the inverse Sturm-Liouville problem by the Cauchy data in the\nnon-self-adjoint case.\n']","[('sturm liouville operators', 0.6767178177833557), ('sturm liouville operator', 0.6752378940582275), ('inverse spectral theory', 0.6518281698226929), ('inverse spectral', 0.6469900012016296), ('liouville operators', 0.597019612789154), ('spectral problems', 0.5961850881576538), ('liouville operator', 0.5951401591300964), ('sturm liouville problems', 0.5894889831542969), ('spectral parameter', 0.5239428877830505), ('sturm liouville type', 0.520825207233429)]" 262,262,111,262_public transit_transportation network_transit systems_mobility systems,"['public transit', 'transportation network', 'transit systems', 'mobility systems', 'public transport', 'traffic congestion', 'transportation', 'transit', 'ridesharing', 'buses']","[""An algorithm for integrating peer-to-peer ridesharing and schedule-based\n transit system for first mile/last mile access Due to limited transit network coverage and infrequent service, suburban\ncommuters often face the transit first mile/last mile (FMLM) problem. To deal\nwith this, they either drive to a park-and-ride location to take transit, use\ncarpooling, or drive directly to their destination to avoid inconvenience.\nRidesharing, an emerging mode of transportation, can solve the transit first\nmile/last mile problem. In this setup, a driver can drive a ride-seeker to a\ntransit station, from where the rider can take transit to her respective\ndestination. The problem requires solving a ridesharing matching problem with\nthe routing of riders in a multimodal transportation network. We develop a\ntransit-based ridesharing matching algorithm to solve this problem. The method\nleverages the schedule-based transit shortest path to generate feasible matches\nand then solves a matching optimization program to find an optimal match\nbetween riders and drivers. The proposed method not only assigns an optimal\ndriver to the rider but also assigns an optimal transit stop and a transit\nvehicle trip departing from that stop for the rest of the rider's itinerary. We\nalso introduce the application of space-time prism (STP) (the geographical area\nwhich can be reached by a traveler given the time constraints) in the context\nof ridesharing to reduce the computational time by reducing the network search.\nAn algorithm to solve this problem dynamically using a rolling horizon approach\nis also presented. We use simulated data obtained from the activity-based\ntravel demand model of Twin Cities, MN to show that the transit-based\nridesharing can solve the FMLM problem and save a significant number of\nvehicle-hours spent in the system.\n"", 'Revitalizing Public Transit in Low Ridership Areas: An Exploration of\n On-Demand Multimodal Transit Systems Public transit plays an essential role in mitigating traffic congestion,\nreducing emissions, and enhancing travel accessibility and equity. One of the\ncritical challenges in designing public transit systems is distributing finite\nservice supplies temporally and spatially to accommodate time-varying and\nspace-heterogeneous travel demands. Particularly, for regions with low or\nscattered ridership, there is a dilemma in designing traditional transit lines\nand corresponding service frequencies. Dense transit lines and high service\nfrequency increase operation costs, while sparse transit lines and low service\nfrequency result in poor accessibility and long passenger waiting time. In the\ncoming era of Mobility-as-a-Service, the aforementioned challenge is expected\nto be addressed by on-demand services. In this study, we design an On-Demand\nMultimodel Transit System (ODMTS) for regions with low or scattered travel\ndemands, in which some low-ridership bus lines are replaced with flexible\non-demand ride-sharing shuttles. In the proposed ODMTS, riders within service\nregions can request shuttles to finish their trips or to connect to fixed-route\nservices such as bus, metro, and light rail. Leveraging the integrated\ntransportation system modeling platform, POLARIS, a simulation-based case study\nis conducted to assess the effectiveness of this system in Austin, Texas.\n', 'Planning of integrated mobility-on-demand and urban transit networks We envision a multimodal transportation system where Mobility-on-Demand (MoD)\nservice is used to serve the first mile and last mile of transit trips. For\nthis purpose, the current research formulates an optimization model for\ndesigning an integrated MoD and urban transit system. The proposed model is a\nmixed-integer non-linear programming model that captures the strategic behavior\nof passengers in a multimodal network through a passenger assignment model. It\ndetermines which transit routes to operate, the frequency of the operating\nroutes, the fleet size of vehicles required in each transportation analysis\nzone to serve the demand, and the passenger flow on both road and transit\nnetworks. A Benders decomposition approach with several enhancements is\nproposed to solve the given optimization program. Computational experiments are\npresented for the Sioux Falls multimodal network. The results show a\nsignificant improvement in the congestion in the city center with the\nintroduction and optimization of an integrated transportation system. The\nproposed design allocates more vehicles to the outskirt zones in the network\n(to serve the first mile and last mile of transit trips) and more frequency to\nthe transit routes in the city center. The integrated system significantly\nimproves the share of transit passengers and their level of service in\ncomparison to the base optimized transit system. The sensitivity analysis of\nthe bus and vehicle fleet shows that increasing the number of buses has more\nimpact on improving the level of service of passengers compared to increasing\nthe number of MoD vehicles. Finally, we provide managerial insights for\ndeploying such multimodal service.\n']","[('public transit', 0.5629184246063232), ('transportation network', 0.5568921566009521), ('transit systems', 0.5222118496894836), ('mobility systems', 0.49462637305259705), ('public transport', 0.482656329870224), ('traffic congestion', 0.46912428736686707), ('transportation', 0.46783247590065), ('transit', 0.46449121832847595), ('ridesharing', 0.4630991518497467), ('buses', 0.44608980417251587)]" 263,263,110,263_boltzmann based_boltzmann transport_boltzmann bgk_boltzmann,"['boltzmann based', 'boltzmann transport', 'boltzmann bgk', 'boltzmann', 'convection diffusion', 'finite difference scheme', 'based lattice', 'finite difference', 'time lattice', 'kinetic scheme']","['An automatic approach to develop the fourth-order and L^2-stable lattice\n Boltzmann model for diagonal-anisotropic diffusion equations This paper discusses how to develop a high-order multiple-relaxation-time\nlattice Boltzmann (MRT-LB) model for the general d(>=1)-dimensional\ndiagonal-anisotropic diffusion equation. Such an MRT-LB model considers the\ntransformation matrix constructed in a natural way and the DdQ(2d^2+1) lattice\nstructure. A key step in developing the high-order MRT-LB model is to determine\nthe adjustable relaxation parameters and weight coefficients, which are used to\neliminate the truncation errors at certain orders of the MRT-LB model, while\nensuring the stability of the MRT-LB model. In this work, we first present a\nunified MRT-LB model for the diagonal-anisotropic diffusion equation. Then,\nthrough the direct Taylor expansion, we analyze the macroscopic modified\nequations of the MRT-LB model up to fourth-order, and further derive the\nfourth-order consistent conditions of the MRT-LB model. Additionally, we also\nconstruct the fourth-order initialization scheme for the present LB method.\nAfter that, the condition which guarantees that the MRT-LB model can satisfy\nthe stability structure is explicitly given, and from a numerical perspective,\nonce the stability structure is satisfied, the MRT-LB model must be L^2 stable.\nIn combination with the fourth-order consistent and L^2 stability conditions,\nthe relaxation parameters and weight coefficients of the MRT-LB model can be\nautomatically given by a simple computer code. Finally, we perform numerical\nsimulations of several benchmark problems, and find that the numerical results\ncan achieve a fourth-order convergence rate, which is in agreement with our\ntheoretical analysis. In particular, for the isotropic diffusion equation, we\nalso make a comparison between the fourth-order MRT-LB models with the\nDdQ(2d^2+1) and DdQ(2d+1) lattice structures, and the numerical results show\nthat the MRT-LB model with the DdQ(2d^2+1) lattice structure is more general.\n', 'A general fourth-order mesoscopic multiple-relaxation-time lattice\n Boltzmann model and equivalent macroscopic finite-difference scheme for\n two-dimensional diffusion equations In this work, we first develop a general mesoscopic multiple-relaxation-time\nlattice Boltzmann (MRT-LB) model for the two-dimensional diffusion equation\nwith the constant diffusion coefficient and source term, where the D2Q5 (five\ndiscrete velocities in two-dimensional space) lattice structure is considered.\nThen we exactly derive the equivalent macroscopic finite-difference scheme of\nthe MRT-LB model. Additionally, we also propose a proper MRT-LB model for the\ndiffusion equation with a linear source term, and obtain an equivalent\nmacroscopic six-level finite-difference scheme. After that, we conduct the\naccuracy and stability analysis of the finite-difference scheme and the\nmesoscopic MRT-LB model. It is found that at the diffusive scaling, both of\nthem can achieve a fourth-order accuracy in space based on the Taylor\nexpansion. The stability analysis also shows that they are both unconditionally\nstable. Finally, some numerical experiments are conducted, and the numerical\nresults are also consistent with our theoretical analysis.\n', 'An immersed interface-lattice Boltzmann method for fluid-structure\n interaction An immersed interface-lattice Boltzmann method (II-LBM) is developed for\nmodelling fluid-structure systems. The key element of this approach is the\ndetermination of the jump conditions that are satisfied by the distribution\nfunctions within the framework of the lattice Boltzmann method when forces are\nimposed along a surface immersed in an incompressible fluid. In this initial\nII-LBM, the discontinuity related to the normal portion of the interfacial\nforce is sharply resolved by imposing the relevant jump conditions using an\napproach that is analogous to imposing the corresponding pressure jump\ncondition in the incompressible Navier-Stokes equations. We show that the jump\nconditions for the distribution functions are the same in both\nsingle-relaxation-time and multi-relaxation-time LBM formulations. Tangential\nforces are treated using the immersed boundary-lattice Boltzmann method\n(IB-LBM). The performance of the II-LBM method is compared to both the direct\nforcing IB-LBM for rigid-body fluid-structure interaction, and the classical\nIB-LBM for elastic interfaces. Higher order accuracy is observed with the\nII-LBM as compared to the IB-LBM for selected benchmark problems. Because the\njump conditions of the distribution function also satisfy the continuity of the\nvelocity field across the interface, the error in the velocity field is much\nsmaller for the II-LBM than the IB-LBM. The II-LBM is also demonstrated to\nprovide superior volume conservation when simulating flexible boundaries.\n']","[('boltzmann based', 0.49423280358314514), ('boltzmann transport', 0.491838276386261), ('boltzmann bgk', 0.428296834230423), ('boltzmann', 0.4282011389732361), ('convection diffusion', 0.4184987246990204), ('finite difference scheme', 0.38644522428512573), ('based lattice', 0.3481917679309845), ('finite difference', 0.3034323751926422), ('time lattice', 0.2992453873157501), ('kinetic scheme', 0.298686146736145)]" 264,264,110,264_skewness kurtosis_weibull distributions_weibull distribution_distributions,"['skewness kurtosis', 'weibull distributions', 'weibull distribution', 'distributions', 'lifetime distribution', 'tailed distributions', 'distribution', 'generalized skew', 'family distributions', 'proposed distribution']","['A Novel Bivariate Generalized Weibull Distribution with Properties and\n Applications Univariate Weibull distribution is a well-known lifetime distribution and has\nbeen widely used in reliability and survival analysis. In this paper, we\nintroduce a new family of bivariate generalized Weibull (BGW) distributions,\nwhose univariate marginals are exponentiated Weibull distribution. Different\nstatistical quantiles like marginals, conditional distribution, conditional\nexpectation, product moments, correlation and a measure component reliability\nare derived. Various measures of dependence and statistical properties along\nwith ageing properties are examined. Further, the copula associated with BGW\ndistribution and its various important properties are also considered. The\nmethods of maximum likelihood and Bayesian estimation are employed to estimate\nunknown parameters of the model. A Monte Carlo simulation and real data study\nare carried out to demonstrate the performance of the estimators and results\nhave proven the effectiveness of the distribution in real-life situations\n', 'A Bimodal Weibull Distribution: Properties and Inference Modeling is a challenging topic and using parametric models is an important\nstage to reach flexible function for modeling. Weibull distribution has two\nparameters which are shape $\\alpha$ and scale $\\beta$. In this study,\nbimodality parameter is added and so bimodal Weibull distribution is proposed\nby using a quadratic transformation technique used to generate bimodal\nfunctions produced due to using the quadratic expression. The analytical\nsimplicity of Weibull and quadratic form give an advantage to derive a bimodal\nWeibull via constructing normalizing constant. The characteristics and\nproperties of the proposed distribution are examined to show its usability in\nmodeling. After examination as first stage in modeling issue, it is appropriate\nto use bimodal Weibull for modeling data sets. Two estimation methods which are\nmaximum $\\log_q$ likelihood and its special form including objective functions\n$\\log_q(f)$ and $\\log(f)$ are used to estimate the parameters of shape, scale\nand bimodality parameters of the function. The second stage in modeling is\novercome by using heuristic algorithm for optimization of function according to\nparameters due to fact that converging to global point of objective function is\nperformed by heuristic algorithm based on the stochastic optimization. Real\ndata sets are provided to show the modeling competence of the proposed\ndistribution.\n', ""An analysis of multivariate measures of skewness and kurtosis of\n skew-elliptical distributions This paper examines eight measures of skewness and Mardia measure of kurtosis\nfor skew-elliptical distributions. Multivariate measures of skewness considered\ninclude Mardia, Malkovich-Afifi, Isogai, Song, Balakrishnan-Brito-Quiroz,\nM$\\acute{o}$ri, Rohatgi and Sz$\\acute{e}$kely, Kollo and Srivastava measures.\nWe first study the canonical form of skew-elliptical distributions, and then\nderive exact expressions of all measures of skewness and kurtosis for the\nfamily of skew-elliptical distributions, except for Song's measure.\nSpecifically, the formulas of these measures for skew normal, skew $t$, skew\nlogistic, skew Laplace, skew Pearson type II and skew Pearson type VII\ndistributions are obtained. Next, as in Malkovich and Afifi (1973), test\nstatistics based on a random sample are constructed for illustrating the\nusefulness of the established results. In a Monte Carlo simulation study,\ndifferent measures of skewness and kurtosis for $2$-dimensional skewed\ndistributions are calculated and compared. Finally, real data is analyzed to\ndemonstrate all the results.\n""]","[('skewness kurtosis', 0.5365507006645203), ('weibull distributions', 0.5158618092536926), ('weibull distribution', 0.4836932420730591), ('distributions', 0.46811673045158386), ('lifetime distribution', 0.44535964727401733), ('tailed distributions', 0.436953604221344), ('distribution', 0.42862996459007263), ('generalized skew', 0.4285890758037567), ('family distributions', 0.4246518909931183), ('proposed distribution', 0.4161659777164459)]" 265,265,109,265_finite coxeter groups_finite coxeter group_coxeter groups_irreducible coxeter group,"['finite coxeter groups', 'finite coxeter group', 'coxeter groups', 'irreducible coxeter group', 'coxeter group', 'reflection groups', 'complex reflection groups', 'group coxeter', 'finite coxeter', 'reflection subgroups']","['Interval groups related to finite Coxeter groups I We derive presentations of the interval groups related to all quasi-Coxeter\nelements in the Coxeter group of type $D_n$. Type $D_n$ is the only infinite\nfamily of finite Coxeter groups that admits proper quasi-Coxeter elements. The\npresentations we obtain are over a set of generators in bijection with what we\ncall a Carter generating set, and the relations are those defined by the\nrelated Carter diagram together with a twisted or a cycle commutator relator,\ndepending on whether the quasi-Coxeter element is a Coxeter element or not. The\nproof is based on the description of two combinatorial techniques related to\nthe intervals of quasi-Coxeter elements.\n In a subsequent work [4], we complete our analysis to cover all the\nexceptional cases of finite Coxeter groups, and establish that almost all the\ninterval groups related to proper quasi-Coxeter elements are not isomorphic to\nthe related Artin groups, hence establishing a new family of interval groups\nwith nice presentations. Alongside the proof of the main results, we establish\nimportant properties related to the dual approach to Coxeter and Artin groups.\n', 'Reflection factorizations and quasi-Coxeter elements We investigate the so-called dual Matsumoto property or Hurwitz action in\nfinite, affine and arbitrary Coxeter groups. In particular, we want to\ninvestigate how to reduce reflection factorizations and how two reflection\nfactorizations of the same element are related to each other. We are motivated\nby the dual approach to Coxeter groups proposed by Bessis and the question\nwhether there is an anlogue of the well known Matsumoto property for reflection\nfactorizations. Our aim is a substantial understanding of the Hurwitz action.\nWe therefore reprove uniformly results of Lewis and Reiner as well as\nBaumeister, Gobet, Roberts and the first author on the Hurwitz in finite\nCoxeter groups. Further we show that in an arbitrary Coxeter group all reduced\nreflection factorizations of the same element appear in the same Hurwitz orbit\nafter a suitable extension by simple reflections. As parabolic quasi-Coxeter\nelements play an outstanding role in the study of the Hurwitz action, we aim to\ncharacterize these elements. We give characterizations of maximal parabolic\nquasi-Coxeter elements in arbitrary Coxeter groups as well as a\ncharacterization of all parabolic quasi-Coxeter elements in affine Coxeter\ngroups.\n', 'Powers of Coxeter elements with unbounded reflection length For Coxeter groups with sufficiently large braid relations, we prove that the\nsequence of powers of a Coxeter element has unbounded reflection length. We\nestablish a connection between the reflection length functions on arbitrary\nCoxeter groups and the reflection length functions on universal Coxeter groups\nof the same rank through the solution to the word problem for Coxeter groups.\nFor Coxeter groups corresponding to a Coxeter matrix with the same entry\neverywhere except the diagonal, upper bounds for the reflection length of the\npowers of Coxeter elements are established.\n']","[('finite coxeter groups', 0.7919273376464844), ('finite coxeter group', 0.7656177282333374), ('coxeter groups', 0.7157371640205383), ('irreducible coxeter group', 0.683555006980896), ('coxeter group', 0.6669554114341736), ('reflection groups', 0.6397227048873901), ('complex reflection groups', 0.6234914064407349), ('group coxeter', 0.6234174370765686), ('finite coxeter', 0.6183428168296814), ('reflection subgroups', 0.6151999235153198)]" 266,266,109,266_quasi geostrophic equations_surface quasi geostrophic_geostrophic equations_quasi geostrophic sqg,"['quasi geostrophic equations', 'surface quasi geostrophic', 'geostrophic equations', 'quasi geostrophic sqg', 'quasi geostrophic', 'surface quasi', 'global well posedness', 'local well posedness', 'global smooth solutions', 'geostrophic sqg']","['Existence of asymmetric vortex patch for the generalized SQG equations This paper aims to study the existence of asymmetric solutions for the\ntwo-dimensional generalized surface quasi-geostrophic (gSQG) equations of\nsimply connected patches for $\\alpha\\in[1,2)$ in the whole plane, where\n$\\alpha=1$ corresponds to the surface quasi-geostrophic equations (SQG). More\nprecisely, we construct non-trivial simply connected co-rotating and traveling\npatches with unequal vorticity magnitudes. The proof is carried out by means of\na combination of a desingularization argument with the implicit function\ntheorem on the linearization of contour dynamics equation. Our results extend\nrecent ones in the range $\\alpha\\in[0,1)$ by Hassainia-Hmidi (DCDS-A, 2021) and\nHassainia-Wheeler (SIAM J. Math. Anal., 2022) to more singular velocities,\nfilling an open gap in the range of $\\alpha$.\n', 'Smooth traveling-wave solutions to the inviscid surface\n quasi-geostrophic equations In a recent article by Gravejat and Smets, it is built smooth solutions to\nthe inviscid surface quasi-geostrophic equation that have the form of a\ntraveling wave. In this article we work back on their construction to provide\nsolution to a more general class of quasi-geostrophic equation where the\nhalf-laplacian is replaced by any fractional laplacian.\n', 'Contour Dynamics for Surface Quasi-Geostrophic Fronts We use contour dynamics to derive equations of motion for infinite planar\nsurface quasi-geostrophic (SQG) fronts, and show that it leads to the same\nresult as a regularization procedure introduced previously by Hunter and Shu\n(2018).\n']","[('quasi geostrophic equations', 0.7545023560523987), ('surface quasi geostrophic', 0.6546968817710876), ('geostrophic equations', 0.6217037439346313), ('quasi geostrophic sqg', 0.6136584281921387), ('quasi geostrophic', 0.594871997833252), ('surface quasi', 0.49794647097587585), ('global well posedness', 0.496463418006897), ('local well posedness', 0.484151691198349), ('global smooth solutions', 0.4638334810733795), ('geostrophic sqg', 0.45277267694473267)]" 267,267,108,267_vehicle routing_capacitated vehicle routing_vehicle routing problems_routes,"['vehicle routing', 'capacitated vehicle routing', 'vehicle routing problems', 'routes', 'routing', 'traveling salesman', 'routing time', 'routing problems', 'metaheuristics', 'route']","['Vehicle Routing for the Last-Mile Logistics Problem Energy consumption is the major contributor associated with large and growing\ntransportation cost in logistics. Optimal vehicle routing approaches can\nprovide solutions to reduce their operating costs and address implications on\nenergy. This paper outlines a solution to the single-depot capacitated vehicle\nrouting problem with the objective of minimizing daily operation cost with a\nhomogeneous fleet of delivery vehicles. The problem is solved using Simulated\nAnnealing, to provide optimal routes for the vehicles traveling between the\ndepot and destinations. Simulation results demonstrate that the proposed\napproach is effective to recommend an optimal route and reduce operation cost.\nSupplementary information and video of our proposed approach can be found at:\nhttps://sites.google.com/view/ud-ids-lab/last-mile\n', ""An integrated selection and routing policy for urban waste collection We study a daily urban waste collection problem arising in the municipality\nof Groningen, The Netherlands, where residents bring their waste to local\nunderground waste containers organised in clusters. The municipality plans\nroutes for waste collection vehicles to empty the container clusters. These\nroutes should be as short as possible to limit operational costs, but also long\nenough to visit sufficiently many clusters and ensure that containers do not\noverflow. A complicating factor is that the actual fill levels of the clusters'\ncontainers are not known, and only the number of deposits is observed.\nAdditionally, it is unclear whether the containers should be upgraded with\nexpensive fill level sensors so that the service level can be improved or\nrouting costs can be reduced. We propose an efficient integrated selection and\nrouting (ISR) policy that jointly optimises the daily cluster selection and\nrouting decisions. The integration is achieved by first estimating prizes that\nexpress the urgency of selecting a cluster to empty, and then solving a\nprize-collecting vehicle routing problem with time windows and driver breaks to\ncollect these prizes while minimising routing costs. We use a metaheuristic to\nsolve the prize-collecting vehicle routing problem inside a realistic\nsimulation environment that models the waste collection problem faced by the\nmunicipality. We show that solving the daily waste collection problem in this\nway is very effective, and can lead to substantial cost savings for the\nmunicipality in practice, with no reduction in service level. In particular, by\nintegrating the container selection and routing problems using our ISR policy,\nrouting costs can be reduced by more than 40% and the fleet size by 25%. We\nalso show that more advanced measuring techniques do not significantly reduce\nrouting costs, and the service level not at all.\n"", 'The Mobile Production Vehicle Routing Problem: Using 3D Printing in Last\n Mile Distribution We study a new variant of the vehicle routing problem, called the Mobile\nProduction Vehicle Routing Problem (MoP-VRP). In this problem, vehicles are\nequipped with 3D printers, and production takes place on the way to the\ncustomer. The objective is to minimize the weighted cost incurred by travel and\ndelay of service. We formulate a Mixed Integer Programming (MIP) model and\ndevelop an Adaptive Large Neighbourhood Search (ALNS) heuristic for this\nproblem. To show the advantage of mobile production, we compare the problem\nwith the Central Production Vehicle Routing Problem (CP-VRP), where production\ntakes place in a central depot. We also propose an efficient ALNS for the\nCP-VRP. We generate benchmark instances based on Vehicle Routing Problem with\nTime Windows (VRPTW) benchmark instances, and realistic instances based on\nreal-life data provided by the Danish Company 3D Printhuset. Overall, the\nproposed ALNS for both problems are efficient, and we solve instances up to 200\ncustomers within a short computational time. We test different scenarios with\nvarying numbers of machines in each vehicle, as well as different production\ntime. The results show that these are the key factors that influence travel and\ndelay costs. The key advantage of mobile production is flexibility: it can\nshorten the time span from the start of production to the delivery of products,\nand at the same time lower delivery costs. Moreover, long-term cost estimations\nshow that this technology has low operation costs and thus is feasible in real\nlife practice.\n']","[('vehicle routing', 0.708404004573822), ('capacitated vehicle routing', 0.7015138268470764), ('vehicle routing problems', 0.6300985813140869), ('routes', 0.4950123727321625), ('routing', 0.4940704107284546), ('traveling salesman', 0.44372880458831787), ('routing time', 0.44225990772247314), ('routing problems', 0.4267606735229492), ('metaheuristics', 0.4182952642440796), ('route', 0.4073580503463745)]" 268,268,108,268_hermite hadamard inequality_inequality convex functions_convex functions applications_hadamard inequality,"['hermite hadamard inequality', 'inequality convex functions', 'convex functions applications', 'hadamard inequality', 'jensen inequality', 'inequalities convex', 'inequality convex', 'convex functions', 'types convex', 'inequalities weighted']","[""On the equality problem of generalized Bajraktarevi\\'c means The purpose of this paper is to investigate the equality problem of\ngeneralized Bajraktarevi\\'c means, i.e., to solve the functional equation\n\\begin{equation}\\label{E0}\\tag{*}\n f^{(-1)}\\bigg(\\frac{p_1(x_1)f(x_1)+\\dots+p_n(x_n)f(x_n)}{p_1(x_1)+\\dots+p_n(x_n)}\\bigg)=g^{(-1)}\\bigg(\\frac{q_1(x_1)g(x_1)+\\dots+q_n(x_n)g(x_n)}{q_1(x_1)+\\dots+q_n(x_n)}\\bigg),\n\\end{equation} which holds for all $x=(x_1,\\dots,x_n)\\in I^n$, where $n\\geq 2$,\n$I$ is a nonempty open real interval, the unknown functions\n$f,g:I\\to\\mathbb{R}$ are strictly monotone, $f^{(-1)}$ and $g^{(-1)}$ denote\ntheir generalized left inverses, respectively, and\n$p=(p_1,\\dots,p_n):I\\to\\mathbb{R}_{+}^n$ and\n$q=(q_1,\\dots,q_n):I\\to\\mathbb{R}_{+}^n$ are also unknown functions. This\nequality problem in the symmetric two-variable (i.e., when $n=2$) case was\nalready investigated and solved under sixth-order regularity assumptions by\nLosonczi in 1999. In the nonsymmetric two-variable case, assuming three times\ndifferentiability of $f$, $g$ and the existence of $i\\in\\{1,2\\}$ such that\neither $p_i$ is twice continuously differentiable and $p_{3-i}$ is continuous\non $I$, or $p_i$ is twice differentiable and $p_{3-i}$ is once differentiable\non $I$, we prove that \\eqref{E0} holds if and only if there exist four\nconstants $a,b,c,d\\in\\mathbb{R}$ with $ad\\neq bc$ such that \\begin{equation*}\n cf+d>0,\\qquad\n g=\\frac{af+b}{cf+d},\\qquad\\mbox{and}\\qquad q_\\ell=(cf+d)p_\\ell\\qquad\n(\\ell\\in\\{1,\\dots,n\\}). \\end{equation*} In the case $n\\geq 3$, we obtain the\nsame conclusion with weaker regularity assumptions. Namely, we suppose that $f$\nand $g$ are three times differentiable, $p$ is continuous and there exist\n$i,j,k\\in\\{1,\\dots,n\\}$ with $i\\neq j\\neq k\\neq i$ such that $p_i,p_j,p_k$ are\ndifferentiable.\n"", 'On the equality of generalized Bajraktarevi\\\'c means under first-order\n differentiability assumptions In this paper we consider the equality problem of generalized Bajraktarevi\\\'c\nmeans, i.e., we are going to solve the functional equation\n\\begin{equation}\\label{E0}\\tag{*}\n f^{(-1)}\\bigg(\\frac{p_1(x_1)f(x_1)+\\dots+p_n(x_n)f(x_n)}{p_1(x_1)+\\dots+p_n(x_n)}\\bigg)=g^{(-1)}\\bigg(\\frac{q_1(x_1)g(x_1)+\\dots+q_n(x_n)g(x_n)}{q_1(x_1)+\\dots+q_n(x_n)}\\bigg),\n\\end{equation} which holds for all $x=(x_1,\\dots,x_n)\\in I^n$, where $n\\geq 2$,\n$I$ is a nonempty open real interval, the unknown functions\n$f,g:I\\to\\mathbb{R}$ are strictly monotone, $f^{(-1)}$ and $g^{(-1)}$ denote\ntheir generalized left inverses, respectively, and the vector-valued weight\nfunctions $p=(p_1,\\dots,p_n):I\\to\\mathbb{R}_{+}^n$ and\n$q=(q_1,\\dots,q_n):I\\to\\mathbb{R}_{+}^n$ are also unknown. This equality\nproblem in the symmetric two-variable case (i.e., when $n=2$ and $p_1=p_2$,\n$q_1=q_2$) was solved under sixth-order regularity assumptions by Losonczi in\n1999. The authors of this paper improved this result in 2023 by reaching the\nsame conclusion assuming only first-order differentiability. In the\nnonsymmetric case, assuming third-order differentiability of $f$, $g$ and the\nfirst-order differentiability of at least three of the functions\n$p_1,\\dots,p_n$, Gr\\""unwald and P\\\'ales proved that \\eq{0} holds if and only if\nthere exist four constants $a,b,c,d\\in\\mathbb{R}$ with $ad\\neq bc$ such that $$\n cf+d>0,\\qquad\n g=\\frac{af+b}{cf+d},\\qquad\\mbox{and}\\qquad q_\\ell=(cf+d)p_\\ell\\qquad\n(\\ell\\in\\{1,\\dots,n\\}). $$ The main goal of this paper is to establish the same\nconclusion under first-order differentiability.\n', ""A tight Hermite-Hadamard's inequality and a generic method for\n comparison between residuals of inequalities with convex functions We present a tight parametrical Hermite-Hadamard type inequality with\nprobability measure, which yields a considerably closer upper bound for the\nmean value of convex function than the classical one. Our inequality becomes\nequality not only with affine functions, but also with a family of V-shaped\ncurves determined by the parameter. The residual (error) of this inequality is\nstrictly smaller than in the classical Hermite-Hadamard inequality under any\nprobability measure and with all non-affine convex functions. In the framework\nof Karamata's theorem on the inequalities with convex functions, we propose a\nmethod of measuring a global performance of inequalities in terms of average\nresiduals over functions of the type $x\\mapsto |x-u|$. Using average residuals\nenables comparing two or more inequalities as themselves, with same or\ndifferent measures and without referring to a particular function. Our method\nis applicable to all Karamata's type inequalities, with integrals or sums. A\nnumerical experiment with three different measures indicates that the average\nresidual in our inequality is about 4 times smaller than in classical right\nHermite-Hadamard, and also is smaller than in Jensen's inequality, with all\nthree measures.\n""]","[('hermite hadamard inequality', 0.649143636226654), ('inequality convex functions', 0.5810491442680359), ('convex functions applications', 0.5509800314903259), ('hadamard inequality', 0.5429782271385193), ('jensen inequality', 0.5213128328323364), ('inequalities convex', 0.5146775841712952), ('inequality convex', 0.5096773505210876), ('convex functions', 0.5084303617477417), ('types convex', 0.4825379252433777), ('inequalities weighted', 0.478243350982666)]" 269,269,108,269_equivariant spectral_atiyah singer index_index theorems_elliptic operators,"['equivariant spectral', 'atiyah singer index', 'index theorems', 'elliptic operators', 'index theory', 'singer index', 'eta invariants', 'elliptic operator', 'equivariant', 'compact manifolds']","['The index of families of projective operators Let $1 \\to \\Gamma \\to \\tilde{G} \\to G \\to 1$ be a central extension by an\nabelian finite group. In this paper, we compute the index of families of\n$\\tilde{G}$-transversally elliptic operators on a $G$-principal bundle $P$. We\nthen introduce the notion of families of projective operators on fibrations\nequipped with an Azumaya bundle $\\mathcal{A}$. We define and compute the index\nof such families using the cohomological index formula for families of\n$SU(N)$-transversally elliptic operators. More precisely, a family $A$ of\nprojective operators can be pulled back in a family $\\tilde{A}$ of\n$SU(N)$-transversally elliptic operators on the $PU(N)$-principal bundle of\ntrivialisations of $\\mathcal{A}$. Through the distributional index of\n$\\tilde{A}$, we can define an index for the family $A$ of projective operators\nand using the index formula in equivariant cohomology for families of\n$SU(N)$-transversally elliptic operators, we derive an explicit cohomological\nindex formula in de Rham cohomology. Once this is done, we define and compute\nthe index of families of projective Dirac operators. As a second application of\nour computation of the index of families of $\\tilde{G}$-transversally elliptic\noperators on a $G$-principal bundle $P$, we consider the special case of a\nfamily of $Spin(2n)$-transversally elliptic Dirac operators over the bundle of\noriented orthonormal frames of an oriented fibration and we relate its\ndistributional index with the index of the corresponding family of projective\nDirac operators.\n', 'An equivariant Atiyah-Patodi-Singer index theorem for proper actions I:\n the index formula Consider a proper, isometric action by a unimodular locally compact group $G$\non a Riemannian manifold $M$ with boundary, such that $M/G$ is compact. For an\nequivariant, elliptic operator $D$ on $M$, and an element $g \\in G$, we define\na numerical index $\\operatorname{index}_g(D)$, in terms of a parametrix for $D$\nand a trace associated to $g$. We prove an equivariant Atiyah-Patodi-Singer\nindex theorem for this index. We first state general analytic conditions under\nwhich this theorem holds, and then show that these conditions are satisfied if\n$g=e$ is the identity element; if $G$ is a finitely generated, discrete group,\nand the conjugacy class of $g$ has polynomial growth; and if $G$ is a\nconnected, linear, real semisimple Lie group, and $g$ is a semisimple element.\nIn the classical case, where $M$ is compact and $G$ is trivial, our arguments\nreduce to a relatively short and simple proof of the original\nAtiyah-Patodi-Singer index theorem. In part II of this series, we prove that,\nunder certain conditions, $\\operatorname{index}_g(D)$ can be recovered from a\n$K$-theoretic index of $D$ via a trace defined by the orbital integral over the\nconjugacy class of $g$.\n', 'An equivariant Atiyah-Patodi-Singer index theorem for proper actions II:\n the $K$-theoretic index Consider a proper, isometric action by a unimodular locally compact group $G$\non a Riemannian manifold $M$ with boundary, such that $M/G$ is compact. Then an\nequivariant Dirac-type operator $D$ on $M$ under a suitable boundary condition\nhas an equivariant index $\\operatorname{index}_G(D)$ in the $K$-theory of the\nreduced group $C^*$-algebra $C^*_rG$ of $G$. This is a common generalisation of\nthe Baum-Connes analytic assembly map and the (equivariant)\nAtiyah-Patodi-Singer index. In part I of this series, a numerical index\n$\\operatorname{index}_g(D)$ was defined for an element $g \\in G$, in terms of a\nparametrix of $D$ and a trace associated to $g$. An Atiyah-Patodi-Singer type\nindex formula was obtained for this index. In this paper, we show that, under\ncertain conditions, $\\tau_g(\\operatorname{index}_G(D)) =\n\\operatorname{index}_g(D)$, for a trace $\\tau_g$ defined by the orbital\nintegral over the conjugacy class of $g$. This implies that the index theorem\nfrom part I yields information about the $K$-theoretic index\n$\\operatorname{index}_G(D)$. It also shows that $\\operatorname{index}_g(D)$ is\na homotopy-invariant quantity.\n']","[('equivariant spectral', 0.5085148215293884), ('atiyah singer index', 0.4942115247249603), ('index theorems', 0.4617134630680084), ('elliptic operators', 0.44478148221969604), ('index theory', 0.4319602847099304), ('singer index', 0.4240945875644684), ('eta invariants', 0.39385557174682617), ('elliptic operator', 0.38805079460144043), ('equivariant', 0.38106366991996765), ('compact manifolds', 0.3753744661808014)]" 270,270,108,270_generalized fibonacci numbers_generalized fibonacci_fibonacci sequences_fibonacci numbers,"['generalized fibonacci numbers', 'generalized fibonacci', 'fibonacci sequences', 'fibonacci numbers', 'fibonacci number', 'fibonacci sequence', 'fibonacci', 'sequence fibonacci', 'encyclopedia integer sequences', 'tribonacci']","['On the problem of Pillai with $k$--generalized Fibonacci numbers and\n powers of $3$ For an integer $k\\ge 2$, let $\\{F^{(k)}_{n}\\}_{n\\ge 2-k}$ be the $\nk$--generalized Fibonacci sequence which starts with $0, \\ldots, 0,1$ (a total\nof $k$ terms) and for which each term afterwards is the sum of the $k$\npreceding terms. In this paper, we find all integers $ c $ with at least two\nrepresentations as a difference between a $ k $-generalized Fibonacci number\nand a power of $ 3 $. This paper continues the previous work of the first\nauthor for the Fibonacci numbers, and the Tribonacci numbers.\n', 'Fibonacci Numbers as Sums of Consecutive Terms in $k$-Generalized\n Fibonacci Sequence Let (F_n^{(k)})_{n\\geq -(k-2)} be the k-generalized Fibonacci sequence,\ndefined as the linear recurrence sequence whose first k terms are \\(0, 0,\n\\ldots, 0, 1\\), and whose subsequent terms are determined by the sum of the\npreceding k terms. This article is devoted to investigating when the sum of\nconsecutive numbers in the k-generalized Fibonacci sequence belongs to the\nFibonacci sequence. Namely, given d,k \\in \\N, with k \\geq 3, our main theorem\nstates that there are at most finitely many n \\in \\N such that F_n^{(k)} +\n\\cdots + F_{n+d}^{(k)} is a Fibonacci number. In particular, the intersection\nbetween the Fibonacci sequence and the k-generalized Fibonacci sequence is\nfinite.\n', 'On Concatenations of Two $ k $-Generalized Fibonacci Numbers Let $ k \\geq 2 $ be an integer. The $ k- $generalized Fibonacci sequence is a\nsequence defined by the recurrence relation $ F_{n}^{(k)}=F_{n-1}^{(k)} +\n\\cdots + F_{n-k}^{(k)}$ for all $ n \\geq 2$ with the initial values $\nF_{i}^{(k)}=0 $ for $ i=2-k, \\ldots, 0 $ and $ F_{1}^{(k)}=1.$ In 2020, Banks\nand Luca, among other things, determined all Fibonacci numbers which are\nconcatenations of two Fibonacci numbers. In this paper, we consider the\nanalogue of this problem by taking into account $ k-$generalized Fibonacci\nnumbers as concatenations of two terms of the same sequence. We completely\nsolve this problem for all $ k \\geq 3.\n']","[('generalized fibonacci numbers', 0.8181111812591553), ('generalized fibonacci', 0.7561076283454895), ('fibonacci sequences', 0.720858633518219), ('fibonacci numbers', 0.7057169079780579), ('fibonacci number', 0.6661389470100403), ('fibonacci sequence', 0.6591576337814331), ('fibonacci', 0.6487018465995789), ('sequence fibonacci', 0.6411961913108826), ('encyclopedia integer sequences', 0.48553210496902466), ('tribonacci', 0.4707559049129486)]" 271,271,108,271_linearized elasticity_nonlinear elasticity_linear elasticity_linearly elastic,"['linearized elasticity', 'nonlinear elasticity', 'linear elasticity', 'linearly elastic', 'finite elasticity', 'linear elastic', 'elasticity', 'elastic energy', 'elastic plates', 'elastic']","['Pressure live loads and the variational derivation of linear elasticity The rigorous derivation of linear elasticity from finite elasticity by means\nof Gamma-convergence is a well-known result, which has been extended to\ndifferent models also beyond the elastic regime. However, in these results the\napplied forces are usually assumed to be dead loads, that is, their density in\nthe reference configuration is independent of the actual deformation. In this\npaper we begin a study of the variational derivation of linear elasticity in\nthe presence of live loads. We consider a pure traction problem for a\nnonlinearly elastic body subject to a pressure live load and we compute its\nlinearization for small pressure by Gamma-convergence. We allow for a weakly\ncoercive elastic energy density and we prove strong convergence of minimizers.\n', 'A homogenized bending theory for prestrained plates The presence of prestrain can have a tremendous effect on the mechanical\nbehavior of slender structures. Prestrained elastic plates show spontaneous\nbending in equilibrium -- a property that makes such objects relevant for the\nfabrication of active and functional materials. In this paper we study\nmicroheterogeneous, prestrained plates that feature nonflat equilibrium shapes.\nOur goal is to understand the relation between the properties of the\nprestrained microstructure and the global shape of the plate in mechanical\nequilibrium. To this end, we consider a three-dimensional, nonlinear elasticity\nmodel that describes a periodic material that occupies a domain with small\nthickness. We consider a spatially periodic prestrain described in the form of\na multiplicative decomposition of the deformation gradient. By simultaneous\nhomogenization and dimension reduction, we rigorously derive an effective plate\nmodel as a {\\Gamma}-limit for vanishing thickness and period. That limit has\nthe form of a nonlinear bending energy with an emergent spontaneous curvature\nterm. The homogenized properties of the bending model (bending stiffness and\nspontaneous curvature) are characterized by corrector problems. For a model\ncomposite -- a prestrained laminate composed of isotropic materials -- we\ninvestigate the dependence of the homogenized properties on the parameters of\nthe model composite. Secondly, we investigate the relation between the\nparameters of the model composite and the set of shapes with minimal bending\nenergy. Our study reveals a rather complex dependence of these shapes on the\ncomposite parameters.\n', 'Linearization of quasistatic fracture evolution in brittle materials We prove a linearization result for quasistatic fracture evolution in\nnonlinear elasticity. As the stiffness of the material tends to infinity, we\nshow that rescaled displacement fields and their associated crack sets converge\nto a solution of quasistatic crack growth in linear elasticity without any a\npriori assumptions on the geometry of the crack set. This result corresponds to\nthe evolutionary counterpart of the static linearization result by the first\nauthor, where a Griffith model for nonsimple brittle materials has been\nconsidered featuring an elastic energy which also depends suitably on the\nsecond gradient of the deformations. The proof relies on a careful study of\nunilateral global minimality, as determined by the nonlinear evolutionary\nproblem, and its linearization together with a variant of the jump transfer\nlemma in GSBD.\n']","[('linearized elasticity', 0.743719756603241), ('nonlinear elasticity', 0.7212222814559937), ('linear elasticity', 0.7199895977973938), ('linearly elastic', 0.7017817497253418), ('finite elasticity', 0.6923862099647522), ('linear elastic', 0.661594033241272), ('elasticity', 0.6604415774345398), ('elastic energy', 0.5969340205192566), ('elastic plates', 0.5808668732643127), ('elastic', 0.5480794906616211)]" 272,272,107,272_multiple zeta values_multiple zeta functions_multiple zeta_zeta values,"['multiple zeta values', 'multiple zeta functions', 'multiple zeta', 'zeta values', 'among multiple zeta', 'zeta values level', 'zeta functions', 'zeta value', 'double zeta', 'multiple zeta star']","[""Truncated $t$-adic symmetric multiple zeta values and double shuffle\n relations We study a refinement of the symmetric multiple zeta value, called the\n$t$-adic symmetric multiple zeta value, by considering its finite truncation.\nMore precisely, two kinds of regularizations (harmonic and shuffle) give two\nkinds of the $t$-adic symmetric multiple zeta values, thus we introduce two\nkinds of truncations correspondingly. Then we show that our truncations tend to\nthe corresponding $t$-adic symmetric multiple zeta values, and satisfy the\nharmonic and shuffle relations, respectively. This gives a new proof of the\ndouble shuffle relations for $t$-adic symmetric multiple zeta values, first\nproved by Jarossay. In order to prove the shuffle relation, we develop the\ntheory of truncated $t$-adic symmetric multiple zeta values associated with\n$2$-colored rooted trees. Finally, we discuss a refinement of Kaneko-Zagier's\nconjecture and the $t$-adic symmetric multiple zeta values of Mordell-Tornheim\ntype.\n"", 'Interpolated polynomial multiple zeta values of fixed weight, depth, and\n height We define the interpolated polynomial multiple zeta values as a\ngeneralization of all of multiple zeta values, multiple zeta-star values,\ninterpolated multiple zeta values, symmetric multiple zeta values, and\npolynomial multiple zeta values. We then compute the generating function of the\nsum of interpolated polynomial multiple zeta values of fixed weight, depth, and\nheight.\n', ""Weighted sum formula for variants of half multiple zeta values We prove some weighted sum formulas for half multiple zeta values, half\nfinite multiple zeta values, and half symmetric multiple zeta values. The key\npoint of our proof is Dougall's identity for the generalized hypergeometric\nfunction ${}_{5}F_{4}$. Similar results for interpolated refined symmetric\nmultiple zeta values and half refined symmetric multiple zeta values are also\ndiscussed.\n""]","[('multiple zeta values', 0.7035181522369385), ('multiple zeta functions', 0.6638880968093872), ('multiple zeta', 0.6520174741744995), ('zeta values', 0.6457189321517944), ('among multiple zeta', 0.6331401467323303), ('zeta values level', 0.571370005607605), ('zeta functions', 0.5636926293373108), ('zeta value', 0.5568626523017883), ('double zeta', 0.5564136505126953), ('multiple zeta star', 0.5563750267028809)]" 273,273,107,273_nonlinear schr_nonlinear schr odinger_cubic nonlinear schr_nonlinear klein gordon,"['nonlinear schr', 'nonlinear schr odinger', 'cubic nonlinear schr', 'nonlinear klein gordon', 'uniform error bound', 'methods nonlinear', 'optimal error bounds', 'splitting methods', 'nonlinear klein', 'uniform error bounds']","['Uniform error bounds of a time-splitting spectral method for the\n long-time dynamics of the nonlinear Klein-Gordon equation with weak\n nonlinearity We establish uniform error bounds of time-splitting Fourier pseudospectral\n(TSFP) methods for the nonlinear Klein--Gordon equation (NKGE) with weak\npower-type nonlinearity and $O(1)$ initial data, while the nonlinearity\nstrength is characterized by $\\varepsilon^{p}$ with a constant $p \\in\n\\mathbb{N}^+$ and a dimensionless parameter $\\varepsilon \\in (0, 1]$, for the\nlong-time dynamics up to the time at $O(\\varepsilon^{-\\beta})$ with $0 \\leq\n\\beta \\leq p$. In fact, when $0 < \\varepsilon \\ll 1$, the problem is equivalent\nto the long-time dynamics of NKGE with small initial data and $O(1)$\nnonlinearity strength, while the amplitude of the initial data (and the\nsolution) is at $O(\\varepsilon)$. By reformulating the NKGE into a relativistic\nnonlinear Schr\\""{o}dinger equation, we adapt the TSFP method to discretize it\nnumerically. By using the method of mathematical induction to bound the\nnumerical solution, we prove uniform error bounds at\n$O(h^{m}+\\varepsilon^{p-\\beta}\\tau^2)$ of the TSFP method with $h$ mesh size,\n$\\tau$ time step and $m\\ge2$ depending on the regularity of the solution. The\nerror bounds are uniformly accurate for the long-time simulation up to the time\nat $O(\\varepsilon^{-\\beta})$ and uniformly valid for $\\varepsilon\\in(0,1]$.\nEspecially, the error bounds are uniformly at the second order rate for the\nlarge time step $\\tau = O(\\varepsilon^{-(p-\\beta)/2})$ in the parameter regime\n$0\\le\\beta 0$ and uniformly for $0<\\varepsilon\\le1$, while $h$ is the mesh\nsize, $\\tau$ is the time step, $m \\ge 2$ depends on the regularity of the exact\nsolution, and $C(T) =C_0+C_1T$ grows at most linearly with respect to $T$ with\n$C_0$ and $C_1$ two positive constants independent of $T$, $\\varepsilon$, $h$\nand $\\tau$. Then by introducing a new technique of {\\sl regularity compensation\noscillation} (RCO) in which the high frequency modes are controlled by\nregularity and the low frequency modes are analyzed by phase cancellation and\nenergy method, an improved uniform error bound at $O(h^{m-1} + \\varepsilon\n\\tau^2)$ is established in $H^1$-norm for the long-time dynamics up to the time\nat $O(1/\\varepsilon)$ of the Schr\\""odinger equation with\n$O(\\varepsilon)$-potential with $m \\geq 3$, which is uniformly for\n$\\varepsilon\\in(0,1]$. Moreover, the RCO technique is extended to prove an\nimproved uniform error bound at $O(h^{m-1} + \\varepsilon^2\\tau^2)$ in\n$H^1$-norm for the long-time dynamics up to the time at $O(1/\\varepsilon^2)$ of\nthe cubic NLSE with $O(\\varepsilon^2)$-nonlinearity strength, uniformly for\n$\\varepsilon \\in (0, 1]$. Extensions to the first-order and fourth-order\ntime-splitting methods are discussed.\n', 'Improved uniform error bounds on time-splitting methods for long-time\n dynamics of the nonlinear Klein--Gordon equation with weak nonlinearity We establish improved uniform error bounds on time-splitting methods for the\nlong-time dynamics of the nonlinear Klein--Gordon equation (NKGE) with weak\ncubic nonlinearity, whose strength is characterized by $\\varepsilon^2$ with $0\n< \\varepsilon \\leq 1$ a dimensionless parameter. Actually, when $0 <\n\\varepsilon \\ll 1$, the NKGE with $O(\\varepsilon^2)$ nonlinearity and $O(1)$\ninitial data is equivalent to that with $O(1)$ nonlinearity and small initial\ndata of which the amplitude is at $O(\\varepsilon)$. We begin with a\nsemi-discretization of the NKGE by the second-order time-splitting method, and\nfollowed by a full-discretization via the Fourier spectral method in space.\nEmploying the regularity compensation oscillation (RCO) technique which\ncontrols the high frequency modes by the regularity of the exact solution and\nanalyzes the low frequency modes by phase cancellation and energy method, we\ncarry out the improved uniform error bounds at $O(\\varepsilon^2\\tau^2)$ and\n$O(h^m+\\varepsilon^2\\tau^2)$ for the second-order semi-discretization and\nfull-discretization up to the long time $T_\\varepsilon = T/\\varepsilon^2$ with\n$T$ fixed, respectively. Extensions to higher order time-splitting methods and\nthe case of an oscillatory complex NKGE are also discussed. Finally, numerical\nresults are provided to confirm the improved error bounds and to demonstrate\nthat they are sharp.\n']","[('nonlinear schr', 0.4185221493244171), ('nonlinear schr odinger', 0.4145113229751587), ('cubic nonlinear schr', 0.41397660970687866), ('nonlinear klein gordon', 0.4129919409751892), ('uniform error bound', 0.38310864567756653), ('methods nonlinear', 0.3804851174354553), ('optimal error bounds', 0.37817415595054626), ('splitting methods', 0.3720807433128357), ('nonlinear klein', 0.36489370465278625), ('uniform error bounds', 0.3624621331691742)]" 274,274,107,274_classical quantum channels_quantum channels_classical quantum channel_quantum channel,"['classical quantum channels', 'quantum channels', 'classical quantum channel', 'quantum channel', 'quantum information theory', 'channel discrimination', 'quantum information', 'quantum communication', 'classical channels', 'classical channel']","[""Query Complexity of Classical and Quantum Channel Discrimination Quantum channel discrimination has been studied from an information-theoretic\nperspective, wherein one is interested in the optimal decay rate of error\nprobabilities as a function of the number of unknown channel accesses. In this\npaper, we study the query complexity of quantum channel discrimination, wherein\nthe goal is to determine the minimum number of channel uses needed to reach a\ndesired error probability. To this end, we show that the query complexity of\nbinary channel discrimination depends logarithmically on the inverse error\nprobability and inversely on the negative logarithm of the (geometric and\nHolevo) channel fidelity. As a special case of these findings, we precisely\ncharacterize the query complexity of discriminating between two classical\nchannels. We also provide lower and upper bounds on the query complexity of\nbinary asymmetric channel discrimination and multiple quantum channel\ndiscrimination. For the former, the query complexity depends on the geometric\nR\\'enyi and Petz R\\'enyi channel divergences, while for the latter, it depends\non the negative logarithm of (geometric and Uhlmann) channel fidelity. For\nmultiple channel discrimination, the upper bound scales as the logarithm of the\nnumber of channels.\n"", ""Towards the ultimate limits of quantum channel discrimination This note studies the difficulty of discriminating quantum channels under\noperational regimes. First, we make a conjecture on the exponentially strong\nconverse of quantum channel hypothesis testing under coherent strategies,\nmeaning that any strategy to make the Type II error decays with an exponent\nlarger than the regularized channel relative entropy will unavoidably result in\nthe Type I error converging to one exponentially fast in the asymptotic limit.\nThis conjecture will imply the desirable quantum channel Stein's Lemma and the\ncontinuity of the regularized (amortized) Sandwiched R\\'{e}nyi channel\ndivergence at $\\alpha=1$. We also remark that there was a gap in the proof of\nthe above conjecture in our previous arXiv version. Such gap exists since a\nlemma basically comes from [Brandao and Plenio, 2010] was found to be false.\nSecond, we develop a framework to show the interplay between the strategies of\nchannel discrimination, the operational regimes, and variants of channel\ndivergences. This framework systematically underlies the operational meaning of\nquantum channel divergences in quantum channel discrimination. Our work makes\nan attempt towards understanding the ultimate limit of quantum channel\ndiscrimination, as well as its connection to quantum channel divergences in the\nasymptotic regime.\n"", ""Amortized Channel Divergence for Asymptotic Quantum Channel\n Discrimination It is well known that for the discrimination of classical and quantum\nchannels in the finite, non-asymptotic regime, adaptive strategies can give an\nadvantage over non-adaptive strategies. However, Hayashi [IEEE Trans. Inf.\nTheory 55(8), 3807 (2009)] showed that in the asymptotic regime, the\nexponential error rate for the discrimination of classical channels is not\nimproved in the adaptive setting. We extend this result in several ways. First,\nwe establish the strong Stein's lemma for classical-quantum channels by showing\nthat asymptotically the exponential error rate for classical-quantum channel\ndiscrimination is not improved by adaptive strategies. Second, we recover many\nother classes of channels for which adaptive strategies do not lead to an\nasymptotic advantage. Third, we give various converse bounds on the power of\nadaptive protocols for general asymptotic quantum channel discrimination.\nIntriguingly, it remains open whether adaptive protocols can improve the\nexponential error rate for quantum channel discrimination in the asymmetric\nStein setting. Our proofs are based on the concept of amortized\ndistinguishability of quantum channels, which we analyse using data-processing\ninequalities.\n""]","[('classical quantum channels', 0.6483159065246582), ('quantum channels', 0.6480512022972107), ('classical quantum channel', 0.643172025680542), ('quantum channel', 0.6420283913612366), ('quantum information theory', 0.5803766250610352), ('channel discrimination', 0.5701236724853516), ('quantum information', 0.5621207356452942), ('quantum communication', 0.5459775328636169), ('classical channels', 0.5220924019813538), ('classical channel', 0.5171129703521729)]" 275,275,106,275_chromatic symmetric_chromatic polynomials_chromatic polynomial_conjecture chromatic,"['chromatic symmetric', 'chromatic polynomials', 'chromatic polynomial', 'conjecture chromatic', 'symmetric functions', 'elementary symmetric functions', 'graphs chromatic', 'chromatic', 'symmetric graph', 'symmetric']","[""H-chromatic symmetric functions We introduce $H$-chromatic symmetric functions, $X_{G}^{H}$, which use the\n$H$-coloring of a graph $G$ to define a generalization of Stanley's chromatic\nsymmetric functions. We say two graphs $G_1$ and $G_2$ are $H$-chromatically\nequivalent if $X_{G_1}^{H} = X_{G_2}^{H}$, and use this idea to study\nuniqueness results for $H$-chromatic symmetric functions, with a particular\nemphasis on the case $H$ is a complete bipartite graph. We also show that\nseveral of the classical bases of the space of symmetric functions, i.e. the\nmonomial symmetric functions, power sum symmetric functions, and elementary\nsymmetric functions, can be realized as $H$-chromatic symmetric functions. We\nend with some conjectures and open problems.\n"", 'A composition method for neat formulas of chromatic symmetric functions We develop a composition method to unearth positive $e_I$-expansions of\nchromatic symmetric functions $X_G$, where the subscript $I$ stands for\ncompositions rather than integer partitions. Using this method, we derive\npositive and neat $e_I$-expansions for the chromatic symmetric functions of\ntadpoles, barbells and generalized bulls, and establish the $e$-positivity of\nhats. We also obtain a compact ribbon Schur analog for the chromatic symmetric\nfunction of cycles.\n', ""$(q,t)$-chromatic symmetric functions By using level one polynomial representations of affine Hecke algebras of\ntype $A$, we obtain a $(q,t)$-analogue of the chromatic symmetric functions of\nunit interval graphs which generalizes Syu Kato's formula for the chromatic\nsymmetric functions of unit interval graphs. We show that at $q=1$, the\n$(q,t)$-chromatic symmetric functions essentially reduce to the chromatic\nquasisymmetric functions defined by Shareshian-Wachs, which in particular gives\nan algebraic proof of Kato's formula. We also give an explicit formula of the\n$(q,t)$-chromatic symmetric functions at $q=\\infty$, which leads to a\nprobability theoretic interpretation of $e$-expansion coefficients of chromatic\nquasisymmetric functions used in our proof of the Stanley-Stembridge\nconjecture.\n Moreover, we observe that the $(q,t)$-chromatic symmetric functions are\nmultiplicative with respect to certain deformed multiplication on the ring of\nsymmetric functions. We give a simple description of such multiplication in\nterms of the affine Hecke algebras of type $A$. We also obtain a recipe to\nproduce $(q,t)$-chromatic symmetric functions from chromatic quasisymmetric\nfunctions, which actually makes sense for any oriented graphs.\n""]","[('chromatic symmetric', 0.6756919622421265), ('chromatic polynomials', 0.6665237545967102), ('chromatic polynomial', 0.610592782497406), ('conjecture chromatic', 0.6059914827346802), ('symmetric functions', 0.5925593972206116), ('elementary symmetric functions', 0.5826101303100586), ('graphs chromatic', 0.555230438709259), ('chromatic', 0.5063638687133789), ('symmetric graph', 0.4422476887702942), ('symmetric', 0.4056134521961212)]" 276,276,106,276_truncated hypergeometric series_congruences involving_pmod prime_sums involving,"['truncated hypergeometric series', 'congruences involving', 'pmod prime', 'sums involving', 'central binomial coefficients', 'involving binomial coefficients', 'frac binom 2k', 'bernoulli numbers', 'binom 2k', 'odd prime']","['Proof of some conjectural congruences involving Domb numbers In this paper, we mainly prove the following conjectures of Z.-H. Sun\n\\cite{SH2}:\n Let $p>3$ be a prime. If $p\\equiv1\\pmod3$ and $p=x^2+3y^2$, then we have $$\n\\sum_{k=0}^{p-1}\\frac{D_k}{4^k}\\equiv\\sum_{k=0}^{p-1}\\frac{D_k}{16^k}\\equiv4x^2-2p-\\frac{p^2}{4x^2}\\pmod{p^3},\n$$ and if $p\\equiv2\\pmod3$, then $$\n\\sum_{k=0}^{p-1}\\frac{D_k}{4^k}\\equiv-2\\sum_{k=0}^{p-1}\\frac{D_k}{16^k}\\equiv\\frac{p^2}2\\binom{\\frac{p-1}2}{\\frac{p-5}6}^{-2}\n\\pmod{p^3}, $$ where\n$D_n=\\sum_{k=0}^n\\binom{n}k^2\\binom{2k}k\\binom{2n-2k}{n-k}$ stands for the\n$n$th Domb number.\n', 'Proof of some conjectural hypergeometric supercongruences via curious\n identities In this paper, we prove several supercongruences conjectured by Z.-W. Sun ten\nyears ago via certain strange hypergeometric identities. For example, for any\nprime $p>3$, we show that\n$$\\sum_{k=0}^{p-1}\\frac{\\binom{4k}{2k+1}\\binom{2k}k}{48^k}\\equiv0\\pmod{p^2},$$\nand $$\n\\sum_{k=0}^{p-1}\\frac{\\binom{2k}{k}\\binom{3k}{k}}{24^k}\\equiv\\begin{cases}\\binom{(2p-2)/3}{(p-1)/3}\\pmod{p^2}\\\n&\\mbox{if}\\ p\\equiv1\\pmod{3},\\\\ p/\\binom{(2p+2)/3}{(p+1)/3}\\pmod{p^2}\\\n&\\mbox{if}\\ p\\equiv2\\pmod{3}.\\end{cases} $$ We also obtain some other results\nof such types.\n', ""Supercongruences via Beukers' method Recently, using modular forms F. Beukers posed a unified method that can deal\nwith a large number of supercongruences involving binomial coefficients and\nAp\\'ery-like numbers. In this paper, we use Beukers' method to prove some\nconjectures of the first author concerning the congruences for\n$$\\sum_{k=0}^{(p-1)/2}\\frac{\\binom{2k}k^3}{m^k}, \\\n\\sum_{k=0}^{p-1}\\frac{\\binom{2k}k^2\\binom{4k}{2k}}{m^k}, \\\n\\sum_{k=0}^{p-1}\\frac{\\binom{2k}k\\binom{3k}k\\binom{6k}{3k}}{m^k}, \\\n\\sum_{n=0}^{p-1}\\frac{V_n}{m^n},\\ \\sum_{n=0}^{p-1}\\frac{T_n}{m^n},\\\n\\sum_{n=0}^{p-1}\\frac{D_n}{m^n} $$ and $\\sum_{n=0}^{p-1}(-1)^nA_n$ modulo\n$p^3$, where $p$ is an odd prime representable by some suitable binary\nquadratic form, $m$ is an integer not divisible by $p$,\n$V_n=\\sum_{k=0}^n\\binom{2k}k^2\\binom{2n-2k}{n-k}^2$, $T_n=\\sum_{k=0}^n\\binom\nnk^2\\binom{2k}n^2$, $D_n=\\sum_{k=0}^n\\binom nk^2\\binom{2k}k\\binom{2n-2k}{n-k}$\nand $A_n$ is the Ap\\'ery number given by $A_n=\\sum_{k=0}^n\\binom\nnk^2\\binom{n+k}k^2$.\n""]","[('truncated hypergeometric series', 0.43578290939331055), ('congruences involving', 0.37722277641296387), ('pmod prime', 0.3708067536354065), ('sums involving', 0.370731920003891), ('central binomial coefficients', 0.36701473593711853), ('involving binomial coefficients', 0.36404189467430115), ('frac binom 2k', 0.35041847825050354), ('bernoulli numbers', 0.3482406735420227), ('binom 2k', 0.3394494354724884), ('odd prime', 0.3375721573829651)]" 277,277,105,277_jump diffusion processes_jump diffusion_nonparametric estimation_adaptive estimators,"['jump diffusion processes', 'jump diffusion', 'nonparametric estimation', 'adaptive estimators', 'consistent estimator', 'adaptive estimator', 'proposed estimators', 'estimators', 'observed diffusion', 'drift diffusion']","[""Volatility of Volatility and Leverage Effect from Options We propose model-free (nonparametric) estimators of the volatility of\nvolatility and leverage effect using high-frequency observations of short-dated\noptions. At each point in time, we integrate available options into estimates\nof the conditional characteristic function of the price increment until the\noptions' expiration and we use these estimates to recover spot volatility. Our\nvolatility of volatility estimator is then formed from the sample variance and\nfirst-order autocovariance of the spot volatility increments, with the latter\ncorrecting for the bias in the former due to option observation errors. The\nleverage effect estimator is the sample covariance between price increments and\nthe estimated volatility increments. The rate of convergence of the estimators\ndepends on the diffusive innovations in the latent volatility process as well\nas on the observation error in the options with strikes in the vicinity of the\ncurrent spot price. Feasible inference is developed in a way that does not\nrequire prior knowledge of the source of estimation error that is\nasymptotically dominating.\n"", ""Unbiased truncated quadratic variation for volatility estimation in jump\n diffusion processes The problem of integrated volatility estimation for the solution X of a\nstochastic differential equation with L{\\'e}vy-type jumps is considered under\ndiscrete high-frequency observations in both short and long time horizon. We\nprovide an asymptotic expansion for the integrated volatility that gives us, in\ndetail, the contribution deriving from the jump part. The knowledge of such a\ncontribution allows us to build an unbiased version of the truncated quadratic\nvariation, in which the bias is visibly reduced. In earlier results the\ncondition $\\beta$ > 1 2(2--$\\alpha$) on $\\beta$ (that is such that (1/n)\n$\\beta$ is the threshold of the truncated quadratic variation) and on the\ndegree of jump activity $\\alpha$ was needed to have the original truncated\nrealized volatility well-performed (see [22], [13]). In this paper we\ntheoretically relax this condition and we show that our unbiased estimator\nachieves excellent numerical results for any couple ($\\alpha$, $\\beta$).\nL{\\'e}vy-driven SDE, integrated variance, threshold estimator, convergence\nspeed, high frequency data.\n"", ""Volatility and jump activity estimation in a stable Cox-Ingersoll-Ross\n model We consider the parametric estimation of the volatility and jump activity in\na stable Cox-Ingersoll-Ross ($\\alpha$-stable CIR) model driven by a standard\nBrownian Motion and a non-symmetric stable L\\'evy process with jump activity\n$\\alpha \\in (1,2)$. The main difficulties to obtain rate efficiency in\nestimating these quantities arise from the superposition of the diffusion\ncomponent with jumps of infinite variation. Extending the approach proposed in\nMies (2020), we address the joint estimation of the volatility, scaling and\njump activity parameters from high-frequency observations of the process and\nprove that the proposed estimators are rate optimal up to a logarithmic factor.\n""]","[('jump diffusion processes', 0.554286539554596), ('jump diffusion', 0.5119404792785645), ('nonparametric estimation', 0.46253716945648193), ('adaptive estimators', 0.4599752724170685), ('consistent estimator', 0.4571860134601593), ('adaptive estimator', 0.44850507378578186), ('proposed estimators', 0.4428943991661072), ('estimators', 0.41377487778663635), ('observed diffusion', 0.39688366651535034), ('drift diffusion', 0.3943864703178406)]" 278,278,105,278_learning combinatorial optimization_constraint learning_graph neural networks_integer linear programs,"['learning combinatorial optimization', 'constraint learning', 'graph neural networks', 'integer linear programs', 'integer linear programming', 'linear programming milp', 'mixed integer programming', 'graph neural', 'integer programming mip', 'mixed integer programs']","['Modern graph neural networks do worse than classical greedy algorithms\n in solving combinatorial optimization problems like maximum independent set The recent work ``Combinatorial Optimization with Physics-Inspired Graph\nNeural Networks\'\' [Nat Mach Intell 4 (2022) 367] introduces a physics-inspired\nunsupervised Graph Neural Network (GNN) to solve combinatorial optimization\nproblems on sparse graphs. To test the performances of these GNNs, the authors\nof the work show numerical results for two fundamental problems: maximum cut\nand maximum independent set (MIS). They conclude that ""the graph neural network\noptimizer performs on par or outperforms existing solvers, with the ability to\nscale beyond the state of the art to problems with millions of variables.""\n In this comment, we show that a simple greedy algorithm, running in almost\nlinear time, can find solutions for the MIS problem of much better quality than\nthe GNN. The greedy algorithm is faster by a factor of $10^4$ with respect to\nthe GNN for problems with a million variables. We do not see any good reason\nfor solving the MIS with these GNN, as well as for using a sledgehammer to\ncrack nuts.\n In general, many claims of superiority of neural networks in solving\ncombinatorial problems are at risk of being not solid enough, since we lack\nstandard benchmarks based on really hard problems. We propose one of such hard\nbenchmarks, and we hope to see future neural network optimizers tested on these\nproblems before any claim of superiority is made.\n', 'MIP-GNN: A Data-Driven Framework for Guiding Combinatorial Solvers Mixed-integer programming (MIP) technology offers a generic way of\nformulating and solving combinatorial optimization problems. While generally\nreliable, state-of-the-art MIP solvers base many crucial decisions on\nhand-crafted heuristics, largely ignoring common patterns within a given\ninstance distribution of the problem of interest. Here, we propose MIP-GNN, a\ngeneral framework for enhancing such solvers with data-driven insights. By\nencoding the variable-constraint interactions of a given mixed-integer linear\nprogram (MILP) as a bipartite graph, we leverage state-of-the-art graph neural\nnetwork architectures to predict variable biases, i.e., component-wise averages\nof (near) optimal solutions, indicating how likely a variable will be set to 0\nor 1 in (near) optimal solutions of binary MILPs. In turn, the predicted biases\nstemming from a single, once-trained model are used to guide the solver,\nreplacing heuristic components. We integrate MIP-GNN into a state-of-the-art\nMIP solver, applying it to tasks such as node selection and warm-starting,\nshowing significant improvements compared to the default setting of the solver\non two classes of challenging binary MILPs.\n', 'A GNN-Guided Predict-and-Search Framework for Mixed-Integer Linear\n Programming Mixed-integer linear programming (MILP) is widely employed for modeling\ncombinatorial optimization problems. In practice, similar MILP instances with\nonly coefficient variations are routinely solved, and machine learning (ML)\nalgorithms are capable of capturing common patterns across these MILP\ninstances. In this work, we combine ML with optimization and propose a novel\npredict-and-search framework for efficiently identifying high-quality feasible\nsolutions. Specifically, we first utilize graph neural networks to predict the\nmarginal probability of each variable, and then search for the best feasible\nsolution within a properly defined ball around the predicted solution. We\nconduct extensive experiments on public datasets, and computational results\ndemonstrate that our proposed framework achieves 51.1% and 9.9% performance\nimprovements to MILP solvers SCIP and Gurobi on primal gaps, respectively.\n']","[('learning combinatorial optimization', 0.5137065052986145), ('constraint learning', 0.5132868885993958), ('graph neural networks', 0.49848300218582153), ('integer linear programs', 0.4966943562030792), ('integer linear programming', 0.4931817054748535), ('linear programming milp', 0.4865953326225281), ('mixed integer programming', 0.47600120306015015), ('graph neural', 0.472699910402298), ('integer programming mip', 0.47221243381500244), ('mixed integer programs', 0.4643625020980835)]" 279,279,105,279_multiple access noma_noma networks_orthogonal multiple access_wireless information power,"['multiple access noma', 'noma networks', 'orthogonal multiple access', 'wireless information power', 'access noma', 'simultaneous wireless information', 'irs beamforming', 'wireless energy', 'simultaneous wireless', 'transmit power']","['Performance Analysis of Intelligent Reflecting Surface Assisted NOMA\n Networks Intelligent reflecting surface (IRS) is a promising technology to enhance the\ncoverage and performance of wireless networks. We consider the application of\nIRS to non-orthogonal multiple access (NOMA), where a base station transmits\nsuperposed signals to multiple users by the virtue of an IRS. The performance\nof an IRS-assisted NOMA networks with imperfect successive interference\ncancellation (ipSIC) and perfect successive interference cancellation (pSIC) is\ninvestigated by invoking 1-bit coding scheme. In particular, we derive new\nexact and asymptotic expressions for both outage probability and ergodic rate\nof the m-th user with ipSIC/pSIC. Based on analytical results, the diversity\norder of the m-th user with pSIC is in connection with the number of reflecting\nelements and channel ordering. The high signal-to-noise radio (SNR) slope of\nergodic rate for the $m$-th user is obtained. The throughput and energy\nefficiency of non-orthogonal users for IRS-NOMA are discussed both in\ndelay-limited and delay-tolerant transmission modes. Additionally, we derive\nnew exact expressions of outage probability and ergodic rate for IRS-assisted\northogonal multiple access (IRS-OMA). Numerical results are presented to\nsubstantiate our analyses and demonstrate that: i) The outage behaviors of\nIRS-NOMA are superior to that of IRS-OMA and relaying schemes; ii) With\nincreasing the number of reflecting elements, IRS-NOMA is capable of achieving\nenhanced outage performance; and iii) The M-th user has a larger ergodic rate\ncompared to IRS-OMA and benchmarks. However, the ergodic performance of the\n$m$-th user exceeds relaying schemes in the low SNR regime.\n', 'Joint Beamforming Design and Power Splitting Optimization in\n IRS-Assisted SWIPT NOMA Networks This paper proposes a novel network framework of intelligent reflecting\nsurface (IRS)-assisted simultaneous wireless information and power transfer\n(SWIPT) non-orthogonal multiple access (NOMA) networks, where IRS is used to\nenhance the NOMA performance and the wireless power transfer (WPT) efficiency\nof SWIPT. We formulate a problem of minimizing base station (BS) transmit power\nby jointly optimizing successive interference cancellation (SIC) decoding\norder, BS transmit beamforming vector, power splitting (PS) ratio and IRS phase\nshift while taking into account the quality-of-service (QoS) requirement and\nenergy harvested threshold of each user. The formulated problem is non-convex\noptimization problem, which is difficult to solve it directly. Hence, a\ntwo-stage algorithm is proposed to solve the above-mentioned problem by\napplying semidefinite relaxation (SDR), Gaussian randomization and successive\nconvex approximation (SCA). Specifically, after determining SIC decoding order\nby designing IRS phase shift in the first stage, we alternately optimize BS\ntransmit beamforming vector, PS ratio, and IRS phase shift to minimize the BS\ntransmit power. Numerical results validate the effectiveness of our proposed\noptimization algorithm in reducing BS transmit power compared to other baseline\nalgorithms. Meanwhile, compared with non-IRS-assisted network, the IRS-assisted\nSWIPT NOMA network can decrease BS transmit power by 51.13\\%.\n', 'IRS-Assisted Wireless Powered NOMA: Do We Really Need Different Phase\n Shifts in DL and UL? Intelligent reflecting surface (IRS) is a promising technology to improve the\nperformance of wireless powered communication networks (WPCNs) due to its\ncapability to reconfigure signal propagation environments via smart reflection.\nIn particular, the high passive beamforming gain promised by IRS can\nsignificantly enhance the efficiency of both downlink wireless power transfer\n(DL WPT) and uplink wireless information transmission (UL WIT) in WPCNs.\nAlthough adopting different IRS phase shifts for DL WPT and UL WIT, i.e.,\ndynamic IRS beamforming, is in principle possible but incurs additional\nsignaling overhead and computational complexity, it is an open problem whether\nit is actually beneficial. To answer this question, we consider an IRS-assisted\nWPCN where multiple devices employ a hybrid access point (HAP) to first harvest\nenergy and then transmit information using non-orthogonal multiple access\n(NOMA). Specifically, we aim to maximize the sum throughput of all devices by\njointly optimizing the IRS phase shifts and the resource allocation. To this\nend, we first prove that dynamic IRS beamforming is not needed for the\nconsidered system, which helps reduce the number of IRS phase shifts to be\noptimized. Then, we propose both joint and alternating optimization based\nalgorithms to solve the resulting problem. Simulation results demonstrate the\neffectiveness of our proposed designs over benchmark schemes and also provide\nuseful insights into the importance of IRS for realizing spectrally and energy\nefficient WPCNs.\n']","[('multiple access noma', 0.5296099781990051), ('noma networks', 0.5275352597236633), ('orthogonal multiple access', 0.5153922438621521), ('wireless information power', 0.456255167722702), ('access noma', 0.4482444226741791), ('simultaneous wireless information', 0.41845211386680603), ('irs beamforming', 0.4087236821651459), ('wireless energy', 0.4024522304534912), ('simultaneous wireless', 0.39122167229652405), ('transmit power', 0.3855009377002716)]" 280,280,105,280_modified bessel functions_bessel functions_bessel functions first_bessel series,"['modified bessel functions', 'bessel functions', 'bessel functions first', 'bessel series', 'zeros bessel', 'bessel differential', 'modified bessel', 'involving bessel', 'series bessel', 'asymptotic expansions']","['Discrete index transforms with Bessel and modified Bessel functions Discrete analogs of the index transforms, involving Bessel and the modified\nBessel functions are introduced and investigated. The corresponding inversion\ntheorems for suitable classes of functions and sequences are established.\n', ""Asymptotics of some integrals involving modified Bessel and hyper-Bessel\n functions We investigate the asymptotic expansion of integrals analogous to Ball's\nintegral \\[\\int_0^\\infty\n\\left(\\frac{\\Gamma(1+\\nu)|J_\\nu(x)|}{(x/2)^\\nu}\\right)^{\\!n}dx\\] for large $n$\nin which the Bessel function $J_\\nu(x)$ is replaced by the modified Bessel\nfunctions $I_\\nu(x)$ and $K_\\nu(x)$ together with appropriate exponential\nfactors $e^{\\mp x}$, respectively.\n The above integral with $J_\\nu(x)$ replaced by a hyper-Bessel function of the\ntype recently discussed in Aktas {\\it et al.} [The Ramanujan J., 2019] and\ntaken over a finite interval determined by the first positive zero of the\nfunction is also considered for $n\\to\\infty$. We give the leading asymptotic\nbehaviour of the hyper-Bessel function for $x\\to+\\infty$ in an appendix.\nNumerical examples are given to illustrate the accuracy of the various\nexpansions obtained.\n"", 'On the $\\nu$-zeros of the Bessel functions of purely imaginary order The $\\nu$-zeros of the Bessel functions of purely imaginary order are\nexamined for fixed argument $x>0$. In the case of the modified Bessel function\nof the second kind $K_{i\\nu}(x)$, it is known that it possesses a countably\ninfinite sequence of real $\\nu$-zeros described by $\\nu_n\\sim \\pi n/\\log\\,n$ as\n$n\\to\\infty$. Here we apply a unified approach to determine asymptotic\nestimates of the $\\nu$-zeros of the modified Bessel functions\n$L_{i\\nu}(x)\\equiv I_{i\\nu}(x)+I_{-i\\nu}(x)$ and $K_{i\\nu}(x)$ and the ordinary\nBessel functions $J_{i\\nu}(x)\\pm J_{-i\\nu}(x)$.\n']","[('modified bessel functions', 0.7533238530158997), ('bessel functions', 0.7423427104949951), ('bessel functions first', 0.7092441320419312), ('bessel series', 0.5916098356246948), ('zeros bessel', 0.5877074003219604), ('bessel differential', 0.579613447189331), ('modified bessel', 0.5725294947624207), ('involving bessel', 0.5586037635803223), ('series bessel', 0.5484028458595276), ('asymptotic expansions', 0.5098870992660522)]" 281,281,104,281_poisson algebras_poisson algebra_noncommutative poisson_post lie algebras,"['poisson algebras', 'poisson algebra', 'noncommutative poisson', 'post lie algebras', 'poisson brackets', 'lie algebras', 'poisson lie groups', 'poisson bracket', 'lie bialgebras', 'poisson structures']","['Transposed Hom-Poisson and Hom-pre-Lie Poisson algebras and bialgebras The notions of transposed Hom-Poisson and Hom-pre-Lie Poisson algebras are\nintroduced. Their bimodules and matched pairs are defined and the relevant\nproperties and theorems are given. The notion of Manin triple of transposed\nHom-Poisson algebras is introduced, and its equivalence to the transposed\nHom-Poisson bialgebras is investigated. The notion of $\\mathcal{O}$-operator is\nexploited to illustrate the relations existing between transposed Hom-Poisson\nand Hom-pre-Lie Poisson algebras.\n', 'Quantizations of transposed Poisson algebras by Novikov deformations The notions of the Novikov deformation of a commutative associative algebra\nand the corresponding classical limit are introduced. We show such a classical\nlimit belongs to a subclass of transposed Poisson algebras, and hence the\nNovikov deformation is defined to be the quantization of the corresponding\ntransposed Poisson algebra. As a direct consequence, we revisit the\nrelationship between transposed Poisson algebras and Novikov-Poisson algebras\ndue to the fact that there is a natural Novikov deformation of the commutative\nassociative algebra in a Novikov-Poisson algebra. Hence all transposed Poisson\nalgebras of Novikov-Poisson type, including unital transposed Poisson algebras,\ncan be quantized. Finally, we classify the quantizations of $2$-dimensional\ncomplex transposed Poisson algebras in which the Lie brackets are non-abelian\nup to equivalence.\n', 'Transposed Poisson algebras, Novikov-Poisson algebras and 3-Lie algebras We introduce a dual notion of the Poisson algebra by exchanging the roles of\nthe two binary operations in the Leibniz rule defining the Poisson algebra. We\nshow that the transposed Poisson algebra thus defined not only shares common\nproperties of the Poisson algebra, including the closure under taking tensor\nproducts and the Koszul self-duality as an operad, but also admits a rich class\nof identities. More significantly, a transposed Poisson algebra naturally\narises from a Novikov-Poisson algebra by taking the commutator Lie algebra of\nthe Novikov algebra. Consequently, the classic construction of a Poisson\nalgebra from a commutative associative algebra with a pair of commuting\nderivations has a similar construction of a transposed Poisson algebra when\nthere is one derivation. More broadly, the transposed Poisson algebra also\ncaptures the algebraic structures when the commutator is taken in pre-Lie\nPoisson algebras and two other Poisson type algebras. Furthermore, the\ntransposed Poisson algebra improves two processes in~[17] that produce 3-Lie\nalgebras from Poisson algebras with a strongness condition. When transposed\nPoisson algebras are used in one process, the strongness condition is no longer\nneeded and the resulting 3-Lie algebra gives a transposed Poisson 3-Lie\nalgebra. In the other process, the resulting 3-Lie algebra is shown to again\ngive a transposed Poisson 3-Lie algebra.\n']","[('poisson algebras', 0.8220510482788086), ('poisson algebra', 0.7586371898651123), ('noncommutative poisson', 0.6338534355163574), ('post lie algebras', 0.5957896113395691), ('poisson brackets', 0.590569019317627), ('lie algebras', 0.5867496728897095), ('poisson lie groups', 0.5707277059555054), ('poisson bracket', 0.544962465763092), ('lie bialgebras', 0.5420737862586975), ('poisson structures', 0.5355996489524841)]" 282,282,104,282_reduced rings_reduced ring_regular rings_regular ring,"['reduced rings', 'reduced ring', 'regular rings', 'regular ring', 'group rings', 'commutative rings', 'commutative rings let', 'rings rings', 'rings let commutative', 'group ring']","['On $\\phi$-1-Absorbing Prime Ideals In this paper, we introduce $\\phi$-1-absorbing prime ideals in commutative\nrings. Let $R$ be a commutative ring with a nonzero identity $1\\neq0$ and\n$\\phi:\\mathcal{I}(R)\\rightarrow\\mathcal{I}(R)\\cup\\{\\emptyset\\}$ be a function\nwhere $\\mathcal{I}(R)$ is the set of all ideals of $R$. A proper ideal $I$ of\n$R$ is called a $\\phi$-1-absorbing prime ideal if for each nonunits $x,y,z\\in\nR$ with $xyz\\in I-\\phi(I)$, then either $xy\\in I$ or $z\\in I$. In addition to\ngive many properties and characterizations of $\\phi$-1-absorbing prime ideals,\nwe also determine rings in which every proper ideal is $\\phi$-1-absorbing\nprime.\n', 'Nil-prime ideals of a commutative ring Let R be a commutative ring with identity and N(R) be the set of all\nnilpotent elements of R. The aim of this paper is to introduce and study the\nnotion of nil-prime ideals as a generalization of prime ideals. We say that a\nproper ideal P of R is a nil-prime ideal if there exists x \\in N(R) and\nwhenever ab \\in P, then a \\in P or b \\in P or a+x \\in P or b+x \\in P for each\na,b \\in R. Also, we introduce nil versions of some algebraic concepts in ring\ntheory such as nil-maximal ideal, nil-minimal ideal, nil-principal ideal and\ninvestigate some nil-version of a well-known results about them.\n', 'Rings whose Nil-Clean and Clean Elements are Uniquely Nil-Clean We consider and study those rings in which each nil-clean or clean element is\nuniquely nil-clean. We establish that, for abelian rings, these rings have a\nsatisfactory description and even it is shown that the classes of abelian rings\nand the rings in which nil-clean elements are uniquely nil-clean do coincide.\nMoreover, we prove that the rings in which clean elements are uniquely\nnil-clean coincide with the subclass of abelian rings consisting of only\nunipotent units and, in particular, that in the semipotent case we have a\ncomplete characterization only in terms of the former ring and its divisions.\nLikewise, some extension properties and group rings for such kinds of rings are\nalso considered.\n']","[('reduced rings', 0.6035078167915344), ('reduced ring', 0.5917436480522156), ('regular rings', 0.5811471939086914), ('regular ring', 0.569028913974762), ('group rings', 0.5468825101852417), ('commutative rings', 0.5282719731330872), ('commutative rings let', 0.5221405029296875), ('rings rings', 0.5154115557670593), ('rings let commutative', 0.5151662230491638), ('group ring', 0.5144043564796448)]" 283,283,104,283_reservoir computing_reservoir_reservoirs_chaotic systems,"['reservoir computing', 'reservoir', 'reservoirs', 'chaotic systems', 'recurrent neural', 'recurrent neural networks', 'chaotic dynamical systems', 'recurrent neural network', 'neural networks rnns', 'learning dynamical']","['Reservoir computing with the Kuramoto model Reservoir computing aims to achieve high-performance and low-cost machine\nlearning with a dynamical system as a reservoir. However, in general, there are\nalmost no theoretical guidelines for its high-performance or optimality. This\npaper focuses on the reservoir computing with the Kuramoto model and\ntheoretically reveals its approximation ability. The main result provides an\nexplicit expression of the dynamics of the Kuramoto reservoir by using the\norder parameters. Thus, the output of the reservoir computing is expressed as a\nlinear combination of the order parameters. As a corollary, sufficient\nconditions on hyperparameters are obtained so that the set of the order\nparameters gives the complete basis of the Lebesgue space. This implies that\nthe Kuramoto reservoir has a universal approximation property. Furthermore, the\nconjecture on {\\it the edge of bifurcation}, which is a generalization of the\nfamous criterion {\\it the edge of chaos} for designing a high-performance\nreservoir, is also discussed from the viewpoint of its approximation ability.\nIt is numerically demonstrated by a prediction task and a transformation task.\n', 'Reservoir Computing with Generalized Readout based on Generalized\n Synchronization Reservoir computing is a machine learning framework that exploits nonlinear\ndynamics, exhibiting significant computational capabilities. One of the\ndefining characteristics of reservoir computing is its low cost and\nstraightforward training algorithm, i.e. only the readout, given by a linear\ncombination of reservoir variables, is trained. Inspired by recent mathematical\nstudies based on dynamical system theory, in particular generalized\nsynchronization, we propose a novel reservoir computing framework with\ngeneralized readout, including a nonlinear combination of reservoir variables.\nThe first crucial advantage of using the generalized readout is its\nmathematical basis for improving information processing capabilities. Secondly,\nit is still within a linear learning framework, which preserves the original\nstrength of reservoir computing. In summary, the generalized readout is\nnaturally derived from mathematical theory and allows the extraction of useful\nbasis functions from reservoir dynamics without sacrificing simplicity. In a\nnumerical study, we find that introducing the generalized readout leads to a\nsignificant improvement in accuracy and an unexpected enhancement in robustness\nfor the short- and long-term prediction of Lorenz chaos, with a particular\nfocus on how to harness low-dimensional reservoir dynamics. A novel way and its\nadvantages for physical implementations of reservoir computing with generalized\nreadout are briefly discussed.\n', ""(Thesis) Reservoir Computing With Dynamical Systems A reservoir computer is a special type of neural network, where most of the\nweights are randomly fixed and only a subset are trained.\n In this thesis we prove results about reservoir computers trained on\ndeterministic dynamical systems, and stochastic processes. We focus mostly on a\nspecial type of reservoir computer called an Echo State Network (ESN).\n In the deterministic case, we prove (under some assumptions) that if a\nreservoir computer has the Echo State Property (ESP), then there is a C1\ngeneralised synchronisation between the input dynamical system and the dynamics\nin the reservoir space. Furthermore, we prove that a reservoir computer with\nthe local ESP in several disjoint subsets of the reservoir space will admit\nseveral distinct generalised synchronisations. In the special case that the\nreservoir map is linear, and has the ESP, we prove that the generalised\nsynchronisation is generically an embedding. This result admits Takens'\nembedding Theorem as a special case.\n We go to show that ESNs trained on scalar observations of an ergodic\ndynamical system can approximate an arbitrary target function, including the\nnext step map used in time series forecasting. This universal approximation\nproperty holds despite the training process being entirely linear.\n We prove analogous results for ESNs trained on observations of a stochastic\nprocess, which are not be Markovian in general. We use these results to develop\nsupervised learning, and reinforcement learning algorithms supported by an ESN.\n In the penultimate chapter of this thesis, we use a reservoir computer to\nnumerically solve linear PDEs. In the final chapter, we conclude and discuss\ndirections for future work.\n""]","[('reservoir computing', 0.7780985236167908), ('reservoir', 0.5620204210281372), ('reservoirs', 0.5005218386650085), ('chaotic systems', 0.48326876759529114), ('recurrent neural', 0.4641245901584625), ('recurrent neural networks', 0.45513278245925903), ('chaotic dynamical systems', 0.45091643929481506), ('recurrent neural network', 0.43721655011177063), ('neural networks rnns', 0.4267544150352478), ('learning dynamical', 0.4160478711128235)]" 284,284,102,284_tilings_tilings plane_tilings two_domino tilings,"['tilings', 'tilings plane', 'tilings two', 'domino tilings', 'tiling plane', 'tiling', 'tiling mathbb', 'tiles', 'penrose tilings', 'tile']","['An aperiodic tiling of variable geometry made of two tiles, a triangle\n and a rhombus of any angle Aperiodic tiling is a well-know area of research. First developed by\nmathematicians for the mathematical challenge they represent and the beauty of\ntheir resulting patterns, they became a growing field of interest when their\npractical use started to emerge. This was mainly in the eighties when a link\nwas established with quasi-periodic materials. Several aperiodic tilings made\nof two tiles were discovered, the first one being by Penrose in the seventies.\nSince then, scientists discovered other aperiodic tilings including the\nsquare-triangle one, a tiling that has been particularly useful for the study\nof dodecagonal quasicrystals and soft matters. Based on this previous work, we\ndiscovered an infinite number of aperiodic tilings made of two tiles, a\ntriangle and a rhombus of any angle. As a result, a variable geometry, i.e.\ncontinuously transformable, aperiodic tiling is proposed, whose underlying\nstructure is dodecagonal. We discuss this limit case where the rhombus is so\nthin that it becomes invisible. At the boundary of this infinite space of\ntilings are two periodic ones; this represents a uniform view of periodic and\naperiodic tilings.\n', 'An aperiodic tiling made of one tile, a triangle How many different tiles are needed at the minimum to create aperiodicity?\nSeveral tilings made of two tiles were discovered, the first one being by\nPenrose in the seventies. Since then, scientists discovered other aperiodic\ntilings made of two tiles, including the square-triangle one, a tiling that has\nbeen particularly useful for the study of dodecagonal quasicrystals and soft\nmatters. An open problem still exists: Can one tile be sufficient to create\naperiodicity? This is known as the ein stein problem. We present in this paper\nan aperiodic tiling made of one single tile: an isosceles right triangle. The\ntile itself is not aperiodic and therefore not a solution to the ein stein\nproblem but we present a set of substitution rules on the same tile that forces\nthe tiling to be aperiodic. This paper presents its construction rules that\nproves its aperiodicity. We also show that this tiling offers an underlying\ndodecagonal structure close to the one of square-triangle tiling.\n', 'Turtles, Hats and Spectres: Aperiodic structures on a Rhombic tiling These notes derive aperiodic monotiles (arXiv:2303.10798) from a set of\nrhombuses with matching rules. This dual construction is used to simplify the\nproof of aperiodicity by considering the tiling as a colouring game on a\nRhombille tiling. A simple recursive substitution system is then introduced to\nshow the existence of a non-periodic tiling without the need for computer-aided\nverification.\n A new cut-and-project style construction linking the Turtle tiling with\n1-dimensional Fibonacci words provides a second proof of non-periodicity, and\nan alternative demonstration that the Turtle can tile the plane.\n Deforming the Turtle into the Hat tile then provides a third proof for\nnon-periodicity by considering the effect on the lattice underlying the\nRhombille tiling.\n Finally, attention turns to the Spectre tile. In collaboration with Erhard\nK\\""unzel and Yoshiaki Araki, we present two new substitution rules for\ngenerating Spectre tilings. This pair of conjugate rules show that the\naperiodic monotile tilings can be considered as a 2-dimensional analog to\nSturmian words.\n']","[('tilings', 0.6646642088890076), ('tilings plane', 0.6447667479515076), ('tilings two', 0.6372033357620239), ('domino tilings', 0.6278189420700073), ('tiling plane', 0.6266873478889465), ('tiling', 0.6080910563468933), ('tiling mathbb', 0.5705314874649048), ('tiles', 0.5538137555122375), ('penrose tilings', 0.5502240061759949), ('tile', 0.5445057153701782)]" 285,285,102,285_public key cryptography_cryptographic schemes_cryptosystems_based cryptosystems,"['public key cryptography', 'cryptographic schemes', 'cryptosystems', 'based cryptosystems', 'encryption scheme', 'cryptosystem', 'key cryptography', 'cryptography', 'public key encryption', 'homomorphic encryption']","['Public key cryptography based on twisted dihedral group algebras In this paper, we propose to use a twisted dihedral group algebra for\npublic-key cryptography. For this, we introduce a new $2$-cocycle\n$\\alpha_{\\lambda}$ to twist the dihedral group algebra. Using the ambient space\n$\\mathbb{F}^{\\alpha_{\\lambda}} D_{2n}$, we then introduce a key exchange\nprotocol and present an analysis of its security. Moreover, we explore the\nproperties of the resulting twisted algebra\n$\\mathbb{F}^{\\alpha_{\\lambda}}D_{2n}$, exploiting them to enhance our key\nexchange protocol. We also introduce a probabilistic public-key scheme derived\nfrom our key-exchange protocol and obtain a key encapsulation mechanism (KEM)\nby applying a well-known generic transformation to our public-key scheme.\nFinally, we present a proof-of-concept implementation of the resulting key\nencapsulation mechanism.\n', 'Public key cryptography based on skew dihedral group rings In this paper, we propose to use a skew dihedral group ring given by the\ngroup $D_{2n}$ and the finite field $\\mathbb{F}_{q^2}$ for public-key\ncryptography. Using the ambient space $\\mathbb{F}_{q^{2}}^{\\theta} D_{2n}$ and\na group homomorphism $\\theta: D_{2n} \\rightarrow\n\\mathrm{Aut}(\\mathbb{F}_{q^2})$, we introduce a key exchange protocol and\npresent an analysis of its security. Moreover, we explore the properties of the\nresulting skew group ring $\\mathbb{F}_{q^{2}}^{\\theta} D_{2n}$, exploiting them\nto enhance our key exchange protocol. We also introduce a probabilistic\npublic-key scheme derived from our key exchange protocol and obtain a key\nencapsulation mechanism (KEM) by applying a well-known generic transformation\nto our public-key scheme. Finally, we present a proof-of-concept implementation\nof our cryptographic constructions. To the best of our knowledge, this is the\nfirst paper that proposes a skew dihedral group ring for public-key\ncryptography.\n', 'Group ring based public key cryptosystems In this paper, we propose two cryptosystems based on group rings and existing\ncryptosystem. First one is Elliptic ElGamal type group ring public key\ncryptosystem whose security is greater than security of cryptosystems based on\nelliptic curves discrete logarithmic problem (ECDLP). Second is ElGamal type\ngroup ring public key cryptosystem, which is analogous to ElGamal public key\ncryptosystem but has comparatively greater security. Examples are also given\nfor both the proposed cryptosystems.\n']","[('public key cryptography', 0.6589359045028687), ('cryptographic schemes', 0.6450658440589905), ('cryptosystems', 0.6269952654838562), ('based cryptosystems', 0.6269928216934204), ('encryption scheme', 0.6220546364784241), ('cryptosystem', 0.6195288300514221), ('key cryptography', 0.6136669516563416), ('cryptography', 0.6067943572998047), ('public key encryption', 0.5836165547370911), ('homomorphic encryption', 0.5801579356193542)]" 286,286,101,286_semidefinite relaxations_sparse polynomial optimization_hierarchy polynomial optimization_semidefinite programs,"['semidefinite relaxations', 'sparse polynomial optimization', 'hierarchy polynomial optimization', 'semidefinite programs', 'semidefinite programming', 'polynomial optimization', 'polynomial optimization problems', 'sparse semidefinite', 'moment sos relaxations', 'sparse polynomial']","[""A note on the computational complexity of the moment-SOS hierarchy for\n polynomial optimization The moment-sum-of-squares (moment-SOS) hierarchy is one of the most\ncelebrated and widely applied methods for approximating the minimum of an\nn-variate polynomial over a feasible region defined by polynomial\n(in)equalities. A key feature of the hierarchy is that, at a fixed level, it\ncan be formulated as a semidefinite program of size polynomial in the number of\nvariables n. Although this suggests that it may therefore be computed in\npolynomial time, this is not necessarily the case. Indeed, as O'Donnell (2017)\nand later Raghavendra & Weitz (2017) show, there exist examples where the\nsos-representations used in the hierarchy have exponential bit-complexity. We\nstudy the computational complexity of the moment-SOS hierarchy, complementing\nand expanding upon earlier work of Raghavendra & Weitz (2017). In particular,\nwe establish algebraic and geometric conditions under which polynomial-time\ncomputation is guaranteed to be possible.\n"", 'A Characterization for Tightness of the Sparse Moment-SOS Hierarchy This paper studies the sparse Moment-SOS hierarchy of relaxations for solving\nsparse polynomial optimization problems. We show that this sparse hierarchy is\ntight if and only if the objective can be written as a sum of sparse\nnonnegative polynomials, each of which belongs to the sum of the ideal and\nquadratic module generated by the corresponding sparse constraints. Based on\nthis characterization, we give several sufficient conditions for the sparse\nMoment-SOS hierarchy to be tight. In particular, we show that this sparse\nhierarchy is tight under some assumptions such as convexity, optimality\nconditions or finiteness of constraining sets.\n', 'Finite convergence of Moment-SOS relaxations with non-real radical\n ideals We consider the linear conic optimization problem with the cone of\nnonnegative polynomials. Its dual optimization problem is the generalized\nmoment problem. Moment-SOS relaxations are powerful for solving them. This\npaper studies finite convergence of the Moment-SOS hierarchy when the\nconstraining set is defined by equations whose ideal may not be real radical.\nUnder the archimedeanness, we show that the Moment-SOS hierarchy has finite\nconvergence if some classical optimality conditions hold at every minimizer of\nthe optimal nonnegative polynomial for the linear conic optimization problem.\nWhen the archimedeanness fails (this is the case for unbounded sets), we\npropose a homogenized Moment-SOS hierarchy and prove its finite convergence\nunder similar assumptions. Furthermore, we also prove the finite convergence of\nthe Moment-SOS hierarchy with denominators. In particular, this paper resolves\na conjecture posed in the earlier work.\n']","[('semidefinite relaxations', 0.5984951257705688), ('sparse polynomial optimization', 0.5886731743812561), ('hierarchy polynomial optimization', 0.5502914190292358), ('semidefinite programs', 0.5364893078804016), ('semidefinite programming', 0.5340586304664612), ('polynomial optimization', 0.5336309671401978), ('polynomial optimization problems', 0.5329394936561584), ('sparse semidefinite', 0.5015854835510254), ('moment sos relaxations', 0.4881120026111603), ('sparse polynomial', 0.46514689922332764)]" 287,287,101,287_random field ising_ferromagnetic ising_ising models_two dimensional ising,"['random field ising', 'ferromagnetic ising', 'ising models', 'two dimensional ising', 'field ising', 'dimensional ising', 'quantum ising', 'random field', 'ising random', 'renormalization']","[""Exponential decay of correlations in the 2D random field Ising model An extension of the Ising spin configurations to continuous functions is used\nfor an exact representation of the Random Field Ising Model's order parameter\nin terms of disagreement percolation. This facilitates an extension of the\nrecent analyses of the decay of correlations to positive temperatures, at\nhomogeneous but arbitrarily weak disorder.\n"", ""Absence of replica symmetry breaking in disordered FKG-Ising models\n under uniform field We prove that the variance of spin overlap vanishes in disordered Ising\nmodels satisfying the Fortuin-Kasteleyn-Ginibre (FKG) inequality under a\nuniform field, such as generally distributed random field Ising model, site-\nand bond-diluted Ising models with the Bernoulli distribution. Chatterjee's\nproof for the Gaussian random field Ising model is generalized to other\nindependent identically distributed quenched disorder under a uniform field.\n"", 'On the Ultrametricity Property in Random Field Ising Models In this paper we show that the ultrametricity property remains valid in\nrandom field Ising models with independent disorder whenever the field strength\nis a small perturbation.\n']","[('random field ising', 0.6435322761535645), ('ferromagnetic ising', 0.5203744173049927), ('ising models', 0.5128669738769531), ('two dimensional ising', 0.49245527386665344), ('field ising', 0.4760688543319702), ('dimensional ising', 0.4735790491104126), ('quantum ising', 0.46720612049102783), ('random field', 0.4478329122066498), ('ising random', 0.4421938955783844), ('renormalization', 0.405673623085022)]" 288,288,101,288_online convex optimization_online optimization_convex optimization oco_online gradient descent,"['online convex optimization', 'online optimization', 'convex optimization oco', 'online gradient descent', 'online convex', 'regret minimization', 'cost convex', 'convex optimization', 'constrained online', 'regret bounds']","['Optimal Algorithms for Online Convex Optimization with Adversarial\n Constraints A well-studied generalization of the standard online convex optimization\n(OCO) framework is constrained online convex optimization (COCO). In COCO, on\nevery round, a convex cost function and a convex constraint function are\nrevealed to the learner after it chooses the action for that round. The\nobjective is to design an online learning policy that simultaneously achieves a\nsmall regret while ensuring a small cumulative constraint violation (CCV)\nagainst an adaptive adversary interacting over a horizon of length $T$. A\nlong-standing open question in COCO is whether an online policy can\nsimultaneously achieve $O(\\sqrt{T})$ regret and $\\tilde{O}(\\sqrt{T})$ CCV\nwithout any restrictive assumptions. For the first time, we answer this in the\naffirmative and show that a simple first-order policy can simultaneously\nachieve these bounds. Furthermore, in the case of strongly convex cost and\nconvex constraint functions, the regret guarantee can be improved to $O(\\log\nT)$ while keeping the CCV bound the same as above. We establish these results\nby effectively combining adaptive OCO policies as a blackbox with Lyapunov\noptimization - a classic tool from control theory. Surprisingly, the analysis\nis short and elegant.\n', 'Optimal Bounds for Adversarial Constrained Online Convex Optimization Constrained Online Convex Optimization (COCO) can be seen as a generalization of the standard Online Convex Optimization (OCO) framework. At each round, a cost function and constraint function are revealed after a learner chooses an action. The goal is to minimize both the regret and cumulative constraint violation (CCV) against an adaptive adversary. We show for the first time that is possible to obtain the optimal $O(\\sqrt{T})$ bound on both regret and CCV, improving the best known bounds of $O \\left( \\sqrt{T} \\right)$ and $\\tilde{O} \\left( \\sqrt{T} \\right)$ for the regret and CCV, respectively. Based on a new surrogate loss function enforcing a minimum penalty on the constraint function, we demonstrate that both the Follow-the-Regularized-Leader and the Online Gradient Descent achieve the optimal bounds.', 'Tight Bounds for Online Convex Optimization with Adversarial Constraints A well-studied generalization of the standard online convex optimization\n(OCO) is constrained online convex optimization (COCO). In COCO, on every\nround, a convex cost function and a convex constraint function are revealed to\nthe learner after the action for that round is chosen. The objective is to\ndesign an online policy that simultaneously achieves a small regret while\nensuring small cumulative constraint violation (CCV) against an adaptive\nadversary. A long-standing open question in COCO is whether an online policy\ncan simultaneously achieve $O(\\sqrt{T})$ regret and $O(\\sqrt{T})$ CCV without\nany restrictive assumptions. For the first time, we answer this in the\naffirmative and show that an online policy can simultaneously achieve\n$O(\\sqrt{T})$ regret and $\\tilde{O}(\\sqrt{T})$ CCV. We establish this result by\neffectively combining the adaptive regret bound of the AdaGrad algorithm with\nLyapunov optimization - a classic tool from control theory. Surprisingly, the\nanalysis is short and elegant.\n']","[('online convex optimization', 0.713070809841156), ('online optimization', 0.6125994324684143), ('convex optimization oco', 0.60982346534729), ('online gradient descent', 0.600878119468689), ('online convex', 0.5918715596199036), ('regret minimization', 0.5464288592338562), ('cost convex', 0.543549120426178), ('convex optimization', 0.5409886240959167), ('constrained online', 0.5038425922393799), ('regret bounds', 0.4922301471233368)]" 289,289,101,289_hopf algebras_dimensional hopf algebras_hopf algebras hopf_cocommutative hopf algebra,"['hopf algebras', 'dimensional hopf algebras', 'hopf algebras hopf', 'cocommutative hopf algebra', 'hopf algebra', 'dimensional hopf algebra', 'graded hopf algebra', 'hopf algebra mathcal', 'algebras hopf', 'hopf subalgebra']","['On Hopf algebras over basic Hopf algebras of dimension 24 We determine finite-dimensional Hopf algebras over an algebraically closed\nfield of characteristic zero, whose Hopf coradical is isomorphic to a\nnon-pointed basic Hopf algebra of dimension $24$ and the infinitesimal\nbraidings are indecomposable objects. In particular, we obtain families of new\nfinite-dimensional Hopf algebras without the dual Chevalley property.\n', ""Braided Hopf Crossed Modules Through Simplicial Structures Any simplicial Hopf algebra involves $2n$ different projections between the\nHopf algebras $H_n,H_{n-1}$ for each $n \\geq 1$. The word projection, here\nmeaning a tuple $\\partial \\colon H_{n} \\to H_{n-1}$ and $i \\colon H_{n-1} \\to\nH_{n}$ of Hopf algebra morphisms, such that $\\partial \\, i = \\mathrm{id}$.\nGiven a Hopf algebra projection $(\\partial \\colon I \\to H,i)$ in a braided\nmonoidal category $\\mathfrak{C}$, one can obtain a new Hopf algebra structure\nliving in the category of Yetter-Drinfeld modules over $H$, due to Radford's\ntheorem. The underlying set of this Hopf algebra is obtained by an equalizer\nwhich only defines a sub-algebra (not a sub-coalgebra) of $I$ in\n$\\mathfrak{C}$. In fact, this is a braided Hopf algebra since the category of\nYetter-Drinfeld modules over a Hopf algebra with an invertible antipode is\nbraided monoidal. To apply Radford's theorem in a simplicial Hopf algebra\nsuccessively, we require some extra functorial properties of Yetter-Drinfeld\nmodules. Furthermore, this allows us to model Majid's braided Hopf crossed\nmodule notion from the perspective of a simplicial structure.\n"", 'A decomposition Theorem for pointed braided Hopf algebras A known fundamental Theorem for braided pointed Hopf algebras states that for\neach coideal subalgebra, that fulfils a few properties, there is an associated\nquotient coalgebra right module such that the braided Hopf algebra can be\ndecomposed into a tensor product of these two. Often one considers braided Hopf\nalgebras in a Yetter-Drinfeld category of an ordinary Hopf algebra. In this\ncase the braided Hopf algebra is in particular a comodule, as well as many\ninteresting coideal subalgebras. We extend the mentioned Theorem by proving\nthat the decomposition is compatible with this comodule structure if the\nunderlying ordinary Hopf algebra is cosemisimple.\n']","[('hopf algebras', 0.8355023860931396), ('dimensional hopf algebras', 0.8168233036994934), ('hopf algebras hopf', 0.806178867816925), ('cocommutative hopf algebra', 0.7849347591400146), ('hopf algebra', 0.7723343372344971), ('dimensional hopf algebra', 0.7695274353027344), ('graded hopf algebra', 0.7435978651046753), ('hopf algebra mathcal', 0.7320660352706909), ('algebras hopf', 0.7171132564544678), ('hopf subalgebra', 0.6897382140159607)]" 290,290,101,290_microgrid_microgrids_inverter based resources_power grid,"['microgrid', 'microgrids', 'inverter based resources', 'power grid', 'power grids', 'inverter based', 'power systems', 'frequency control', 'synchronous machine', 'inverters']","['Flexible Control Strategy of DC Bus for AC-DC Hybrid Microgrid with\n Electric Vehicle As a new type of microgrid structure, AC-DC hybrid microgrid can efficiently\nconsume new energy distributed generator based on photovoltaics, which is very\nsuitable for microgrid systems with electric vehicles as the main load. Unlike\nthe AC microgrid, the DC bus of the AC-DC hybrid microgrid is a low-inertia\nsystem. How to improve the DC bus inertia of the AC-DC hybrid microgrid system\nand the stability of the DC bus voltage become particularly important. Based on\nthis, this paper presents a method for flexible control strategy of microgrid\nbus voltage based on multi-node droop. By considering the P / U droop\ncharacteristics of DC ports of power electronic equipment such as energy\nstorage and electric vehicle charging-discharging equipment, different types of\ndistributed generator are comprehensively considered. The power reserve rate\nand energy reserve rate, through curve shift and other adjustment methods,\nimprove the DC bus inertia, which effectively guarantees the stability of the\nmicrogrid system voltage. The validity of the proposed method is verified by\nbuilding a matlab / simulik simulation system.\n', 'Decentralized Droop-based Finite-Control-Set Model Predictive Control of\n Inverter-based Resources in Islanded AC Microgrid This paper presents an improved droop control method to ensure effective\npower sharing, voltage regulation, and frequency stabilization of\ninverter-based resources (IBRs) connected in parallel in an islanded AC\nmicrogrid. In the contemporary droop control algorithm, the distance between\nconnected inverters affects the effectiveness of the active power-frequency and\nthe reactive power-voltage droop characteristics which results in poor power\nsharing at the primary level of the microgrid. That is, high impedance\nemanating from long transmission lines results in instability, poor voltage\ntracking, and ineffective frequency regulation. Hence, in this work, we use a\nfinite-control-set model predictive controller (FCS-MPC) in the inner loop,\nwhich gives efficient voltage tracking, good frequency regulation, and faster\nperformance response. FCS-MPC is easy to implement in fast switching converters\nand does not suffer from computational burden unlike the continuous-set MPC and\nis also devoid of issues of multiple-loop, parameter variation, and slow\nresponse associated with conventional droop control methods. We derived the\ncondition for bounded stability for the FCS-MPC and the proposed method is\ntested via a numerical simulation on three IBRs. The results show effective\npower sharing, capacitor voltage tracking, and efficient frequency regulation\nwith reduced oscillations to changes in load.\n', 'Frequency Stability of Synchronous Machines and Grid-Forming Power\n Converters An inevitable consequence of the global power system transition towards\nnearly 100% renewable-based generation is the loss of conventional bulk\ngeneration by synchronous machines, their inertia, and accompanying frequency\nand voltage control mechanisms. This gradual transformation of the power system\nto a low-inertia system leads to critical challenges in maintaining system\nstability. Novel control techniques for converters, so-called grid-forming\nstrategies, are expected to address these challenges and replicate\nfunctionalities that so far have been provided by synchronous machines. This\narticle presents a low-inertia case study that includes synchronous machines\nand converters controlled under various grid-forming techniques. In this work\n1) the positive impact of the grid-forming converters on the frequency\nstability of synchronous machines is highlighted, 2) a qualitative analysis\nwhich provides insights into the frequency stability of the system is\npresented, 3) we explore the behavior of the grid-forming controls when\nimposing the converter dc and ac current limitations, 4) the importance of the\ndc dynamics in grid-forming control design as well as the critical need for an\neffective ac current limitation scheme are reported, and lastly 5) we analyze\nhow and when the interaction between the fast grid-forming converter and the\nslow synchronous machine dynamics can contribute to the system instability\n']","[('microgrid', 0.5391208529472351), ('microgrids', 0.5289328098297119), ('inverter based resources', 0.4125961363315582), ('power grid', 0.4029500484466553), ('power grids', 0.3757054805755615), ('inverter based', 0.3319069445133209), ('power systems', 0.3315112590789795), ('frequency control', 0.3019428849220276), ('synchronous machine', 0.2996561825275421), ('inverters', 0.2927307188510895)]" 291,291,100,291_prey dynamics_predator prey system_predator prey models_prey models,"['prey dynamics', 'predator prey system', 'predator prey models', 'prey models', 'prey system', 'prey population', 'prey predator', 'predator prey', 'hopf bifurcations', 'bifurcation analysis']","[""Dynamical behavior of Predator-Prey with Allee Effect on Both\n Populations and Disease in Predator In the current study, we took into account a model of nonlinear\n``predator-prey'' interactions including the ``Allee effect'' on both\npopulations and disease in the predator population. The population as a whole\nis split into three: the prey population, susceptible predator, and diseased\npredator. The ``Takagi-Sugeno (T-S) impulsive control model'' and the Fuzzy\nimpulsive control model have been used to test the stability of the\nthree-dimensional ``Lotka-Volterra predator-prey system'' model. Following the\nmodel's formulation, the global-stability and the fuzzy solution are examined\nusing numerical simulations and graphical displays, together with the necessary\nconsultation, to help comprehend the effectiveness of our suggested model.\n"", 'Complex dynamics of a predator-prey model with constant-yield prey\n harvesting and Allee effect in predator This paper investigates the dynamical behaviors of a Holling type I\nLeslie-Gower predator-prey model where the predator exhibits an Allee effect\nand is subjected to constant harvesting. The model demonstrates three types of\nequilibrium points under different parameter conditions, which could be either\nstable or unstable nodes (foci), saddle nodes, weak centers, or cusps. The\nsystem exhibits a saddle-node bifurcation near the saddle-node point and a Hopf\nbifurcation near the weak center. By calculating the first Lyapunov\ncoefficient, the conditions for the occurrence of both supercritical and\nsubcritical Hopf bifurcations are derived. Finally, it is proven that when the\npredator growth rate and the prey capture coefficient vary within a specific\nsmall neighborhood, the system undergoes a codimension-2 Bogdanov-Takens\nbifurcation near the cusp point.\n', 'Modelling and analysis of a modified May-Holling-Tanner predator-prey\n model with Allee effect in the prey and an alternative food source for the\n predator In the present study, we have modified the traditional May-Holling-Tanner\npredator-prey model used to represent the interaction between least weasel and\nfield-vole population by adding an Allee effect (strong and weak) on the\nfield-vole population and alternative food source for the weasel population. It\nis shown that the dynamic is different from the original May-Holling-Tanner\npredator-prey interaction since new equilibrium points have appeared in the\nfirst quadrant. Moreover, the modified model allows the extinction of both\nspecies when the Allee effect (strong and weak) on the prey is included, while\nthe inclusion of the alternative food source for the predator shows that the\nsystem can support the coexistence of the populations, extinction of the prey\nand coexistence and oscillation of the populations at the same time.\nFurthermore, we use numerical simulations to illustrate the impact that\nchanging the predation rate and the predator intrinsic growth rate have on the\nbasin of attraction of the stable equilibrium point or stable limit cycle in\nthe first quadrant. These simulations show the stabilisation of predator and\nprey populations and/or the oscillation of these two species over time.\n']","[('prey dynamics', 0.7368687987327576), ('predator prey system', 0.6654950976371765), ('predator prey models', 0.6647133827209473), ('prey models', 0.662108838558197), ('prey system', 0.6201860308647156), ('prey population', 0.5596035718917847), ('prey predator', 0.5371400713920593), ('predator prey', 0.5163719058036804), ('hopf bifurcations', 0.4924505054950714), ('bifurcation analysis', 0.49015429615974426)]" 292,292,100,292_evolutionary game theory_evolutionary game dynamics_evolutionary games_evolutionary game,"['evolutionary game theory', 'evolutionary game dynamics', 'evolutionary games', 'evolutionary game', 'game theory', 'evolutionary dynamics', 'levels cooperation', 'cooperation', 'game dynamics', 'population games']","[""Impact of misinformation in the evolution of collective cooperation Human societies are organized and developed through collective cooperative\nbehaviors, in which interactions between individuals are governed by the\nunderlying social connections. It is well known that, based on the information\nin their environment, individuals can form collective cooperation by\nstrategically imitating superior behaviors and changing unfavorable\nsurroundings in self-organizing ways. However, facing the tough situation that\nsome humans and social bots keep spreading misinformation, we still lack the\nsystematic investigation on the impact of such proliferation of misinformation\non the evolution of social cooperation. Here we study this problem by virtue of\nclassical evolutionary game theory. We find that misinformation generally\nimpedes the emergence of collective cooperation compared to scenarios with\ncompletely true information, although the level of cooperation is slightly\nhigher when the benefits provided by cooperators are reduced below a proven\nthreshold. We further show that this possible advantage shrinks as social\nconnections become denser, suggesting that misinformation is more detrimental\nto the formation of collective cooperation when 'social viscosity' is low. Our\nresults uncover the quantitative effect of misinformation on the social\ncooperative behavior in the complex networked society, and pave the way for\ndesigning possible interventions to improve collective cooperation.\n"", ""Convergence Analysis and Strategy Control of Evolutionary Games with\n Imitation Rule on Toroidal Grid: A Full Version This paper investigates discrete-time evolutionary games with a general\nstochastic imitation rule on the toroidal grid, which is a grid network with\nperiodic boundary conditions. The imitation rule has been considered as a\nfundamental rule to the field of evolutionary game theory, while the grid is\ntreated as the most basic network and has been widely used in the research of\nspatial (or networked) evolutionary games. However, currently the investigation\nof evolutionary games on grids mainly uses simulations or approximation\nmethods, while few strict analysis is carried out on one-dimensional grids.\nThis paper proves the convergence of evolutionary prisoner's dilemma,\nevolutionary snowdrift game, and evolutionary stag hunt game with the imitation\nrule on the two-dimensional grid, for the first time to our best knowledge.\nSimulations show that our results may almost reach the critical convergence\ncondition for the evolutionary snowdrift (or hawk-dove, chicken) game. Also,\nthis paper provides some theoretical results for the strategy control of\nevolutionary games, and solves the Minimum Agent Consensus Control (MACC)\nproblem under some parameter conditions. We show that for some evolutionary\ngames (like the evolutionary prisoner's dilemma) on the toroidal grid, one\nfixed defection node can drive all nodes almost surely converging to defection,\nwhile at least four fixed cooperation nodes are required to lead all nodes\nalmost surely converging to cooperation.\n"", 'Indirect exclusion can promote cooperation in repeated group\n interactions Social exclusion has been regarded as one of the most effective measures to\npromote the evolution of cooperation. In real society, the way in which social\nexclusion works can be direct or indirect. However, thus far there is no\nrelated work to explore how indirect exclusion influences the evolution of\ncooperation from a theoretical perspective. Here, we introduce indirect\nexclusion into the repeated public goods game where the game organizer\nprobabilistically selects cooperators after the first game round to participate\nin the following possible game interactions. We then investigate the\nevolutionary dynamics of cooperation both in infinite and finite well-mixed\npopulations. Through theoretical analysis and numerical calculations, we find\nthat the introduction of indirect exclusion can induce the stable coexistence\nof cooperators and defectors or the dominance of cooperators, which thus\neffectively promotes the evolution of cooperation. Besides, we show that the\nidentifying probability of the organizer has a nonlinear effect on public\ncooperation when its value is lower than an intermediate value, while the\nhigher identifying probability can maintain a high level of cooperation.\nFurthermore, our results show that increasing the average rounds of game\ninteractions can effectively promote the evolution of cooperation.\n']","[('evolutionary game theory', 0.6684067845344543), ('evolutionary game dynamics', 0.6546117067337036), ('evolutionary games', 0.6055818796157837), ('evolutionary game', 0.6001691222190857), ('game theory', 0.5616331696510315), ('evolutionary dynamics', 0.5356045365333557), ('levels cooperation', 0.5250875949859619), ('cooperation', 0.5219841599464417), ('game dynamics', 0.4971426725387573), ('population games', 0.48958903551101685)]" 293,293,100,293_ruin probability_ruin theory_risk theory_ruin,"['ruin probability', 'ruin theory', 'risk theory', 'ruin', 'risk models', 'risk processes', 'risk process', 'semi markov', 'insurance', 'markov models']","[""Confidence intervals of ruin probability under L\\'evy surplus The aim of this paper is to construct the confidence interval of the ultimate\nruin probability under the insurance surplus driven by a L\\'evy process.\nAssuming a parametric family for the L\\'evy measures, we estimate the parameter\nfrom the surplus data and estimate the ruin probability via the delta method.\nHowever the asymptotic variance includes the derivative of the ruin probability\nwith respect to the parameter, which is not generally given explicitly, and the\nconfidence interval is not straightforward even if the ruin probability is well\nestimated. This paper gives the Cram\\'er-type approximation for the derivative\nand gives an asymptotic confidence interval of ruin probability.\n"", 'Ruin probabilities with investments: smoothness, IDE and ODE, asymptotic\n behavior The study deals with the ruin problem when an insurance company having two\nbusiness branches, life insurance and non-life insurance, invests its reserve\ninto a risky asset with the price dynamics given by a geometric Brownian\nmotion. We prove a result on smoothness of the ruin probability as a function\nof the initial capital and obtain for it an integro-differential equation\nunderstood in the classical sense. For the case of exponentially distributed\njumps we show that the survival probability is a solution of an ordinary\ndifferential equation of the 4th order. Asymptotic analysis of the latter leads\nto the conclusion that the ruin probability decays to zero in the same way as\nin the already studied cases of models with one-side jumps.\n', 'Approximation of ruin probability and ruin time in discrete Brownian\n risk models We analyze the classical Brownian risk models discussing the approximation of\nruin probabilities (classical, {\\gamma}-reflected, Parisian and cumulative\nParisian) for the case that ruin can occur only on specific discrete grids. A\npractical and natural grid of points is for instance G(1) = {0,1,2,...}, which\nallows us to study the probability of the ruin on the first day, second day,\nand so one. For such a discrete setting, there are no explicit formulas for the\nruin probabilities mentioned above. In this contribution we derive accurate\napproximations of ruin probabilities for uniform grids by letting the initial\ncapital to grow to infinity.\n']","[('ruin probability', 0.6408944725990295), ('ruin theory', 0.6068145036697388), ('risk theory', 0.4649607241153717), ('ruin', 0.44692742824554443), ('risk models', 0.4303797781467438), ('risk processes', 0.4168403148651123), ('risk process', 0.40789729356765747), ('semi markov', 0.3886312246322632), ('insurance', 0.36251991987228394), ('markov models', 0.3566552996635437)]" 294,294,100,294_symmetric designs_group divisible designs_transitive automorphism groups_symmetric design,"['symmetric designs', 'group divisible designs', 'transitive automorphism groups', 'symmetric design', 'designs constructed', 'transitive automorphism group', 'designs', 'symmetric configurations', 'divisible designs', 'transitive automorphism']","['Almost simple groups as flag-transitive automorphism groups of 2-designs\n with {\\lambda} = 2 In this article, we study $2$-designs with $\\lambda=2$ admitting a\nflag-transitive almost simple automorphism group with socle a finite simple\nexceptional group of Lie type, and we prove that such a $2$-design does not\nexist. In conclusion, we present a classification of $2$-designs with\n$\\lambda=2$ admitting flag-transitive and point-primitive automorphism groups\nof almost simple type, which states that such a $2$-design belongs to an\ninfinite family of $2$-designs with parameter set $((3^n-1)/2,3,2)$ and\n$X=PSL_n(3)$ for some $n\\geq 3$, or it is isomorphic to the $2$-design with\nparameter set $(6,3,2)$, $(7,4,2)$, $(10,4,2)$, $(10,4,2)$, $(11,5,2)$,\n$(28,7,2)$, $(28,3,2)$, $(36,6,2)$, $(126,6,2)$ or $(176,8,2)$.\n', 'Sporadic simple groups as flag-transitive automorphism groups of\n symmetric designs In this article, we study symmetric designs admitting flag-transitive,\npoint-imprimitive almost simple automorphism groups with socle sporadic simple\ngroups. As a corollary, we present a classification of symmetric designs\nadmitting flag-transitive automorphism group whose socle is a sporadic simple\ngroup, and in conclusion, there are exactly seven such designs, one of which\nadmits a point-imprimitive automorphism group and the remaining are\npoint-primitive.\n', 'On symmetric 2-designs of prime order with almost simple flag-transitive\n automorphism groups In this article, we investigate symmetric 2-designs of prime order admitting\na flag-transitive automorphism group G. Recently, the authors proved that the\nautomorphism group G of this type of designs must be point-primitive, and is of\naffine or almost simple type. Here, we give the complete classification of\nsymmetric 2-designs of prime order, admitting a flag-transitive almost simple\nautomorphism group.\n']","[('symmetric designs', 0.6274985074996948), ('group divisible designs', 0.5553106069564819), ('transitive automorphism groups', 0.5206305384635925), ('symmetric design', 0.5188502669334412), ('designs constructed', 0.4952312111854553), ('transitive automorphism group', 0.49329033493995667), ('designs', 0.4788030982017517), ('symmetric configurations', 0.47668033838272095), ('divisible designs', 0.4657790958881378), ('transitive automorphism', 0.4607222378253937)]" 295,295,99,295_distributionally robust optimization_driven distributionally robust_robust chance constrained_distributionally robust,"['distributionally robust optimization', 'driven distributionally robust', 'robust chance constrained', 'distributionally robust', 'distributional robustness', 'robust optimization', 'based distributionally robust', 'robust optimization dro', 'robust optimization problems', 'chance constrained optimization']","['Data-driven Approximation of Distributionally Robust Chance Constraints\n using Bayesian Credible Intervals The non-convexity and intractability of distributionally robust chance\nconstraints make them challenging to cope with. From a data-driven perspective,\nwe propose formulating it as a robust optimization problem to ensure that the\ndistributionally robust chance constraint is satisfied with high probability.\nTo incorporate available data and prior distribution knowledge, we construct\nambiguity sets for the distributionally robust chance constraint using Bayesian\ncredible intervals. We establish the congruent relationship between the\nambiguity set in Bayesian distributionally robust chance constraints and the\nuncertainty set in a specific robust optimization. In contrast to most existent\nuncertainty set construction methods which are only applicable for particular\nsettings, our approach provides a unified framework for constructing\nuncertainty sets under different marginal distribution assumptions, thus making\nit more flexible and widely applicable. Additionally, under the concavity\nassumption, our method provides strong finite sample probability guarantees for\noptimal solutions. The practicality and effectiveness of our approach are\nillustrated with numerical experiments on portfolio management and queuing\nsystem problems. Overall, our approach offers a promising solution to\ndistributionally robust chance constrained problems and has potential\napplications in other fields.\n', 'Structured ambiguity sets for distributionally robust optimization Distributionally robust optimization (DRO) incorporates robustness against\nuncertainty in the specification of probabilistic models. This paper focuses on\nmitigating the curse of dimensionality in data-driven DRO problems with optimal\ntransport ambiguity sets. By exploiting independence across lower-dimensional\ncomponents of the uncertainty, we construct structured ambiguity sets that\nexhibit a faster shrinkage as the number of collected samples increases. This\nnarrows down the plausible models of the data-generating distribution and\nmitigates the conservativeness that the decisions of DRO problems over such\nambiguity sets may face. We establish statistical guarantees for these\nstructured ambiguity sets and provide dual reformulations of their associated\nDRO problems for a wide range of objective functions. The benefits of the\napproach are demonstrated in a numerical example.\n', 'Residuals-based distributionally robust optimization with covariate\n information We consider data-driven approaches that integrate a machine learning\nprediction model within distributionally robust optimization (DRO) given\nlimited joint observations of uncertain parameters and covariates. Our\nframework is flexible in the sense that it can accommodate a variety of\nregression setups and DRO ambiguity sets. We investigate asymptotic and finite\nsample properties of solutions obtained using Wasserstein, sample robust\noptimization, and phi-divergence-based ambiguity sets within our DRO\nformulations, and explore cross-validation approaches for sizing these\nambiguity sets. Through numerical experiments, we validate our theoretical\nresults, study the effectiveness of our approaches for sizing ambiguity sets,\nand illustrate the benefits of our DRO formulations in the limited data regime\neven when the prediction model is misspecified.\n']","[('distributionally robust optimization', 0.7862428426742554), ('driven distributionally robust', 0.6592183113098145), ('robust chance constrained', 0.6478214263916016), ('distributionally robust', 0.6412978768348694), ('distributional robustness', 0.6326380372047424), ('robust optimization', 0.6316155195236206), ('based distributionally robust', 0.6304689049720764), ('robust optimization dro', 0.622837245464325), ('robust optimization problems', 0.6152534484863281), ('chance constrained optimization', 0.5934524536132812)]" 296,296,99,296_ergodic markov chains_markov chains general_ergodic markov_reversible markov chains,"['ergodic markov chains', 'markov chains general', 'ergodic markov', 'reversible markov chains', 'non reversible markov', 'limit markov', 'markov additive processes', 'markov chain finite', 'reversible markov', 'markov additive']","['Analysis of non-reversible Markov chains via similarity orbit In this paper, we develop an in-depth analysis of non-reversible Markov\nchains on denumerable state space from a similarity orbit perspective. In\nparticular, we study the class of Markov chains whose transition kernel is in\nthe similarity orbit of a normal transition kernel, such as the one of\nbirth-death chains or reversible Markov chains. We start by identifying a set\nof sufficient conditions for a Markov chain to belong to the similarity orbit\nof a birth-death one. As by-products, we obtain a spectral representation in\nterms of non-self-adjoint resolutions of identity in the sense of Dunford [21]\nand offer a detailed analysis on the convergence rate, separation cutoff and\n${\\rm{L}}^2$-cutoff of this class of non-reversible Markov chains. We also look\ninto the problem of estimating the integral functionals from discrete\nobservations for this class. In the last part of this paper, we investigate a\nparticular similarity orbit of reversible Markov kernels, that we call the pure\nbirth orbit, and analyze various possibly non-reversible variants of classical\nbirth-death processes in this orbit.\n', ""Variational Formulas of Asymptotic Variance for General Discrete-time\n Markov Chains The asymptotic variance is an important criterion to evaluate the performance\nof Markov chains, especially for the central limit theorems. We give the\nvariational formulas for the asymptotic variance of discrete-time\n(non-reversible) Markov chains on general state space. The variational formulas\nprovide many applications, extending the classical Peskun's comparison theorem\nto non-reversible Markov chains, and obtaining several comparison theorems\nbetween Markov chains with various perturbations.\n"", ""On a boundary of the central limit theorem for strictly stationary,\n reversible Markov chains Consider the class of (functions of) strictly stationary Markov chains in\nwhich (i) the second moments are finite and (ii) absolute regularity\n(beta-mixing) is satisfied with exponential mixing rate. For (functions of)\nMarkov chains in that class that are also reversible, the central limit theorem\nholds, as a well known byproduct of results of Roberts, Rosenthal, and Tweedie\nin two papers in 1997 and 2001 involving reversible Markov chains. In contrast,\nfor (functions of) Markov chains in that class that are not reversible, the\ncentral limit theorem may fail to hold, as is known from counterexamples,\nincluding ones with arbitrarily fast mixing rate (for absolute regularity).\nHere it will be shown that for Markov chains in that class that are reversible,\nthe``borderline'' class of mixing rates (for absolute regularity) for the\ncentral limit theorem is in fact exponential. That will be shown here with a\nclass of counterexamples: strictly stationary, countable-state Markov chains\nthat are reversible, have finite second moments, and satisfy absolute\nregularity with mixing rates that can be arbitrarily close to (but not quite)\nexponential, but fail to satisfy the central limit theorem.\n""]","[('ergodic markov chains', 0.684191107749939), ('markov chains general', 0.6353650689125061), ('ergodic markov', 0.6214306950569153), ('reversible markov chains', 0.620637059211731), ('non reversible markov', 0.6057683825492859), ('limit markov', 0.5991434454917908), ('markov additive processes', 0.5934847593307495), ('markov chain finite', 0.5930190086364746), ('reversible markov', 0.570824146270752), ('markov additive', 0.5687114000320435)]" 297,297,99,297_survival analysis_survival functions_censoring_cox proportional hazards,"['survival analysis', 'survival functions', 'censoring', 'cox proportional hazards', 'survival time', 'censored', 'proportional hazards', 'survival times', 'proportional hazard', 'right censored']","['Proximal Survival Analysis to Handle Dependent Right Censoring Many epidemiological and clinical studies aim at analyzing a time-to-event\nendpoint. A common complication is right censoring. In some cases, it arises\nbecause subjects are still surviving after the study terminates or move out of\nthe study area, in which case right censoring is typically treated as\nindependent or non-informative. Such an assumption can be further relaxed to\nconditional independent censoring by leveraging possibly time-varying covariate\ninformation, if available, assuming censoring and failure time are independent\namong covariate strata. In yet other instances, events may be censored by other\ncompeting events like death and are associated with censoring possibly through\nprognoses. Realistically, measured covariates can rarely capture all such\nassociations with certainty. For such dependent censoring, often covariate\nmeasurements are at best proxies of underlying prognoses. In this paper, we\nestablish a nonparametric identification framework by formally admitting that\nconditional independent censoring may fail in practice and accounting for\ncovariate measurements as imperfect proxies of underlying association. The\nframework suggests adaptive estimators which we give generic assumptions under\nwhich they are consistent, asymptotically normal, and doubly robust. We\nillustrate our framework with concrete settings, where we examine the\nfinite-sample performance of our proposed estimators via a Monte-Carlo\nsimulation and apply them to the SEER-Medicare dataset.\n', 'Doubly Robust and Efficient Calibration of Prediction Sets for Censored\n Time-to-Event Outcomes Our objective is to construct well-calibrated prediction sets for a\ntime-to-event outcome subject to right-censoring with guaranteed coverage. Our\napproach is inspired by modern conformal inference literature in that, unlike\nclassical frameworks, we obviate the need for a well-specified parametric or\nsemiparametric survival model to accomplish our goal. In contrast to existing\nconformal prediction methods for survival data, which restrict censoring to be\nof Type I, whereby potential censoring times are assumed to be fully observed\non all units in both training and validation samples, we consider the more\ncommon right-censoring setting in which either only the censoring time or only\nthe event time of primary interest is directly observed, whichever comes first.\nUnder a standard conditional independence assumption between the potential\nsurvival and censoring times given covariates, we propose and analyze two\nmethods to construct valid and efficient lower predictive bounds for the\nsurvival time of a future observation. The proposed methods build upon modern\nsemiparametric efficiency theory for censored data, in that the first approach\nincorporates inverse-probability-of-censoring weighting to account for\ncensoring, while the second approach is based on augmenting this method with an\nadditional correction term. For both methods, we formally establish asymptotic\ncoverage guarantees and demonstrate, both theoretically and through empirical\nexperiments, that the augmented approach substantially improves efficiency over\nthe inverse-probability-of-censoring weighting method. Specifically, its\ncoverage error bound is of second-order mixed bias type, that is doubly robust,\nand therefore guaranteed to be asymptotically negligible relative to the\ncoverage error of the non-augmented method.\n', 'Factorial survival analysis for treatment effects under dependent\n censoring Factorial analyses offer a powerful nonparametric means to detect main or\ninteraction effects among multiple treatments. For survival outcomes, e.g. from\nclinical trials, such techniques can be adopted for comparing reasonable\nquantifications of treatment effects. The key difficulty to solve in survival\nanalysis concerns the proper handling of censoring. So far, all existing\nfactorial analyses for survival data were developed under the independent\ncensoring assumption, which is too strong for many applications. As a solution,\nthe central aim of this article is to develop new methods in factorial survival\nanalyses under quite general dependent censoring regimes. This will be\naccomplished by combining existing results for factorial survival analyses with\ntechniques developed for survival copula models. As a result, we will present\nan appealing F-test that exhibits sound performance in our simulation study.\nThe new methods are illustrated in real data analysis. We implement the\nproposed method in an R function surv.factorial(.) in the R package\ncompound.Cox.\n']","[('survival analysis', 0.5500445365905762), ('survival functions', 0.46443426609039307), ('censoring', 0.44777026772499084), ('cox proportional hazards', 0.43008488416671753), ('survival time', 0.3863523006439209), ('censored', 0.36947694420814514), ('proportional hazards', 0.3679204285144806), ('survival times', 0.3608013987541199), ('proportional hazard', 0.3545358180999756), ('right censored', 0.3492422103881836)]" 298,298,99,298_strichartz type estimates_strichartz estimates_schr odinger equations_strichartz estimate,"['strichartz type estimates', 'strichartz estimates', 'schr odinger equations', 'strichartz estimate', 'estimate schr odinger', 'schr odinger operators', 'estimates schr odinger', 'schr odinger operator', 'sobolev estimates', 'odinger operators']","['Quasimode and Strichartz estimates for time-dependent Schr\\""odinger\n equations with singular potentials We generalize the Strichartz estimates for Schr\\""odinger operators on compact\nmanifolds of Burq, G\\\'erard and Tzvetkov [10] by allowing critically singular\npotentials $V$. Specifically, we show that their $1/p$--loss\n$L^p_tL^q_x(I\\times M)$-Strichartz estimates hold for $e^{-itH_V}$ when\n$H_V=-\\Delta_g+V(x)$ with $V\\in L^{n/2}(M)$ if $n\\ge3$ or $V\\in\nL^{1+\\delta}(M)$, $\\delta>0$, if $n=2$, with $(p,q)$ being as in the Keel-Tao\ntheorem and $I\\subset {\\mathbb R}$ a bounded interval. We do this by\nformulating and proving new ""quasimode"" estimates for scaled dyadic unperturbed\nSchr\\""odinger operators and taking advantage of the the fact that\n$1/q\'-1/q=2/n$ for the endpoint Strichartz estimates when $(p,q)=(2,2n/(n-2))$.\nWe also show that the universal quasimode estimates that we obtain are\nsaturated on {\\em any} compact manifolds; however, we suggest that they may\nlend themselves to improved Strichartz estimates in certain geometries using\nrecently developed ""Kakeya-Nikodym"" techniques developed to obtain improved\neigenfunction estimates assuming, say, negative curvatures.\n', 'Orthonormal Strichartz estimates for Schr\\""odinger operator and their\n applications to infinitely many particle systems We develop an abstract perturbation theory for the orthonormal Strichartz\nestimates, which were first studied by Frank-Lewin-Lieb-Seiringer. The method\nused in the proof is based on the duality principle and the smooth perturbation\ntheory by Kato. We also deduce the refined Strichartz estimates for the\nSchr\\""odinger operator in terms of the Besov space. Finally we prove the global\nexistence of a solution for the Hartree equation with electromagnetic\npotentials describing the dynamics of infinitely many fermions. This would be\nthe first result on the orthonormal Strichartz estimates for the Schr\\""odinger\noperator with general time-independent potentials including very short range\nand inverse square type potentials.\n', 'Uniform resolvent and orthonormal Strichartz estimates for repulsive\n Hamiltonian We consider the uniform resolvent and orthonormal Strichartz estimates for\nthe Schr\\""odinger operator. First we prove the Keel-Tao type theorem for the\northonormal Strichartz estimates, which means that the dispersive estimates\nyield the orthonormal Strichartz estimates for strongly continuous unitary\ngroups. This result applies to many Schr\\""odinger propagators which are\ndifficult to treat by the smooth perturbation theory, for example,\nlocal-in-time estimates for the Schr\\""odinger operator with unbounded\nelectromagnetic potentials, the $(k, a)$-generalized Laguerre operators and\nglobal-in-time estimates for the Schr\\""odinger operator with scaling critical\nmagnetic potentials including the Aharonov-Bohm potentials. Next we observe\nmapping properties of resolvents for the repulsive Hamiltonian and apply to the\northonormal Strichartz estimates. We prove the Kato-Yajima type uniform\nresolvent estimates with logarithmic decaying weight functions. This is new\neven when without perturbations. The proof is dependent on the microlocal\nanalysis and the Mourre theory. We also discuss mapping properties on the\nSchwartz class and the Lebesgue space.\n']","[('strichartz type estimates', 0.6809118986129761), ('strichartz estimates', 0.6539252996444702), ('schr odinger equations', 0.6419706344604492), ('strichartz estimate', 0.6305539011955261), ('estimate schr odinger', 0.624035656452179), ('schr odinger operators', 0.6230199337005615), ('estimates schr odinger', 0.6132360100746155), ('schr odinger operator', 0.608494222164154), ('sobolev estimates', 0.5763112902641296), ('odinger operators', 0.5646747350692749)]" 299,299,99,299_permutation polynomials_permutation polynomial_polynomials finite fields_functions finite fields,"['permutation polynomials', 'permutation polynomial', 'polynomials finite fields', 'functions finite fields', 'permutes', 'dickson polynomials', 'finite field odd', 'finite fields even', 'finite fields', 'irreducible polynomials']","['The compositional inverses of three classes of permutation polynomials\n over finite fields Recently, P. Yuan presented a local method to find permutation polynomials\nand their compositional inverses over finite fields. The work of P. Yuan\ninspires us to compute the compositional inverses of three classes of the\npermutation polynomials: (a) the permutation polynomials of the form\n$ax^q+bx+(x^q-x)^k$ over $\\mathbb{F}_{q^2},$ where $a+b \\in \\mathbb{F}_q^*$ or\n$a^q=b;$ (b) the permutation polynomials of the forms\n$f(x)=-x+x^{(q^2+1)/2}+x^{(q^3+q)/2} $ and $f(x)+x$ over $\\mathbb{F}_{q^3};$\n(c) the permutation polynomial of the form $A^{m}(x)+L(x)$ over\n$\\mathbb{F}_{q^n},$ where ${\\rm Im}(A(x))$ is a vector space with dimension $1$\nover $\\mathbb{F}_{q}$ and $L(x)$ is not a linearized permutation polynomial.\n', 'Permutation Polynomials of $\\mathbb{F}_{q^2}$ : A Linear Algebraic\n Approach In this paper, we present a linear algebraic approach to the study of\npermutation polynomials that arise from linear maps over a finite field\n$\\mathbb{F}_{q^2}$. We study a particular class of permutation polynomials over\n$\\mathbb{F}_{q^2}$, in the context of rank deficient and full rank linear maps\nover $\\mathbb{F}_{q^2}$. We derive necessary and sufficient conditions under\nwhich the given class of polynomials are permutation polynomials. We further\nshow that the number of such permutation polynomials can be easily enumerated.\nOnly a subset of these permutation polynomials have been reported in literature\nearlier. It turns out that this class of permutation polynomials have\ncompositional inverses of the same kind and we provide algorithms to evaluate\nthe compositional inverses of most of these permutation polynomials.\n', ""New classes of permutation polynomials with coefficients 1 over finite\n fields Permutation polynomials with coefficients 1 over finite fields attract\nresearchers' interests due to their simple algebraic form. In this paper, we\nfirst construct four classes of fractional permutation polynomials over the\ncyclic subgroup of $ \\mathbb{F}_{2^{2m}} $. From these permutation polynomials,\nthree new classes of permutation polynomials with coefficients 1 over $\n\\mathbb{F}_{2^{2m}} $ are constructed, and three more general new classes of\npermutation polynomials with coefficients 1 over $ \\mathbb{F}_{2^{2m}} $ are\nconstructed using a new method we presented recently. Some known permutation\npolynomials are the special cases of our new permutation polynomials.\nFurthermore, we prove that, in all new permutation polynomials, there exists a\npermutation polynomial which is EA-inequivalent to known permutation\npolynomials for all even positive integer $ m $. This proof shows that\nEA-inequivalent permutation polynomials over $ \\mathbb{F}_{q} $ can be\nconstructed from EA-equivalent permutation polynomials over the cyclic subgroup\nof $ \\mathbb{F}_{q} $. From this proof, it is obvious that, in all new\npermutation polynomials, there exists a permutation polynomial of which\nalgebraic degree is the maximum algebraic degree of permutation polynomials\nover $ \\mathbb{F}_{2^{2m}} $.\n""]","[('permutation polynomials', 0.7118240594863892), ('permutation polynomial', 0.6588146090507507), ('polynomials finite fields', 0.5783352255821228), ('functions finite fields', 0.49525555968284607), ('permutes', 0.49188750982284546), ('dickson polynomials', 0.4795876145362854), ('finite field odd', 0.4655281901359558), ('finite fields even', 0.46514827013015747), ('finite fields', 0.46247124671936035), ('irreducible polynomials', 0.453781396150589)]" 300,300,98,300_ergodic averages_ergodic theorems_ergodic theory_ergodic measure,"['ergodic averages', 'ergodic theorems', 'ergodic theory', 'ergodic measure', 'pointwise ergodic', 'convergence ergodic', 'ergodic measure preserving', 'ergodicity', 'ergodic', 'ergodic systems']","['Seminorm control for ergodic averages with commuting transformations and\n pairwise dependent polynomial iterates We examine multiple ergodic averages of commuting transformations with\npolynomial iterates in which the polynomials may be pairwise dependent. In\nparticular, we show that such averages are controlled by the Gowers-Host-Kra\nseminorms whenever the system satisfies some mild ergodicity assumptions.\nCombining this result with the general criteria for joint ergodicity\nestablished in our earlier work, we determine a necessary and sufficient\ncondition under which such averages are jointly ergodic, in the sense that they\nconverge in the mean to the product of integrals, or weakly jointly ergodic, in\nthat they converge to the product of conditional expectations. As a corollary,\nwe deduce a special case of a conjecture by Donoso, Koutsogiannis, and Sun in a\nstronger form.\n', ""Multiple ergodic averages along functions from a Hardy field:\n convergence, recurrence and combinatorial applications We obtain new results pertaining to convergence and recurrence of multiple\nergodic averages along functions from a Hardy field. Among other things, we\nconfirm some of the conjectures posed by Frantzikinakis in [Fra10; Fra16] and\nobtain combinatorial applications which contain, as rather special cases,\nseveral previously known (polynomial and non-polynomial) extensions of\nSzemeredi's theorem on arithmetic progressions [BL96; BLL08; FW09; Fra10;\nBMR17]. One of the novel features of our results, which is not present in\nprevious work, is that they allow for a mixture of polynomials and\nnon-polynomial functions. As an illustration, assume\n$f_i(t)=a_{i,1}t^{c_{i,1}}+\\cdots+a_{i,d}t^{c_{i,d}}$ for $c_{i,j}>0$ and\n$a_{i,j}\\in\\mathbb{R}$. Then\n $\\bullet$ for any measure preserving system $(X,{\\mathcal B},\\mu,T)$ and\n$h_1,\\dots,h_k\\in L^\\infty(X)$, the limit\n$$\\lim_{N\\to\\infty}\\frac{1}{N}\\sum_{n=1}^N T^{[f_1(n)]}h_1\\cdots\nT^{[f_k(n)]}h_k$$ exists in $L^2$;\n $\\bullet$ for any $E\\subset \\mathbb{N}$ with $\\overline{\\mathrm{d}}(E)>0$\nthere are $a,n\\in\\mathbb{N}$ such that $\\{a,\\,\na+[f_1(n)],\\ldots,a+[f_k(n)]\\}\\subset E$.\n We also show that if $f_1,\\dots,f_k$ belong to a Hardy field, have polynomial\ngrowth, and are such that no linear combination of them is a polynomial, then\nfor any measure preserving system $(X,{\\mathcal B},\\mu,T)$ and any\n$A\\in{\\mathcal B}$, $$\\limsup_{N\\to\\infty}\\frac{1}{N}\\sum_{n=1}^N\\mu\\Big(A\\cap\nT^{-[ f_1(n) ]}A\\cap\\ldots\\cap T^{-[f_k(n)]}A\\Big)\\,\\geq\\,\\mu(A)^{k+1}.$$\n"", 'Pointwise convergence of ergodic averages with M\\""obius weight Let $(X,\\nu,T)$ be a measure-preserving system, and let $P_1,\\ldots, P_k$ be\npolynomials with integer coefficients. We prove that, for any $f_1,\\ldots,\nf_k\\in L^{\\infty}(X)$, the M\\""obius-weighted polynomial multiple ergodic\naverages \\begin{align*}\\frac{1}{N}\\sum_{n\\leq N}\\mu(n)f_1(T^{P_1(n)}x)\\cdots\nf_k(T^{P_k(n)}x) \\end{align*} converge to $0$ pointwise almost everywhere.\nSpecialising to $P_1(y)=y, P_2(y)=2y$, this solves a problem of Frantzikinakis.\nWe also prove pointwise convergence for a more general class of multiplicative\nweights for multiple ergodic averages involving distinct degree polynomials.\nFor the proofs we establish some quantitative generalised von Neumann theorems\nfor polynomial configurations that are of independent interest.\n']","[('ergodic averages', 0.6918820142745972), ('ergodic theorems', 0.6551902890205383), ('ergodic theory', 0.6304371356964111), ('ergodic measure', 0.61395663022995), ('pointwise ergodic', 0.6079837679862976), ('convergence ergodic', 0.5968882441520691), ('ergodic measure preserving', 0.5720388293266296), ('ergodicity', 0.552375316619873), ('ergodic', 0.5447224378585815), ('ergodic systems', 0.5103983283042908)]" 301,301,98,301_generative diffusion models_score based diffusion_diffusion based generative_diffusion generative,"['generative diffusion models', 'score based diffusion', 'diffusion based generative', 'diffusion generative', 'generative diffusion', 'denoising diffusion probabilistic', 'diffusion probabilistic models', 'diffusion probabilistic', 'score based generative', 'generative models']","['Sampling is as easy as learning the score: theory for diffusion models\n with minimal data assumptions We provide theoretical convergence guarantees for score-based generative\nmodels (SGMs) such as denoising diffusion probabilistic models (DDPMs), which\nconstitute the backbone of large-scale real-world generative models such as\nDALL$\\cdot$E 2. Our main result is that, assuming accurate score estimates,\nsuch SGMs can efficiently sample from essentially any realistic data\ndistribution. In contrast to prior works, our results (1) hold for an\n$L^2$-accurate score estimate (rather than $L^\\infty$-accurate); (2) do not\nrequire restrictive functional inequality conditions that preclude substantial\nnon-log-concavity; (3) scale polynomially in all relevant problem parameters;\nand (4) match state-of-the-art complexity guarantees for discretization of the\nLangevin diffusion, provided that the score error is sufficiently small. We\nview this as strong theoretical justification for the empirical success of\nSGMs. We also examine SGMs based on the critically damped Langevin diffusion\n(CLD). Contrary to conventional wisdom, we provide evidence that the use of the\nCLD does not reduce the complexity of SGMs.\n', 'Analyzing Neural Network-Based Generative Diffusion Models through\n Convex Optimization Diffusion models are gaining widespread use in cutting-edge image, video, and\naudio generation. Score-based diffusion models stand out among these methods,\nnecessitating the estimation of score function of the input data distribution.\nIn this study, we present a theoretical framework to analyze two-layer neural\nnetwork-based diffusion models by reframing score matching and denoising score\nmatching as convex optimization. We prove that training shallow neural networks\nfor score prediction can be done by solving a single convex program. Although\nmost analyses of diffusion models operate in the asymptotic setting or rely on\napproximations, we characterize the exact predicted score function and\nestablish convergence results for neural network-based diffusion models with\nfinite data. Our results provide a precise characterization of what neural\nnetwork-based diffusion models learn in non-asymptotic settings.\n', 'Score-based Generative Modeling Secretly Minimizes the Wasserstein\n Distance Score-based generative models are shown to achieve remarkable empirical\nperformances in various applications such as image generation and audio\nsynthesis. However, a theoretical understanding of score-based diffusion models\nis still incomplete. Recently, Song et al. showed that the training objective\nof score-based generative models is equivalent to minimizing the\nKullback-Leibler divergence of the generated distribution from the data\ndistribution. In this work, we show that score-based models also minimize the\nWasserstein distance between them under suitable assumptions on the model.\nSpecifically, we prove that the Wasserstein distance is upper bounded by the\nsquare root of the objective function up to multiplicative constants and a\nfixed constant offset. Our proof is based on a novel application of the theory\nof optimal transport, which can be of independent interest to the society. Our\nnumerical experiments support our findings. By analyzing our upper bounds, we\nprovide a few techniques to obtain tighter upper bounds.\n']","[('generative diffusion models', 0.6171424984931946), ('score based diffusion', 0.6072118282318115), ('diffusion based generative', 0.5847808718681335), ('diffusion generative', 0.5750082731246948), ('generative diffusion', 0.5612032413482666), ('denoising diffusion probabilistic', 0.5228789448738098), ('diffusion probabilistic models', 0.519690752029419), ('diffusion probabilistic', 0.4994124472141266), ('score based generative', 0.4944779574871063), ('generative models', 0.4739978611469269)]" 302,302,98,302_quantum walks graphs_vertices quantum_quantum walks_unitary cayley graphs,"['quantum walks graphs', 'vertices quantum', 'quantum walks', 'unitary cayley graphs', 'quantum state transfer', 'quantum walk', 'perfect state transfer', 'transfer quantum', 'walks graphs', 'time quantum walks']","[""State transfer in discrete-time quantum walks via projected transition\n matrices In this paper, we analyze state transfer in quantum walks by using\ncombinatorial methods. We generalize perfect state transfer in two-reflection\ndiscrete-time quantum walks to a notion that we call 'peak state transfer'; we\ndefine peak state transfer as the highest state transfer that can be achieved\nbetween an initial and a target state under unitary evolution, even when\nperfect state transfer is unattainable. We give a spectral characterization of\npeak state transfer that allows us to fully characterize peak state transfer in\nthe arc-reversal (Grover) walk on various families of graphs, including\nstrongly regular graphs and incidence graphs of block designs (assuming that\nthe walk starts at a point of the design). In addition, we provide many\nexamples of peak state transfer, including an infinite family where the amount\nof peak state transfer tends to $1$ as the number of vertices grows. We further\ndemonstrate that peak state transfer properties extend to infinite families of\ngraphs generated by vertex blow-ups, and we characterize periodicity in the\nvertex-face walk on toroidal grids. In our analysis, we make extensive use of\nthe spectral decomposition of a matrix that is obtained by projecting the\ntransition matrix down onto a subspace. Though we are motivated by a problem in\nquantum computing, we identify several open problems that are purely\ncombinatorial, arising from the spectral conditions required for peak state\ntransfer in discrete-time quantum walks.\n"", ""State Transfer in Complex Quantum Walks Given a graph with Hermitian adjacency matrix $H$, perfect state transfer\noccurs from vertex $a$ to vertex $b$ if the $(b,a)$-entry of the unitary matrix\n$\\exp(-iHt)$ has unit magnitude for some time $t$. This phenomenon is relevant\nfor information transmission in quantum spin networks and is known to be\nmonogamous under real symmetric matrices. We prove the following results:\n 1. For oriented graphs (whose nonzero weights are $\\pm i$), the oriented\n$3$-cycle and the oriented edge are the only graphs where perfect state\ntransfer occurs between every pair of vertices. This settles a conjecture of\nCameron et al. On the other hand, we construct an infinite family of oriented\ngraphs with perfect state transfer between any pair of vertices on a subset of\nsize four.\n 2. There are infinite families of Hermitian graphs with one-way perfect state\ntransfer, where perfect state transfer occurs without periodicity. In contrast,\nperfect state transfer implies periodicity whenever the adjacency matrix has\nalgebraic entries (as shown by Godsil).\n 3. There are infinite families with non-monogamous pretty good state transfer\nin rooted graph products. In particular, we generalize known results on double\nstars (due to Fan and Godsil) and on paths with loops (due to Kempton, Lippner\nand Yau). The latter extends the experimental observation of quantum transport\n(made by Zimbor\\'{a}s et al.) and shows non-monogamous pretty good state\ntransfer can occur amongst distant vertices.\n"", 'Fractional revival on non-cospectral vertices Perfect state transfer and fractional revival can be used to move information\nbetween pairs of vertices in a quantum network. While perfect state transfer\nhas received a lot of attention, fractional revival is newer and less studied.\nOne problem is to determine the differences between perfect state transfer and\nfractional revival. If perfect state transfer occurs between two vertices in a\ngraph, the vertices must be cospectral. Further if there is perfect state\ntransfer between vertices $a$ and $b$ in a graph, there cannot be perfect state\ntransfer from $a$ to any other vertex. No examples of unweighted graphs with\nfractional revival between non-cospectral vertices were known; here we give an\ninfinite family of such graphs. No examples of unweighted graphs where the\npairs involved in fractional revival overlapped were known; we give examples of\nsuch graphs as well.\n']","[('quantum walks graphs', 0.6863824129104614), ('vertices quantum', 0.5901586413383484), ('quantum walks', 0.5730440616607666), ('unitary cayley graphs', 0.5433191061019897), ('quantum state transfer', 0.5362439751625061), ('quantum walk', 0.529325008392334), ('perfect state transfer', 0.5271399617195129), ('transfer quantum', 0.5135959386825562), ('walks graphs', 0.5093940496444702), ('time quantum walks', 0.4943068027496338)]" 303,303,98,303_scheduling_hospital_capacity planning_hospitals,"['scheduling', 'hospital', 'capacity planning', 'hospitals', 'mixed integer programming', 'integer programming', 'appointment', 'queueing', 'routing scheduling', 'schedules']","['Optimal Hospital Capacity Management During Demand Surges Effective hospital capacity management is pivotal for enhancing patient care\nquality, operational efficiency, and healthcare system resilience, notably\nduring demand spikes like those seen in the COVID-19 pandemic. However,\ndevising optimal capacity strategies is complicated by fluctuating demand,\nconflicting objectives, and multifaceted practical constraints. This study\npresents a data-driven framework to optimize capacity management decisions\nwithin hospital systems during surge events. Two key decisions are optimized\nover a tactical planning horizon: allocating dedicated capacity to surge\npatients and transferring incoming patients between emergency departments (EDs)\nof hospitals to better distribute demand. The optimization models are\nformulated as robust mixed-integer linear programs, enabling efficient\ncomputation of optimal decisions that are robust against demand uncertainty.\nThe models incorporate practical constraints and costs, including setup times\nand costs for adding surge capacity, restrictions on ED patient transfers, and\nrelative costs of different decisions that reflect impacts on care quality and\noperational efficiency. The methodology is evaluated retrospectively in a\nhospital system during the height of the COVID-19 pandemic to demonstrate the\npotential impact of the recommended decisions. The results show that optimally\nallocating beds and transferring just 32 patients over a 63 day period around\nthe peak, about one transfer every two days, could have reduced the need for\nsurge capacity in the hospital system by nearly 90%. Overall, this work\nintroduces a practical tool to transform capacity management decision-making,\nenabling proactive planning and the use of data-driven recommendations to\nimprove outcomes.\n', 'Integrated patient-to-room and nurse-to-patient assignment in hospital\n wards Assigning patients to rooms and nurses to patients are critical tasks within\nhospitals that directly affect patient and staff satisfaction, quality of care,\nand hospital efficiency. Both patient-to-room assignments and nurse-to-patient\nassignments are typically agreed upon at the ward level, and they interact in\nseveral ways such as jointly determining the walking distances nurses must\ncover between different patient rooms. This motivates to consider both problems\njointly in an integrated fashion.\n This paper presents the first optimization models and algorithms for the\nintegrated patient-to-room and nurse-to-patient assignment problem. We provide\na mixed integer programming formulation of the integrated problem that\nconsiders the typical objectives from the single problems as well as additional\nobjectives that can only be properly evaluated when integrating both problems.\nMoreover, motivated by the inherent complexity that results from integrating\nthese two NP-hard and already computationally challenging problems, we devise\nan efficient heuristic for the integrated patient-to-room and nurse-to-patient\nassignment problem. To evaluate the running time and quality of the solution\nobtained with the heuristic, we conduct extensive computational experiments on\nboth artificial and real-world instances. The artificial instances are\ngenerated by a parameterized instance generator for the integrated problem that\nis made freely available.\n', ""Data-Driven Inpatient Bed Assignment Using the P Model Problem definition: Emergency department (ED) boarding refers to the practice\nof holding patients in the ED after they have been admitted to hospital wards,\nusually resulting from insufficient inpatient resources. Boarded patients may\ncompete with new patients for medical resources in the ED, compromising the\nquality of emergency care. A common expedient for mitigating boarding is\npatient overflowing, i.e., sending patients to beds in other specialties or\naccommodation classes, which may compromise the quality of inpatient care and\nbring on operational challenges. We study inpatient bed assignment to shorten\nboarding times without excessive patient overflowing.\n Methodology: We use a queue with multiple customer classes and multiple\nserver pools to model hospital wards. Exploiting patient flow data from a\nhospital, we propose a computationally tractable approach to formulating the\nbed assignment problem, where the joint probability of all waiting patients\nmeeting their respective delay targets is maximized.\n Results: By dynamically adjusting the overflow rate, the proposed approach is\ncapable not only of reducing patients' waiting times, but also of mitigating\nthe time-of-day effect on boarding times. In numerical experiments, our\napproach greatly outperforms both early discharge policies and threshold-based\noverflowing policies, which are commonly used in practice.\n Managerial implications: We provide a practicable approach to solving the bed\nassignment problem. This data-driven approach captures critical features of\npatient flow management, while the resulting optimization problem is\npractically solvable. The proposed approach is a useful tool for the control of\nqueueing systems with time-sensitive service requirements.\n""]","[('scheduling', 0.466738224029541), ('hospital', 0.4311049282550812), ('capacity planning', 0.43044987320899963), ('hospitals', 0.41544780135154724), ('mixed integer programming', 0.39312225580215454), ('integer programming', 0.3897287845611572), ('appointment', 0.38649460673332214), ('queueing', 0.36756908893585205), ('routing scheduling', 0.35588592290878296), ('schedules', 0.3309378921985626)]" 304,304,96,304_fibonacci polynomials_generalized fibonacci_fibonacci numbers_fibonacci lucas,"['fibonacci polynomials', 'generalized fibonacci', 'fibonacci numbers', 'fibonacci lucas', 'fibonacci type', 'fibonacci number', 'lucas sequences', 'fibonacci', 'lucas numbers', 'chebyshev polynomials']","['Irreducibility of generalized Fibonacci polynomials A second order polynomial sequence is of Fibonacci-type $\\mathcal{F}_{n}$\n(Lucas-type $\\mathcal{L}_{n}$) if its Binet formula has a structure similar to\nthat for Fibonacci (Lucas) numbers. Under certain conditions these polynomials\nare irreducible if and only if $n$ is a prime number. For example, the\nFibonacci polynomials, Pell polynomials, Fermat polynomials, Lucas polynomials,\nPell-Lucas polynomials, Fermat-Lucas polynomials are irreducible when $n$ is a\nprime number; and Chebyshev polynomials (second kind), Morgan-Voyce polynomials\n(Fibonacci type), and Vieta polynomials are reducible when $n$ is a prime\nnumber.\n In this paper we give some theorems to determine whether the Fibonacci type\npolynomials and Lucas type polynomials are irreducible when $n$ is prime.\n', 'New binomial Fibonacci sums We present some new linear, quadratic, cubic and quartic binomial Fibonacci,\nLucas and Fibonacci--Lucas summation identities.\n', 'Identities and Generating Functions of Products of Generalized Fibonacci\n numbers, Catalan and Harmonic Numbers We considered the properties of generalized Fibonacci and Lucas numbers\nclass. The analogues of well-known Fibonacci identities for generalized numbers\nare obtained. We gained a new identity of product convolution of generalized\nFibonacci and Lucas numbers. We wrote down generating functions of generalized\nFibonacci and Lucas numbers products, their multisections, harmonic numbers and\nCatalan numbers.\n']","[('fibonacci polynomials', 0.7284879684448242), ('generalized fibonacci', 0.6838634610176086), ('fibonacci numbers', 0.6587858200073242), ('fibonacci lucas', 0.6554457545280457), ('fibonacci type', 0.6426297426223755), ('fibonacci number', 0.6069853901863098), ('lucas sequences', 0.599733829498291), ('fibonacci', 0.5867537260055542), ('lucas numbers', 0.5669703483581543), ('chebyshev polynomials', 0.48506060242652893)]" 305,305,96,305_free sequences_sequences length_sequences maximal_mathbb z_n,"['free sequences', 'sequences length', 'sequences maximal', 'mathbb z_n', 'sequence elements', 'weighted zero', 'zero sum', 'a_1 ldots a_n', 'subsequence length', 'sequence length']","['Zero-sum constants related to the Jacobi symbol For $A\\subseteq\\mathbb Z_n$, the $A$-weighted Gao constant $E_A(n)$ is\ndefined to be the smallest natural number $k$ such that any sequence of $k$\nelements in $\\mathbb Z_n$ has a subsequence of length $n$ whose $A$-weighted\nsum is zero. When $A$ is the set of all units in $\\mathbb Z_n$, we determine\nthe value of $E_A(n)$ and values of two related constants $C_A(n)$ and\n$D_A(n)$. We also characterize all sequences of length $E_A(n)-1$ in $\\mathbb\nZ_n$ which do not have any $A$-weighted zero-sum subsequence of length $n$ when\n$n$ is a power of 2.\n', 'Square-weighted zero-sum constants Let $A\\subseteq \\mathbb Z_n$ be a subset. A sequence $S=(x_1,\\ldots,x_k)$ in\n$\\mathbb Z_n$ is said to be an $A$-weighted zero-sum sequence if there exist\n$a_1,\\ldots,a_k\\in A$ such that $a_1x_1+\\cdots+a_kx_k=0$. By a square, we shall\nmean a non-zero square in $\\mathbb Z_n$. We determine the smallest natural\nnumber $k$, such that every sequence in $\\mathbb Z_n$ whose length is $k$, has\na square-weighted zero-sum subsequence. We also determine the smallest natural\nnumber $k$, such that every sequence in $\\mathbb Z_n$ whose length is $k$, has\na square-weighted zero-sum subsequence whose terms are consecutive terms of the\ngiven sequence.\n', 'Smooth weighted zero-sum constants Let $A\\subseteq\\mathbb Z_n$ be a weight-set and $S=(x_1,x_2,\\ldots, x_k)$ be\na sequence in $\\mathbb Z_n$. We say that $S$ is a smooth $A$-weighted zero-sum\nsequence if there exists $(a_1,\\ldots,a_k)\\in A^k$ such that we have\n$a_1x_1+\\cdots+a_kx_k=0$ and $a_1+\\cdots+a_k=0$. It is easy to see that if $S$\nis a smooth $A$-weighted zero-sum sequence, then for every $y\\in \\mathbb Z_n$\nthe sequence $S+y=(x_1+y,\\ldots,x_k+y)$ is also a smooth $A$-weighted zero-sum\nsequence. From the well known EGZ-theorem it follows that if $S$ has length at\nleast $2n-1$, then $S$ has a smooth $A$-weighted zero-sum subsequence of length\n$n$. The constant $\\bar E_A$ is defined to be the smallest positive integer $k$\nsuch that any sequence of length $k$ in $\\mathbb Z_n$ has a smooth $A$-weighted\nzero-sum subsequence of length $n$. A sequence in $\\mathbb Z_n$ of length $\\bar\nE_A-1$ which does not have any smooth $A$-weighted zero-sum subsequence of\nlength $n$ is called an $\\bar E$-extremal sequence for $A$. For every $n$ we\nconsider the weight-sets $\\{1\\}$ and $\\mathbb Z_n\\setminus\\{0\\}$. When $n$ is\nan odd prime $p$ we consider the weight-set $Q_p$ of all non-zero quadratic\nresidues. We also study the related constants $\\bar C_A$ and $\\bar D_A$.\n']","[('free sequences', 0.41678935289382935), ('sequences length', 0.39781123399734497), ('sequences maximal', 0.3959481716156006), ('mathbb z_n', 0.38152530789375305), ('sequence elements', 0.3752725422382355), ('weighted zero', 0.3751172125339508), ('zero sum', 0.3673713803291321), ('a_1 ldots a_n', 0.3669999837875366), ('subsequence length', 0.36319249868392944), ('sequence length', 0.3525412380695343)]" 306,306,96,306_gorenstein projective modules_gorenstein algebras_gorenstein algebra_modules gorenstein,"['gorenstein projective modules', 'gorenstein algebras', 'gorenstein algebra', 'modules gorenstein', 'gorenstein projective', 'gorenstein projective dimension', 'higher auslander algebras', 'auslander algebras', 'projective modules', 'nakayama algebras']","['From Gorenstein derived equivalences to stable functors of Gorenstein\n projective modules In the paper, we mainly connect the Gorenstein derived equivalence and stable\nfunctors of Gorenstein projective modules. Specially, we prove that a\nGorenstein derived equivalence between CM-finite algebras A and B can induce a\nstable functor between the factor categories A-mod/A-Gproj and B-mod\\B-Gproj.\nFurthermore, the above stable functor is an equivalence when A and B are\nGorenstein.\n', 'Monic modules and semi-Gorenstein-projective modules The category ${\\rm gp}(\\Lambda)$ of Gorenstein-projective modules over tensor\nalgebra $\\Lambda = A\\otimes_kB$ can be described as the monomorphism category\n${\\rm mon}(B, {\\rm gp}(A))$ of $B$ over ${\\rm gp}(A)$. In particular,\nGorenstein-projective $\\Lambda$-modules are monic. In this paper, we find the\nsimilar relation between semi-Gorenstein-projective $\\Lambda$-modules and\n$A$-modules, via monic modules, namely, ${\\rm mon}(B, \\ ^\\perp A) = {\\rm\nmon}(B, A)\\cap \\ ^\\perp \\Lambda.$ Using this, it is proved that if $A$ is\nweakly Gorenstein, then $\\Lambda$ is weakly Gorenstein if and only each\nsemi-Gorenstein-projective $\\Lambda$-modules are monic; and that if $B = kQ$\nwith $Q$ a finite acyclic quiver, then $\\Lambda$ is weakly Gorenstein if and\nonly if $A$ is weakly Gorenstein. However, this relation itself does not answer\nthe question whether there exist double semi-Gorenstein-projective\n$\\Lambda$-modules which are not monic. Using the recent discovered examples of\ndouble semi-Gorenstein-projective $A$-modules which are not torsionless, we\npositively answer this question, by explicitly constructing a class of double\nsemi-Gorenstein-projective $T_2(A)$-modules with one parameter such that they\nare not monic, and hence not torsionless. The corresponding results are\nobtained also for the monic modules and semi-Gorenstein-projective modules over\nthe triangular matrix algebras given by bimodules.\n', 'Invariants and Gorenstein projective modules Invariants with respect to recollements of the stable category of Gorenstein\nprojective A-modules over an algebra A and stable equivalences are\ninvestigated. Specifically, the Gorenstein rigidity dimension is introduced. It\nis shown that the Gorenstein rigidity dimension is invariant with respect to\nboth Morita equivalences and the stable equivalences of Gorenstein projective\nmodules. As a consequence, the Gorenstein rigidity dimension is shown the\ninvariant of derived equivalences. The Gorenstein rigidity dimension is\ncompared along the recollements of the stable category of Gorenstein projective\nmodules. Moreover, the bounds of Gorenstein rigidity dimension is given for\nseveral classes of algebras, respectively.\n']","[('gorenstein projective modules', 0.7890381217002869), ('gorenstein algebras', 0.7784405946731567), ('gorenstein algebra', 0.7400009632110596), ('modules gorenstein', 0.7106363773345947), ('gorenstein projective', 0.6988552212715149), ('gorenstein projective dimension', 0.696379542350769), ('higher auslander algebras', 0.6040723323822021), ('auslander algebras', 0.5966385006904602), ('projective modules', 0.5523259043693542), ('nakayama algebras', 0.5340820550918579)]" 307,307,96,307_quantum communication_entanglement assisted_communication quantum_entanglement assistance,"['quantum communication', 'entanglement assisted', 'communication quantum', 'entanglement assistance', 'quantum channel', 'quantum channels', 'shared entanglement', 'entanglement', 'quantum entanglement', 'entanglement can']","[""Permutation Enhances Classical Communication Assisted by Entangled\n States We give a capacity formula for the classical communication over a noisy\nquantum channel, when local operations and global permutations allowed in the\nencoding and bipartite states preshared between the sender and the receiver.\nThe two endpoints of this formula are the Holevo capacity (without entanglement\nassistance) and the entanglement-assisted capacity (with unlimited entanglement\nassistance). What's more, we show that the capacity satisfies the strong\nconverse property and thus the formula serves as a sharp dividing line between\nachievable and unachievable rates of communication. We prove that the\ndifference between the assisted capacity and the Holevo capacity is upper\nbounded by the discord of formation of the preshared state. As examples, we\nderive analytically the classical capacity of various quantum channels of\ninterests. Our result witnesses the power of random permutation in classical\ncommunication, whenever entanglement assistance is available.\n"", 'Entanglement-assisted capacity regions and protocol designs for quantum\n multiple-access channels We solve the entanglement-assisted (EA) classical capacity region of quantum\nmultiple-access channels with an arbitrary number of senders. As an example, we\nconsider the bosonic thermal-loss multiple-access channel and solve the\none-shot capacity region enabled by an entanglement source composed of\nsender-receiver pairwise two-mode squeezed vacuum states. The EA capacity\nregion is strictly larger than the capacity region without\nentanglement-assistance. With two-mode squeezed vacuum states as the source and\nphase modulation as the encoding, we also design practical receiver protocols\nto realize the entanglement advantages. Four practical receiver designs, based\non optical parametric amplifiers, are given and analyzed. In the parameter\nregion of a large noise background, the receivers can enable a simultaneous\nrate advantage of 82.0% for each sender. Due to teleportation and superdense\ncoding, our results for EA classical communication can be directly extended to\nEA quantum communication at half of the rates. Our work provides a unique and\npractical network communication scenario where entanglement can be beneficial.\n', 'Communication with Unreliable Entanglement Assistance Entanglement resources can increase transmission rates substantially.\nUnfortunately, entanglement is a fragile resource that is quickly degraded by\ndecoherence effects. In order to generate entanglement for optical\ncommunication, the transmitter and the receiver first prepare entangled\nspin-photon pairs locally, and then the photon at the transmitter is sent to\nthe receiver through an optical fiber or free space. Without feedback, the\ntransmitter does not know whether the entangled photon has reached the\nreceiver. The present work introduces a new model of unreliable entanglement\nassistance, whereby the communication system operates whether entanglement\nassistance is present or not. While the sender is ignorant, the receiver knows\nwhether the entanglement generation was successful. In the case of a failure,\nthe receiver decodes less information. In this manner, the effective\ntransmission rate is adapted according to the assistance status. Regularized\nformulas are derived for the classical and quantum capacity regions with\nunreliable entanglement assistance, characterizing the tradeoff between the\nunassisted rate and the excess rate that can be obtained from entanglement\nassistance. It is further established that time division between\nentanglement-assisted and unassisted coding strategies is optimal for the\nnoiseless qubit channel, but can be strictly suboptimal for a noisy channel.\n']","[('quantum communication', 0.6435990929603577), ('entanglement assisted', 0.6413981318473816), ('communication quantum', 0.6365482211112976), ('entanglement assistance', 0.6326714158058167), ('quantum channel', 0.6262831091880798), ('quantum channels', 0.623734176158905), ('shared entanglement', 0.6053441762924194), ('entanglement', 0.5988942384719849), ('quantum entanglement', 0.5929568409919739), ('entanglement can', 0.5852760672569275)]" 308,308,96,308_fractional derivatives_riemann liouville fractional_caputo fractional derivatives_fractional derivative,"['fractional derivatives', 'riemann liouville fractional', 'caputo fractional derivatives', 'fractional derivative', 'fractional differential', 'fractional integrals', 'fractional operators', 'linear fractional differential', 'liouville fractional', 'fractional differential equations']","['Fractional derivatives and the fundamental theorem of Fractional\n Calculus In this paper, we address the one-parameter families of the fractional\nintegrals and derivatives defined on a finite interval. First we remind the\nreader of the known fact that under some reasonable conditions, there exists\nprecisely one unique family of the fractional integrals, namely, the well-known\nRiemann-Liouville fractional integrals. As to the fractional derivatives, their\nnatural definition follows from the fundamental theorem of the Fractional\nCalculus, i.e., they are introduced as the left-inverse operators to the\nRiemann-Liouville fractional integrals. Until now, three families of such\nderivatives were suggested in the literature: the Riemann-Liouville fractional\nderivatives, the Caputo fractional derivatives, and the Hilfer fractional\nderivatives. We clarify the interconnections between these derivatives on\ndifferent spaces of functions and provide some of their properties including\nthe formulas for their projectors and the Laplace transforms. However, it turns\nout that there exist infinitely many other families of the fractional\nderivatives that are the left-inverse operators to the Riemann-Liouville\nfractional integrals. In this paper, we focus on an important class of these\nfractional derivatives and discuss some of their properties.\n', 'The 1st Level General Fractional Derivatives and some of their\n Properties In this paper, we first provide a short summary of the main properties of the\nso-called general fractional derivatives with the Sonin kernels introduced so\nfar. These are integro-differential operators defined as compositions of the\nfirst order derivative and an integral operator of convolution type. Depending\non succession of these operators, the general fractional derivatives of the\nRiemann-Liouville and of the Caputo types were defined and studied. The main\nobjective of this paper is a construction of the 1st level general fractional\nderivatives that comprise both the general fractional derivative of the\nRiemann-Liouville type and the general fractional derivative of the Caputo\ntype. We also provide some of their properties including the 1st and the 2nd\nfundamental theorems of Fractional Calculus for these derivatives and the\nsuitably defined general fractional integrals.\n', 'Special Functions of Fractional Calculus in Form of Convolution Series\n and their Applications In this paper, we first discuss the convolution series that are generated by\nthe Sonine kernels from a class of functions continuous on the real positive\nsemi-axis that have an integrable singularity of power function type at the\npoint zero. These convolution series are closely related to the general\nfractional integrals and derivatives with the Sonine kernels and represent a\nnew class of the special functions of Fractional Calculus. The Mittag-Leffler\nfunctions as solutions to the fractional differential equations with the\nfractional derivatives of both Riemann-Liouville and Caputo types are\nparticular cases of the convolution series generated by the Sonine kernel\n$\\kappa(t) = t^{\\alpha -1}/\\Gamma(\\alpha),\\ 0<\\alpha <1$. The main result of\nthe paper is derivation of analytic solutions to the single- and multi-term\nfractional differential equations with the general fractional derivatives of\nthe Riemann-Liouville type that were not yet considered in the Fractional\nCalculus publications.\n']","[('fractional derivatives', 0.7290586233139038), ('riemann liouville fractional', 0.7158215641975403), ('caputo fractional derivatives', 0.7091243267059326), ('fractional derivative', 0.6943056583404541), ('fractional differential', 0.686689555644989), ('fractional integrals', 0.6744641661643982), ('fractional operators', 0.6554487943649292), ('linear fractional differential', 0.6494179368019104), ('liouville fractional', 0.6335816383361816), ('fractional differential equations', 0.6291098594665527)]" 309,309,96,309_collatz conjecture_collatz_conjecture also known_conjecture presented,"['collatz conjecture', 'collatz', 'conjecture also known', 'conjecture presented', 'conjecture', 'conjecture states', 'mathcal sequence', 'conjecture equivalent', 'sequences', 'conjecture true']","['A Collatz Conjecture Proof We represent the generalized Collatz function with the recursive ruler\nfunction r(2n) = r(n) + 1 and r(2n + 1) = 1. We generate even-only and odd-only\nCollatz subsequences that contain significantly fewer elements term by term, to\n2 and 1, respectively, than are present in the original 3n + 1 and the\nTerras-modified Collatz sequences. We show that a nonlinear, coupled system of\ndifference equations yields a complete acyclic (except for the trivial cycle)\nCollatz tree in odds not divisible by 3 with root vertex 1. We construct a\ncomplete Collatz tree with the axiom of choice and prove the Collatz\nconjecture.\n', 'Collatz Conjecture: Patterns Within Collatz Conjecture sequences increase and decrease in seemingly random\nfashion. By identifying and analyzing the forms of numbers, we discover that\nCollatz sequences are governed by very specific, well-defined rules, which we\ncall cascades.\n', 'Proof of the Collatz Conjecture by Collatz Graph The 3n+1 problem, or Collatz problem, is an extremely simple to state,\nextremely hard to solve, problem. A number of Collatz graphs have been\npresented to visualize the Collatz sequences. The Collatz graph is grown by\nconsidering the bottom-up method with the inverse relation. If n is the Collatz\nfunctional value of m, then n is connected by m. The concept is simple, the\ntree-based graphs indeed provide a path starting from n down to the root, the\nnumber of 1, for a given seed n, and demonstrate the generated Collatz\nsequences eventually converges to 1. However, as a general case, due to the\nirregular structures, no one has yet proved the completeness of the Collatz\ngraphs. By completeness we mean that the Collatz graph contains all positive\nintegers n. This paper proves the Collatz conjecture by constructing a Collatz\ngraph with the regular structure. The developed Collatz graph consists of\nCollatz nodes located various levels of the graph. In the developed graph, each\nnode consists of all positive integers m which have the functional value n. A\nset of simple, yet efficient connection rules is also developed to construct\nthe graph. Results show that the developed Collatz graph generates the Collatz\ntrajectories for all positive integers and the sequences converge to 1. This\nproves the completeness of the developed Collatz graph and Collatz conjecture.\n']","[('collatz conjecture', 0.8326124548912048), ('collatz', 0.5569911003112793), ('conjecture also known', 0.49604108929634094), ('conjecture presented', 0.4850326478481293), ('conjecture', 0.48206865787506104), ('conjecture states', 0.45909860730171204), ('mathcal sequence', 0.44605714082717896), ('conjecture equivalent', 0.444582998752594), ('sequences', 0.4274364113807678), ('conjecture true', 0.41882064938545227)]" 310,310,96,310_cellular automata_linear cellular automata_cellular automata ca_cellular automaton,"['cellular automata', 'linear cellular automata', 'cellular automata ca', 'cellular automaton', 'automata', 'automata ca', 'dimensional cellular', 'construct cellular', 'linear cellular', 'automaton']","['One-dimensional cellular automata with a unique active transition A one-dimensional cellular automaton $\\tau : A^\\mathbb{Z} \\to A^\\mathbb{Z}$\nis a transformation of the full shift defined via a finite neighborhood $S\n\\subset \\mathbb{Z}$ and a local function $\\mu : A^S \\to A$. We study the family\nof cellular automata whose finite neighborhood $S$ is an interval containing\n$0$, and there exists a pattern $p \\in A^S$ satisfying that $\\mu(z) = z(0)$ if\nand only if $z \\neq p$; this means that these cellular automata have a unique\n\\emph{active transition}. Despite its simplicity, this family presents\ninteresting and subtle problems, as the behavior of the cellular automaton\ncompletely depends on the structure of $p$. We show that every cellular\nautomaton $\\tau$ with a unique active transition $p \\in A^S$ is either\nidempotent or strictly almost equicontinuous, and we completely characterize\neach one of these situations in terms of $p$. In essence, the idempotence of\n$\\tau$ depends on the existence of a certain subpattern of $p$ with a\ntranslational symmetry.\n', 'On Cellular Automata Cellular automata are a fundamental computational model with applications in\nmathematics, computer science, and physics. In this work, we explore the study\nof cellular automata to cases where the universe is a group, introducing the\nconcept of \\( \\phi \\)-cellular automata. We establish new theoretical results,\nincluding a generalized Uniform Curtis-Hedlund Theorem and linear \\( \\phi\n\\)-cellular automata. Additionally, we define the covering map for \\( \\phi\n\\)-cellular automata and investigate its properties. Specifically, we derive\nresults for quotient covers when the universe of the automaton is a circulant\ngraph. This work contributes to the algebraic and topological understanding of\ncellular automata, paving the way for future exploration of different types of\ncovers and their applications to broader classes of graphs and dynamical\nsystems.\n', 'Further results on generalized cellular automata Given a finite set $A$ and a group homomorphism $\\phi : H \\to G$, a\n$\\phi$-cellular automaton is a function $\\mathcal{T} : A^G \\to A^H$ that is\ncontinuous with respect to the prodiscrete topologies and $\\phi$-equivariant in\nthe sense that $h \\cdot \\mathcal{T}(x) = \\mathcal{T}( \\phi(h) \\cdot x)$, for\nall $x \\in A^G, h \\in H$, where $\\cdot$ denotes the shift actions of $G$ and\n$H$ on $A^G$ and $A^H$, respectively. When $G=H$ and $\\phi = \\text{id}$, the\ndefinition of $\\text{id}$-cellular automata coincides with the classical\ndefinition of cellular automata. The purpose of this paper is to expand the\ntheory of $\\phi$-cellular automata by focusing on the differences and\nsimilarities with their classical counterparts. After discussing some basic\nresults, we introduce the following definition: a $\\phi$-cellular automaton\n$\\mathcal{T} : A^G \\to A^H$ has the unique homomorphism property (UHP) if\n$\\mathcal{T}$ is not $\\psi$-equivariant for any group homomorphism $\\psi : H\n\\to G$, $\\psi \\neq \\phi$. We show that if the difference set $\\Delta(\\phi,\n\\psi)$ is infinite, then $\\mathcal{T}$ is not $\\psi$-equivariant; it follows\nthat when $G$ is torsion-free abelian, every non-constant $\\mathcal{T}$ has the\nUHP. Furthermore, inspired by the theory of classical cellular automata, we\nstudy $\\phi$-cellular automata over quotient groups, as well as their\nrestriction and induction to subgroups and supergroups, respectively.\n']","[('cellular automata', 0.7478221654891968), ('linear cellular automata', 0.7425626516342163), ('cellular automata ca', 0.6909613013267517), ('cellular automaton', 0.6475185751914978), ('automata', 0.6195375919342041), ('automata ca', 0.5389252305030823), ('dimensional cellular', 0.4406640827655792), ('construct cellular', 0.44046923518180847), ('linear cellular', 0.4385699927806854), ('automaton', 0.41195911169052124)]" 311,311,95,311_training generative adversarial_generative adversarial networks_adversarial networks gans_networks gans,"['training generative adversarial', 'generative adversarial networks', 'adversarial networks gans', 'networks gans', 'generative adversarial', 'generative adversarial network', 'training generative', 'gans', 'gan', 'gan based']","['A game-theoretic approach for Generative Adversarial Networks Generative adversarial networks (GANs) are a class of generative models,\nknown for producing accurate samples. The key feature of GANs is that there are\ntwo antagonistic neural networks: the generator and the discriminator. The main\nbottleneck for their implementation is that the neural networks are very hard\nto train. One way to improve their performance is to design reliable algorithms\nfor the adversarial process. Since the training can be cast as a stochastic\nNash equilibrium problem, we rewrite it as a variational inequality and\nintroduce an algorithm to compute an approximate solution. Specifically, we\npropose a stochastic relaxed forward-backward algorithm for GANs. We prove that\nwhen the pseudogradient mapping of the game is monotone, we have convergence to\nan exact solution or in a neighbourhood of it.\n', 'MIM-Based GAN: Information Metric to Amplify Small Probability Events\n Importance in Generative Adversarial Networks In terms of Generative Adversarial Networks (GANs), the information metric to\ndiscriminate the generative data from the real data, lies in the key point of\ngeneration efficiency, which plays an important role in GAN-based applications,\nespecially in anomaly detection. As for the original GAN, there exist drawbacks\nfor its hidden information measure based on KL divergence on rare events\ngeneration and training performance for adversarial networks. Therefore, it is\nsignificant to investigate the metrics used in GANs to improve the generation\nability as well as bring gains in the training process. In this paper, we adopt\nthe exponential form, referred from the information measure, i.e. MIM, to\nreplace the logarithm form of the original GAN. This approach is called\nMIM-based GAN, has better performance on networks training and rare events\ngeneration. Specifically, we first discuss the characteristics of training\nprocess in this approach. Moreover, we also analyze its advantages on\ngenerating rare events in theory. In addition, we do simulations on the\ndatasets of MNIST and ODDS to see that the MIM-based GAN achieves\nstate-of-the-art performance on anomaly detection compared with some classical\nGANs.\n', 'Dynamics of Fourier Modes in Torus Generative Adversarial Networks Generative Adversarial Networks (GANs) are powerful Machine Learning models\ncapable of generating fully synthetic samples of a desired phenomenon with a\nhigh resolution. Despite their success, the training process of a GAN is highly\nunstable and typically it is necessary to implement several accessory\nheuristics to the networks to reach an acceptable convergence of the model. In\nthis paper, we introduce a novel method to analyze the convergence and\nstability in the training of Generative Adversarial Networks. For this purpose,\nwe propose to decompose the objective function of the adversary min-max game\ndefining a periodic GAN into its Fourier series. By studying the dynamics of\nthe truncated Fourier series for the continuous Alternating Gradient Descend\nalgorithm, we are able to approximate the real flow and to identify the main\nfeatures of the convergence of the GAN. This approach is confirmed empirically\nby studying the training flow in a $2$-parametric GAN aiming to generate an\nunknown exponential distribution. As byproduct, we show that convergent orbits\nin GANs are small perturbations of periodic orbits so the Nash equillibria are\nspiral attractors. This theoretically justifies the slow and unstable training\nobserved in GANs.\n']","[('training generative adversarial', 0.7054526209831238), ('generative adversarial networks', 0.674027144908905), ('adversarial networks gans', 0.6724812984466553), ('networks gans', 0.6627607941627502), ('generative adversarial', 0.6609774231910706), ('generative adversarial network', 0.6560516357421875), ('training generative', 0.6486801505088806), ('gans', 0.6381857991218567), ('gan', 0.6251876354217529), ('gan based', 0.6041010022163391)]" 312,312,95,312_molecular_based molecular_molecule_molecules,"['molecular', 'based molecular', 'molecule', 'molecules', 'transmitter receiver', 'communication systems', 'signaling', 'communications', 'communication via', 'transmitters']","[""Frequency-Domain Detection for Molecular Communications Molecular Communications (MC) is a bio-inspired communication paradigm which\nuses molecules as information carriers, thereby requiring unconventional\ntransmitter/receiver architectures and modulation/detection techniques.\nPractical MC receivers (MC-Rxs) can be implemented based on field-effect\ntransistor biosensor (bioFET) architectures, where surface receptors reversibly\nreact with ligands, whose concentration encodes the information. The\ntime-varying concentration of ligand-bound receptors is then translated into\nelectrical signals via field-effect, which is used to decode the transmitted\ninformation. However, ligand-receptor interactions do not provide an ideal\nmolecular selectivity, as similar types of ligands, i.e., interferers,\nco-existing in the MC channel can interact with the same type of receptors,\nresulting in cross-talk. Overcoming this molecular cross-talk with time-domain\nsamples of the Rx's electrical output is not always attainable, especially when\nRx has no knowledge of the interferer statistics or it operates near\nsaturation. In this study, we propose a frequency-domain detection (FDD)\ntechnique for bioFET-based MC-Rxs, which exploits the difference in binding\nreaction rates of different types of ligands, reflected to the noise spectrum\nof the ligand-receptor binding fluctuations. We analytically derive the bit\nerror probability (BEP) of the FDD technique, and demonstrate its effectiveness\nin decoding transmitted concentration signals under stochastic molecular\ninterference, in comparison to a widely-used time-domain detection (TDD)\ntechnique. The proposed FDD method can be applied to any biosensor-based\nMC-Rxs, which employ receptor molecules as the channel-Rx interface.\n"", 'Molecular communication networks with general molecular circuit\n receivers In a molecular communication network, transmitters may encode information in\nconcentration or frequency of signalling molecules. When the signalling\nmolecules reach the receivers, they react, via a set of chemical reactions or a\nmolecular circuit, to produce output molecules. The counts of output molecules\nover time is the output signal of the receiver. The aim of this paper is to\ninvestigate the impact of different reaction types on the information\ntransmission capacity of molecular communication networks. We realise this aim\nby using a general molecular circuit model. We derive general expressions of\nmean receiver output, and signal and noise spectra. We use these expressions to\ninvestigate the information transmission capacities of a number of molecular\ncircuits.\n', 'Performance Analysis and ISI Mitigation with Imperfect Transmitter in\n Molecular Communication In molecular communication (MC), molecules are released from the transmitter\nto convey information. This paper considers a realistic molecule shift keying\n(MoSK) scenario with two species of molecule in two reservoirs, where the\nmolecules are harvested from the environment and placed into different\nreservoirs, which are purified by exchanging molecules between the reservoirs.\nThis process consumes energy, and for a reasonable energy cost, the reservoirs\ncannot be pure; thus, our MoSK transmitter is imperfect, releasing mixtures of\nboth molecules for every symbol, resulting in inter-symbol interference (ISI).\nTo mitigate ISI, the properties of the receiver are analyzed and a detection\nmethod based on the ratio of different molecules is proposed. Theoretical and\nsimulation results are provided, showing that with the increase of energy cost,\nthe system achieves better performance. The good performance of the proposed\ndetection scheme is also demonstrated.\n']","[('molecular', 0.41129299998283386), ('based molecular', 0.40879690647125244), ('molecule', 0.39918458461761475), ('molecules', 0.3844543993473053), ('transmitter receiver', 0.3353166878223419), ('communication systems', 0.3315960764884949), ('signaling', 0.33134230971336365), ('communications', 0.3169781565666199), ('communication via', 0.31548890471458435), ('transmitters', 0.31114456057548523)]" 313,313,94,313_virasoro algebras_tensor product modules_irreducible modules_virasoro algebra,"['virasoro algebras', 'tensor product modules', 'irreducible modules', 'virasoro algebra', 'modules irreducible', 'weight modules', 'verma modules', 'modules affine', 'highest weight modules', 'modules twisted']","['A new class of irreducible modules over the affine-Virasoro algebra of\n type $A_1$ In this paper, we construct a class of non-weight modules over the\naffine-Virasoro algebra of type $A_1$ by taking tensor products of a finite\nnumber of irreducible modules $M(\\lambda, \\alpha, \\beta, \\gamma)$ with\nirreducible highest weight modules $V(\\eta, \\epsilon, \\theta)$. We obtain the\nnecessary and sufficient conditions for such tensor product modules to be\nirreducible, and determine the necessary and sufficient conditions for such two\nmodules to be isomorphic. We also compare these modules with other known\nnon-weight modules, showing that these irreducible modules are new.\n', 'Tensor product weight modules for the mirror-twisted Heisenberg-Virasoro\n algebra In this paper, we study irreducible weight modules with infinite dimensional\nweight spaces over the mirror-twisted Heisenberg-Virasoro algebra\n$\\mathcal{D}$. More precisely, the necessary and sufficient conditions for the\ntensor products of irreducible highest weight modules and irreducible modules\nof intermediates series over $\\mathcal{D}$ to be irreducible are determined by\nusing ""shifting technique"". This leads to a family of new irreducible weight\nmodules over $\\mathcal{D}$. Then we obtain that any two such tensor products\nare isomorphic if and only if the corresponding highest weight modules and\nmodules of intermediate series are isomorphic respectively. Also we discuss\nsubmodules of the tensor product module when it is not irreducible.\n', 'Tensor product weight modules over the affine-Virasoro algebra In this paper, we study the tensor products of irreducible highest weight\nmodules with irreducible loop modules over the affine-Virasoro algebra with aid\nof the ``shifting technique"" established for the Virasoro algebra in [H. Chen,\nX. Guo, K. Zhao, Tensor product weight modules over the Virasoro algebra, J.\nLond. Math. Soc. 88(2013), 829-844.]. All such tensor product modules are\nindecomposable modules with infinite-dimensional weight spaces. Moreover, we\nobtain the necessary and sufficient conditions for such tensor product modules\nto be irreducible. Therefore, we obtain a class of new irreducible weight\nmodules over the affine-Virasoro algebra. Finally, the necessary and sufficient\nconditions for any two such tensor product modules to be isomorphic are also\ndetermined.\n']","[('virasoro algebras', 0.6546501517295837), ('tensor product modules', 0.6183584332466125), ('irreducible modules', 0.6020403504371643), ('virasoro algebra', 0.5959154367446899), ('modules irreducible', 0.589033842086792), ('weight modules', 0.5601736903190613), ('verma modules', 0.5566099882125854), ('modules affine', 0.554084062576294), ('highest weight modules', 0.5498604774475098), ('modules twisted', 0.5277564525604248)]" 314,314,94,314_graphs metric_graph metric_dimension graphs_dimension graph,"['graphs metric', 'graph metric', 'dimension graphs', 'dimension graph', 'dimension vertex', 'metric dimension', 'dimension edge', 'dimension metric', 'metric dimensions', 'edge metric']","['Fault tolerance for metric dimension and its variants Hernando et al. (2008) introduced the fault-tolerant metric dimension\n$\\text{ftdim}(G)$, which is the size of the smallest resolving set $S$ of a\ngraph $G$ such that $S-\\left\\{s\\right\\}$ is also a resolving set of $G$ for\nevery $s \\in S$. They found an upper bound $\\text{ftdim}(G) \\le \\dim(G) (1+2\n\\cdot 5^{\\dim(G)-1})$, where $\\dim(G)$ denotes the standard metric dimension of\n$G$. It was unknown whether there exists a family of graphs where\n$\\text{ftdim}(G)$ grows exponentially in terms of $\\dim(G)$, until recently\nwhen Knor et al. (2024) found a family with $\\text{ftdim}(G) =\n\\dim(G)+2^{\\dim(G)-1}$ for any possible value of $\\dim(G)$. We improve the\nupper bound on fault-tolerant metric dimension by showing that $\\text{ftdim}(G)\n\\le \\dim(G)(1+3^{\\dim(G)-1})$ for every connected graph $G$. Moreover, we find\nan infinite family of connected graphs $J_k$ such that $\\dim(J_k) = k$ and\n$\\text{ftdim}(J_k) \\ge 3^{k-1}-k-1$ for each positive integer $k$. Together,\nour results show that \\[\\lim_{k \\rightarrow \\infty} \\left( \\max_{G: \\text{ }\n\\dim(G) = k} \\frac{\\log_3(\\text{ftdim}(G))}{k} \\right) = 1.\\] In addition, we\nconsider the fault-tolerant edge metric dimension $\\text{ftedim}(G)$ and bound\nit with respect to the edge metric dimension $\\text{edim}(G)$, showing that\n\\[\\lim_{k \\rightarrow \\infty} \\left( \\max_{G: \\text{ } \\text{edim}(G) = k}\n\\frac{\\log_2(\\text{ftedim}(G))}{k} \\right) = 1.\\] We also obtain sharp extremal\nbounds on fault-tolerance for adjacency dimension and $k$-truncated metric\ndimension. Furthermore, we obtain sharp bounds for some other extremal problems\nabout metric dimension and its variants. In particular, we prove an equivalence\nbetween an extremal problem about edge metric dimension and an open problem of\nErd\\H{o}s and Kleitman (1974) in extremal set theory.\n', 'Extremal results for graphs of bounded metric dimension Metric dimension is a graph parameter motivated by problems in robot\nnavigation, drug design, and image processing. In this paper, we answer several\nopen extremal problems on metric dimension and pattern avoidance in graphs from\n(Geneson, Metric dimension and pattern avoidance, Discrete Appl. Math. 284,\n2020, 1-7). Specifically, we construct a new family of graphs that allows us to\ndetermine the maximum possible degree of a graph of metric dimension at most\n$k$, the maximum possible degeneracy of a graph of metric dimension at most\n$k$, the maximum possible chromatic number of a graph of metric dimension at\nmost $k$, and the maximum $n$ for which there exists a graph of metric\ndimension at most $k$ that contains $K_{n, n}$.\n We also investigate a variant of metric dimension called edge metric\ndimension and solve another problem from the same paper for $n$ sufficiently\nlarge by showing that the edge metric dimension of $P_n^{d}$ is $d$ for $n \\geq\nd^{d-1}$. In addition, we use a probabilistic argument to make progress on\nanother open problem from the same paper by showing that the maximum possible\nclique number of a graph of edge metric dimension at most $k$ is\n$2^{\\Theta(k)}$. We also make progress on a problem from (N. Zubrilina, On the\nedge dimension of a graph, Discrete Math. 341, 2018, 2083-2088) by finding a\nfamily of new triples $(x, y, n)$ for which there exists a graph of metric\ndimension $x$, edge metric dimension $y$, and order $n$. In particular, we show\nthat for each integer $k > 0$, there exist graphs $G$ with metric dimension\n$k$, edge metric dimension $3^k(1-o(1))$, and order $3^k(1+o(1))$.\n', 'Graphs with the edge metric dimension smaller than the metric dimension Given a connected graph $G$, the metric (resp. edge metric) dimension of $G$\nis the cardinality of the smallest ordered set of vertices that uniquely\nidentifies every pair of distinct vertices (resp. edges) of $G$ by means of\ndistance vectors to such a set. In this work, we settle three open problems on\n(edge) metric dimension of graphs. Specifically, we show that for every $r,t\\ge\n2$ with $r\\ne t$, there is $n_0$, such that for every $n\\ge n_0$ there exists a\ngraph $G$ of order $n$ with metric dimension $r$ and edge metric dimension $t$,\nwhich among other consequences, shows the existence of infinitely many graph\nwhose edge metric dimension is strictly smaller than its metric dimension. In\naddition, we also prove that it is not possible to bound the edge metric\ndimension of a graph $G$ by some constant factor of the metric dimension of\n$G$.\n']","[('graphs metric', 0.7215189933776855), ('graph metric', 0.6776668429374695), ('dimension graphs', 0.665395975112915), ('dimension graph', 0.6337288022041321), ('dimension vertex', 0.594786524772644), ('metric dimension', 0.5883110761642456), ('dimension edge', 0.5791905522346497), ('dimension metric', 0.577264666557312), ('metric dimensions', 0.5733900666236877), ('edge metric', 0.5605775713920593)]" 315,315,93,315_fairness metrics_fairness constraints_algorithmic fairness_fairness measures,"['fairness metrics', 'fairness constraints', 'algorithmic fairness', 'fairness measures', 'group fairness', 'ensuring fairness', 'fairness aware', 'optimal fair', 'discriminatory', 'discrimination']","['InfoFair: Information-Theoretic Intersectional Fairness Algorithmic fairness is becoming increasingly important in data mining and\nmachine learning. Among others, a foundational notation is group fairness. The\nvast majority of the existing works on group fairness, with a few exceptions,\nprimarily focus on debiasing with respect to a single sensitive attribute,\ndespite the fact that the co-existence of multiple sensitive attributes (e.g.,\ngender, race, marital status, etc.) in the real-world is commonplace. As such,\nmethods that can ensure a fair learning outcome with respect to all sensitive\nattributes of concern simultaneously need to be developed. In this paper, we\nstudy the problem of information-theoretic intersectional fairness (InfoFair),\nwhere statistical parity, a representative group fairness measure, is\nguaranteed among demographic groups formed by multiple sensitive attributes of\ninterest. We formulate it as a mutual information minimization problem and\npropose a generic end-to-end algorithmic framework to solve it. The key idea is\nto leverage a variational representation of mutual information, which considers\nthe variational distribution between learning outcomes and sensitive\nattributes, as well as the density ratio between the variational and the\noriginal distributions. Our proposed framework is generalizable to many\ndifferent settings, including other statistical notions of fairness, and could\nhandle any type of learning task equipped with a gradient-based optimizer.\nEmpirical evaluations in the fair classification task on three real-world\ndatasets demonstrate that our proposed framework can effectively debias the\nclassification results with minimal impact to the classification accuracy.\n', ""Distributionally Fair Stochastic Optimization using Wasserstein Distance A traditional stochastic program under a finite population typically seeks to\noptimize efficiency by maximizing the expected profits or minimizing the\nexpected costs, subject to a set of constraints. However, implementing such\noptimization-based decisions can have varying impacts on individuals, and when\nassessed using the individuals' utility functions, these impacts may differ\nsubstantially across demographic groups delineated by sensitive attributes,\nsuch as gender, race, age, and socioeconomic status. As each group comprises\nmultiple individuals, a common remedy is to enforce group fairness, which\nnecessitates the measurement of disparities in the distributions of utilities\nacross different groups. This paper introduces the concept of Distributionally\nFair Stochastic Optimization (DFSO) based on the Wasserstein fairness measure.\nThe DFSO aims to minimize distributional disparities among groups, quantified\nby the Wasserstein distance, while adhering to an acceptable level of\ninefficiency. Our analysis reveals that: (i) the Wasserstein fairness measure\nrecovers the demographic parity fairness prevalent in binary classification\nliterature; (ii) this measure can approximate the well-known Kolmogorov-Smirnov\nfairness measure with considerable accuracy; and (iii) despite DFSO's biconvex\nnature, the epigraph of the Wasserstein fairness measure is generally\nMixed-Integer Convex Programming Representable (MICP-R). Additionally, we\nintroduce two distinct lower bounds for the Wasserstein fairness measure: the\nJensen bound, applicable to the general Wasserstein fairness measure, and the\nGelbrich bound, specific to the type-2 Wasserstein fairness measure. We\nestablish the exactness of the Gelbrich bound and quantify the theoretical\ndifference between the Wasserstein fairness measure and the Gelbrich bound.\n"", 'On the (In)Compatibility between Group Fairness and Individual Fairness We study the compatibility between the optimal statistical parity solutions\nand individual fairness. While individual fairness seeks to treat similar\nindividuals similarly, optimal statistical parity aims to provide similar\ntreatment to individuals who share relative similarity within their respective\nsensitive groups. The two fairness perspectives, while both desirable from a\nfairness perspective, often come into conflict in applications. Our goal in\nthis work is to analyze the existence of this conflict and its potential\nsolution. In particular, we establish sufficient (sharp) conditions for the\ncompatibility between the optimal (post-processing) statistical parity $L^2$\nlearning and the ($K$-Lipschitz or $(\\epsilon,\\delta)$) individual fairness\nrequirements. Furthermore, when there exists a conflict between the two, we\nfirst relax the former to the Pareto frontier (or equivalently the optimal\ntrade-off) between $L^2$ error and statistical disparity, and then analyze the\ncompatibility between the frontier and the individual fairness requirements.\nOur analysis identifies regions along the Pareto frontier that satisfy\nindividual fairness requirements. (Lastly, we provide individual fairness\nguarantees for the composition of a trained model and the optimal\npost-processing step so that one can determine the compatibility of the\npost-processed model.) This provides practitioners with a valuable approach to\nattain Pareto optimality for statistical parity while adhering to the\nconstraints of individual fairness.\n']","[('fairness metrics', 0.6895659565925598), ('fairness constraints', 0.6779206395149231), ('algorithmic fairness', 0.677497148513794), ('fairness measures', 0.6562469005584717), ('group fairness', 0.616180956363678), ('ensuring fairness', 0.6088709235191345), ('fairness aware', 0.6032359600067139), ('optimal fair', 0.5453528761863708), ('discriminatory', 0.5405285954475403), ('discrimination', 0.5177664756774902)]" 316,316,93,316_quadratic fields_real quadratic fields_binary quadratic forms_quadratic forms,"['quadratic fields', 'real quadratic fields', 'binary quadratic forms', 'quadratic forms', 'integral quadratic forms', 'quadratic field', 'imaginary quadratic fields', 'quartic fields', 'binary quadratic form', 'real number fields']","['Can we recover an integral quadratic form by representing all its\n subforms? Let $\\mathfrak o$ be the ring of integers of a totally real number field. If\n$f$ is a quadratic form over $\\mathfrak o$ and $g$ is another quadratic form\nover $\\mathfrak o$ which represents all proper subforms of $f$, does $g$\nrepresent $f$? We show that if $g$ is indefinite, then $g$ indeed represents\n$f$. However, when $f$ is positive definite and indecomposable, then there\nexists a $g$ which represents all proper subforms of $f$ but not $f$ itself.\nAlong the way we give a new characterization of positive definite decomposable\nquadratic forms over $\\mathfrak o$ and a number-field generalization of the\nfiniteness theorem of representations of quadratic forms by quadratic forms\nover $\\mathbb Z$ which asserts that given any infinite set $\\mathscr S$ of\nclasses of positive definite integral quadratic forms over $\\mathfrak o$ of a\nfixed rank, there exists a finite subset $\\mathscr S_0$ of $\\mathscr S$ with\nthe property that a positive definite quadratic form over $\\mathfrak o$\nrepresents all classes in $\\mathscr S$ if and only if it represents all classes\nin $\\mathscr S_0$.\n', ""On Kitaoka's conjecture and lifting problem for universal quadratic\n forms For a totally positive definite quadratic form over the ring of integers of a\ntotally real number field $K$, we show that there are only finitely many\ntotally real field extensions of $K$ of a fixed degree over which the form is\nuniversal (namely, those that have a short basis in a suitable sense). Along\nthe way we give a general construction of a universal form of rank bounded by\n$D(\\log D)^{d-1}$, where $d$ is the degree of $K$ over $\\mathbb Q$ and $D$ is\nits discriminant. Furthermore, for any fixed degree we prove (weak) Kitaoka's\nconjecture that there are only finitely many totally real number fields with a\nuniversal ternary quadratic form.\n"", 'Lifting problem for universal quadratic forms over totally real cubic\n number fields Lifting problem for universal quadratic forms asks for totally real number\nfields $K$ that admit a positive definite quadratic form with coefficients in\n$\\mathbb{Z}$ that is universal over the ring of integers of $K$. In this paper,\nwe show that $K=\\mathbb{Q}(\\zeta_7+\\zeta_7^{-1})$ is the only such totally real\ncubic field. Moreover, we show that there is no such biquadratic field.\n']","[('quadratic fields', 0.6533887386322021), ('real quadratic fields', 0.648636519908905), ('binary quadratic forms', 0.6357783079147339), ('quadratic forms', 0.6280044317245483), ('integral quadratic forms', 0.6122909784317017), ('quadratic field', 0.5608735084533691), ('imaginary quadratic fields', 0.5448789596557617), ('quartic fields', 0.5257765054702759), ('binary quadratic form', 0.5252548456192017), ('real number fields', 0.5107588171958923)]" 317,317,93,317_nonnegative polynomials_polynomials sums squares_cones symmetric_polynomials sums,"['nonnegative polynomials', 'polynomials sums squares', 'cones symmetric', 'polynomials sums', 'polynomial nonnegative', 'forms sums', 'cone nonnegative', 'squares polynomials', 'symmetric nonnegative', 'polynomial entries']","[""Geometrical Study of the Cone of Sums of Squares plus Sums of\n Nonnegative Circuits In this article, we combine sums of squares (SOS) and sums of nonnegative\ncircuit (SONC) forms, two independent nonnegativity certificates for real\nhomogeneous polynomials. We consider the convex cone SOS+SONC of forms that\ndecompose into a sum of an SOS and a SONC form and study it from a geometric\npoint of view. We show that the SOS+SONC cone is proper and neither closed\nunder multiplications nor under linear transformation of variables. Moreover,\nwe present an alternative proof of an analog of Hilbert's 1888 Theorem for the\nSOS+SONC cone and prove that in the non-Hilbert cases it provides a proper\nsuperset of both the SOS and the SONC cone. This follows by exploiting a new\nnecessary condition for membership in the SONC cone.\n"", 'Moments, Sums of Squares, and Tropicalization We use tropicalization to study the duals to cones of nonnegative polynomials\nand sums of squares on a semialgebraic set $S$. The truncated cones of moments\nof measures supported on the set $S$ is dual to nonnegative polynomials on $S$,\nwhile ""pseudo-moments"" are dual to sums of squares approximations to\nnonnegative polynomials. We provide explicit combinatorial descriptions of\ntropicalizations of the moment and pseudo-moment cones, and demonstrate their\nusefulness in distinguishing between nonnegative polynomials and sums of\nsquares. We give examples that show new limitations of sums of squares\napproximations of nonnegative polynomials. When the semialgebraic set is\ndefined by binomial inequalites, its moment and pseuo-moment cones are closed\nunder Hadamard product. In this case, their tropicalizations are polyhedral\ncones that encode all binomial inequalities on the moment and pseudo-moment\ncones.\n', 'Power mean inequalities and sums of squares For fixed degree and increasing number of variables the dimension of the\nvector space of $n$-variate real symmetric homogeneous polynomials (forms) of\ndegree $d$ stabilizes. We study the limits of the cones of symmetric\nnonnegative polynomials and symmetric sums of squares, when expressed in\npower-mean or monomial-mean basis. These limits correspond to forms with stable\nexpression in power-mean (or monomial-mean) polynomials that are globally\nnonnegative (resp. sums of squares) regardless of the number of variables. We\nintroduce partial symmetry reduction to describe the limit cone of symmetric\nsums of squares, and reprove a result of arXiv:1205.3102v4 that limits of\nsymmetric nonnegative polynomials and sums of squares agree in degree $4$. We\nuse tropicalization of the dual cones, which was first in the context of\ncomparing nonnegative polynomials and sums of squares in arXiv:2203.06291, to\nshow differences between cones of symmetric polynomials and sums of squares\nstarting in degree 6, which disproves a conjecture of arXiv:1205.3102v4. For\neven symmetric nonnegative forms and sums of squares we show that the cones\nagree for degree at most 8, and are different starting with degree 10. We also\nfind, via tropicalization, explicit examples of symmetric forms that are\nnonnegative but not sums of squares in the limit.\n']","[('nonnegative polynomials', 0.5641381144523621), ('polynomials sums squares', 0.5378097295761108), ('cones symmetric', 0.5063253045082092), ('polynomials sums', 0.4994160830974579), ('polynomial nonnegative', 0.4857032299041748), ('forms sums', 0.4834195077419281), ('cone nonnegative', 0.4797287583351135), ('squares polynomials', 0.47333401441574097), ('symmetric nonnegative', 0.44454386830329895), ('polynomial entries', 0.4259450435638428)]" 318,318,93,318_tensors rank_rank tensors_tensor rank_rank tensor,"['tensors rank', 'rank tensors', 'tensor rank', 'rank tensor', 'tensor decompositions', 'tensors', 'symmetric tensors', 'complex tensors', 'order tensors', 'tensors fixed']","[""Symmetrization maps and minimal border rank Comon's conjecture One of the fundamental open problems in the field of tensors is the border\nComon's conjecture: given a symmetric tensor $F\\in(\\mathbb{C}^n)^{\\otimes d}$\nfor $d\\geq 3$, its border and symmetric border ranks are equal. In this paper,\nwe prove the conjecture for large classes of concise tensors in\n$(\\mathbb{C}^n)^{\\otimes d}$ of border rank $n$, i.e., tensors of minimal\nborder rank. These families include all tame tensors and all tensors whenever\n$n\\leq d+1$. Our technical tools are border apolarity and border varieties of\nsums of powers.\n"", 'Border rank bounds for $GL(V)$-invariant tensors arising from matrices\n of constant rank We prove border rank bounds for a class of $GL(V)$-invariant tensors in\n$V^*\\otimes U\\otimes W$, where $U$ and $W$ are $GL(V)$-modules. These tensors\ncorrespond to spaces of matrices of constant rank. In particular we prove lower\nbounds for tensors in $\\mathbb{C}^l\\otimes\\mathbb{C}^m\\otimes\\mathbb{C}^n$ that\nare not $1_A$-generic, where no nontrivial bounds were known, and also when\n$l,m\\ll n$, where previously only bounds for unbalanced matrix multiplication\ntensors were known. We give the first explicit use of Young flattenings for\ntensors beyond Koszul to obtain border rank lower bounds, and determine the\nborder rank of three tensors.\n', 'Rank and border rank of Kronecker powers of tensors and Strassen\'s laser\n method We prove that the border rank of the Kronecker square of the little\nCoppersmith-Winograd tensor $T_{cw,q}$ is the square of its border rank for $q\n> 2$ and that the border rank of its Kronecker cube is the cube of its border\nrank for $q > 4$. This answers questions raised implicitly in\n[Coppersmith-Winograd, 1990] and explicitly in [Bl\\""aser, 2013] and rules out\nthe possibility of proving new upper bounds on the exponent of matrix\nmultiplication using the square or cube of a little Coppersmith-Winograd tensor\nin this range.\n In the positive direction, we enlarge the list of explicit tensors\npotentially useful for Strassen\'s laser method, introducing a skew-symmetric\nversion of the Coppersmith-Winograd tensor, $T_{skewcw,q}$. For $q = 2$, the\nKronecker square of this tensor coincides with the $3\\times 3$ determinant\npolynomial, $\\det_3 \\in \\mathbb{C}^9\\otimes \\mathbb{C}^9\\otimes \\mathbb{C}^9$,\nregarded as a tensor. We show that this tensor could potentially be used to\nshow that the exponent of matrix multiplication is two.\n We determine new upper bounds for the (Waring) rank and the (Waring) border\nrank of $\\det_3$, exhibiting a strict submultiplicative behaviour for\n$T_{skewcw,2}$ which is promising for the laser method.\n We establish general results regarding border ranks of Kronecker powers of\ntensors, and make a detailed study of Kronecker squares of tensors in\n$\\mathbb{C}^3\\otimes \\mathbb{C}^3\\otimes \\mathbb{C}^3$.\n']","[('tensors rank', 0.7055322527885437), ('rank tensors', 0.703319787979126), ('tensor rank', 0.6664263010025024), ('rank tensor', 0.6453588008880615), ('tensor decompositions', 0.6097320318222046), ('tensors', 0.5998878479003906), ('symmetric tensors', 0.593806266784668), ('complex tensors', 0.5879453420639038), ('order tensors', 0.5834587216377258), ('tensors fixed', 0.574429988861084)]" 319,319,93,319_linear network coding_network coding_relay channel_relay networks,"['linear network coding', 'network coding', 'relay channel', 'relay networks', 'relay network', 'relay destination', 'source relay', 'relaying', 'relay node', 'relay']","['Adaptive relaying for streaming erasure codes in a three node relay\n network This paper investigates adaptive streaming codes over a three-node relayed\nnetwork. In this setting, a source node transmits a sequence of message packets\nto a destination through a relay. The source-to-relay and relay-to-destination\nlinks are unreliable and introduce at most $N_1$ and $N_2$ packet erasures,\nrespectively. The destination node must recover each message packet within a\nstrict delay constraint $T$. The paper presents achievable streaming codes for\nall feasible parameters $\\{N_1, N_2, T\\}$ that exploit the fact that the relay\nnaturally observes the erasure pattern occurring in the link from source to\nrelay, thus it can adapt its relaying strategy based on these observations. In\na recent work, Fong et al. provide streaming codes featuring\nchannel-state-independent relaying strategies. The codes proposed in this paper\nachieve rates higher than the ones proposed by Fong et al. whenever $N_2 >\nN_1$, and achieve the same rate when $N_2 = N_1$. The paper also presents an\nupper bound on the achievable rate that takes into account erasures in both\nlinks in order to bound the rate in the second link. The upper bound is shown\nto be tighter than a trivial bound that considers only the erasures in the\nsecond link.\n', 'Rate-Optimal Streaming Codes Over the Three-Node Decode-And-Forward\n Relay Network In this paper, we study the three-node Decode-and-Forward (D&F) relay network\nsubject to random and burst packet erasures. The source wishes to transmit an\ninfinite stream of packets to the destination via the relay. The three-node D&F\nrelay network is constrained by a decoding delay of T packets, i.e., the packet\ntransmitted by the source at time i must be decoded by the destination by time\ni+T. For the individual channels from source to relay and relay to destination,\nwe assume a delay-constrained sliding-window (DCSW) based packet-erasure model\nthat can be viewed as a tractable approximation to the commonly-accepted\nGilbert-Elliot channel model. Under the model, any time-window of width w\ncontains either up to a random erasure or else erasure burst of length at most\nb (>= a). Thus the source-relay and relay-destination channels are modeled as\n(a_1, b_1, w_1, T_1) and (a_2, b_2, w_2, T_2) DCSW channels. We first derive an\nupper bound on the capacity of the three-node D&F relay network. We then show\nthat the upper bound is tight for the parameter regime: max{b_1,\nb_2}|(T-b_1-b_2-max{a_1, a_2}+1), a1=a2 OR b1=b2 by constructing streaming\ncodes achieving the bound. The code construction requires field size linear in\nT, and has decoding complexity equivalent to that of decoding an MDS code.\n', 'Optimal Streaming Erasure Codes over the Three-Node Relay Network This paper investigates low-latency streaming codes for a three-node relay\nnetwork. The source transmits a sequence of messages (streaming messages) to\nthe destination through the relay between them, where the first-hop channel\nfrom the source to the relay and the second-hop channel from the relay to the\ndestination are subject to packet erasures. Every source message must be\nrecovered perfectly at the destination subject to a fixed decoding delay of $T$\ntime slots. In any sliding window of $T+1$ time slots, we assume no more than\n$N_1$ and $N_2$ erasures are introduced by the first-hop channel and second-hop\nchannel respectively. Under this channel loss assumption, we fully characterize\nthe maximum achievable rate in terms of $T$, $N_1$ and $N_2$. The achievability\nis proved by using a symbol-wise decode-forward strategy where the source\nsymbols within the same message are decoded by the relay with different delays.\nThe converse is proved by analyzing the maximum achievable rate for each\nchannel when the erasures in the other channel are consecutive (bursty). In\naddition, we show that traditional message-wise decode-forward strategies,\nwhich require the source symbols within the same message to be decoded by the\nrelay with the same delay, are sub-optimal in general.\n']","[('linear network coding', 0.6157442331314087), ('network coding', 0.6012657284736633), ('relay channel', 0.5795783400535583), ('relay networks', 0.5677434802055359), ('relay network', 0.49182695150375366), ('relay destination', 0.4896363317966461), ('source relay', 0.4849899411201477), ('relaying', 0.47077447175979614), ('relay node', 0.4636051058769226), ('relay', 0.46326473355293274)]" 320,320,92,320_transitive permutation group_primitive permutation group_transitive groups_permutation groups,"['transitive permutation group', 'primitive permutation group', 'transitive groups', 'permutation groups', 'transitive group', 'permutation group', 'primitive permutation', 'transitive permutation', 'primitive groups', 'almost simple groups']","['Fixers and derangements of finite permutation groups Let $G\\leqslant\\mathrm{Sym}(\\Omega)$ be a finite transitive permutation group\nwith point stabiliser $H$. We say that a subgroup $K$ of $G$ is a fixer if\nevery element of $K$ has fixed points, and we say that $K$ is large if $|K|\n\\geqslant |H|$. There is a special interest in studying large fixers due to\nconnections with Erd\\H{o}s-Ko-Rado type problems. In this paper, we classify up\nto conjugacy the large fixers of the almost simple primitive groups with socle\n$\\mathrm{PSL}_2(q)$, and we use this result to verify a special case of a\nconjecture of Spiga on permutation characters. We also present some results on\nlarge fixers of almost simple primitive groups with socle an alternating or\nsporadic group.\n', 'Intersection density of transitive groups with cyclic point stabilizers For a permutation group $G$ acting on a set $V$, a subset $\\mathcal{F}$ of\n$G$ is said to be an intersecting set if for every pair of elements $g,h\\in\n\\mathcal{F}$ there exists $v \\in V$ such that $g(v) = h(v)$. The intersection\ndensity $\\rho(G)$ of a transitive permutation group $G$ is the maximum value of\nthe quotient $|\\mathcal{F}|/|G_v|$ where $G_v$ is a stabilizer of a point $v\\in\nV$ and $\\mathcal{F}$ runs over all intersecting sets in $G$.\n If $G_v$ is a largest intersecting set in $G$ then $G$ is said to have the\nErd\\H{o}s-Ko-Rado (EKR)-property. This paper is devoted to the study of\ntransitive permutation groups, with point stabilizers of prime order with a\nspecial emphasis given to orders 2 and 3, which do not have the EKR-property.\nAmong other, constructions of infinite family of transitive permutation groups\nhaving point stabilizer of order $3$ with intersection density $4/3$ and of\ninfinite families of transitive permutation groups having point stabilizer of\norder $3$ with arbitrarily large intersection density are given.\n', 'Erd\\H{o}s-Ko-Rado problems for permutation groups In this paper, we study intersecting sets in primitive and quasiprimitive\npermutation groups. Let $G \\leqslant \\mathrm{Sym}(\\Omega)$ be a transitive\npermutation group, and ${S}$ an intersecting set. Previous results show that if\n$G$ is either 2-transitive or a Frobenius group, then\n$|{S}|\\leqslant|G_{\\omega}|$ (for some $\\omega \\in \\Omega$). Furthermore, for\nsome 2-transitive groups, $|{S}|=|G_{\\omega}|$ if and only if ${S}$ is a coset\nof a stabilizer. In this paper, we prove that these statements are far from the\ntruth for general transitive groups. In particular, we show that in the case of\nprimitive groups, there is even no absolute constant $c$ such that\n$|{S}|\\leqslant c|G_\\omega|$. In the case $G$ is a primitive permutation group\nisomorphic to $\\mathrm{PSL(2,p)}$, we characterize the subgroups of $G$ which\nare intersecting sets. We also show that if $G \\leqslant \\mathrm{Sym}(\\Omega)$\nis a permutation group of prime power degree, then for any intersecting set\n$S$, we have $|S|\\leq |G_{\\omega}|$ (for some $\\omega \\in \\Omega$). This proves\na part of a conjecture in \\cite{MRS}.\n']","[('transitive permutation group', 0.6227477192878723), ('primitive permutation group', 0.6165199875831604), ('transitive groups', 0.5797378420829773), ('permutation groups', 0.5757656097412109), ('transitive group', 0.5384686589241028), ('permutation group', 0.5195295214653015), ('primitive permutation', 0.50467449426651), ('transitive permutation', 0.48283058404922485), ('primitive groups', 0.4560961127281189), ('almost simple groups', 0.43128278851509094)]" 321,321,92,321_monoid algebras_cancellative monoids_monoids_commutative monoids,"['monoid algebras', 'cancellative monoids', 'monoids', 'commutative monoids', 'commutative monoid', 'cancellative monoid', 'monoid whose', 'monoid', 'free commutative', 'atomicity']","['Factorizations in reciprocal Puiseux monoids A Puiseux monoid is an additive submonoid of the real line consisting of\nrationals. We say that a Puiseux monoid is reciprocal if it can be generated by\nthe reciprocals of the terms of a strictly increasing sequence of pairwise\nrelatively primes positive integers. We say that a commutative and cancellative\n(additive) monoid is atomic if every non-invertible element $x$ can be written\nas a sum of irreducibles. The number of irreducibles in this sum is called a\nlength of $x$. In this paper, we identify and investigate generalized classes\nof reciprocal Puiseux monoids that are atomic. Moreover, for the atomic monoids\nin the identified classes, we study the ascending chain condition on principal\nideals and also the sets of lengths of their elements.\n', 'On the atomicity of power monoids of Puiseux monoids A submonoid of the additive group $\\mathbb{Q}$ is called a Puiseux monoid if\nit consists of nonnegative rationals. Given a monoid $M$, the set consisting of\nall nonempty finite subsets of $M$ is also a monoid under the Minkowski sum,\nand it is called the (finitary) power monoid of $M$. In this paper we study\natomicity and factorization properties in power monoids of Puiseux monoids. We\nspecially focus on the ascent of the property of being atomic and both the\nbounded and the finite factorization properties (the ascending chain on\nprincipal ideals and the length-finite factorization properties are also\nconsidered here). We prove that both the bounded and the finite factorization\nproperties ascend from any Puiseux monoid to its power monoid. On the other\nhand, we construct an atomic Puiseux monoid whose power monoid is not atomic.\nWe also prove that the existence of maximal common divisors for nonempty finite\nsubsets is a sufficient condition for the property of being atomic to ascend\nfrom a Puiseux monoid to its power monoid.\n', ""Atomicity and Factorization of Puiseux Monoids A Puiseux monoid is an additive submonoid of the nonnegative cone of rational\nnumbers. Although Puiseux monoids are torsion-free rank-one monoids, their\natomic structure is rich and highly complex. For this reason, they have been\nimportant objects to construct crucial examples in commutative algebra and\nfactorization theory. In 1974 Anne Grams used a Puiseux monoid to construct the\nfirst example of an atomic domain not satisfying the ACCP, disproving Cohn's\nconjecture that every atomic domain satisfies the ACCP. Even recently, Jim\nCoykendall and Felix Gotti have used Puiseux monoids to construct the first\natomic monoids with monoid algebras (over a field) that are not atomic,\nanswering a question posed by Robert Gilmer back in the 1980s.\n This dissertation is focused on the investigation of the atomic structure and\nfactorization theory of Puiseux monoids. Here we established various sufficient\nconditions for a Puiseux monoid to be atomic (or satisfy the ACCP). We do the\nsame for two of the most important atomic properties: the finite-factorization\nproperty and the bounded-factorization property. Then we compare these four\natomic properties in the context of Puiseux monoids. This leads us to construct\nand study several classes of Puiseux monoids with distinct atomic structure.\nOur investigation provides sufficient evidence to believe that the class of\nPuiseux monoids is the simplest class with enough complexity to find monoids\nsatisfying almost every fundamental atomic behavior.\n""]","[('monoid algebras', 0.5508178472518921), ('cancellative monoids', 0.5255594849586487), ('monoids', 0.5192021131515503), ('commutative monoids', 0.5047465562820435), ('commutative monoid', 0.4787691533565521), ('cancellative monoid', 0.45584478974342346), ('monoid whose', 0.45419105887413025), ('monoid', 0.44952458143234253), ('free commutative', 0.33469927310943604), ('atomicity', 0.32484814524650574)]" 322,322,92,322_mathematician_mathematicians_mathematics education_mathematics,"['mathematician', 'mathematicians', 'mathematics education', 'mathematics', 'mathematical society', 'mathematical works', 'mathematical knowledge', 'new mathematics', 'mathematical research', 'mathematical']","['Mathematics education policy as a high stakes political struggle: The\n case of Soviet Russia of the 1930s This paper is an introduction to our ongoing more comprehensive work on a\ncritically important period in the history of Russian mathematics education; it\nprovides a glimpse into the socio-political environment in which the famous\nSoviet tradition of mathematics education was born. The authors are\npractitioners of mathematics education in two very different countries, England\nand Russia. We have a chance to see that too many trends and debates in current\neducation policy resemble battles around mathematics education in the 1920s and\n1930s Soviet Russia. This is why this period should be revisited and\nre-analysed, despite quite a considerable amount of previous research. Our main\nconclusion: mathematicians, first of all, were fighting for control over\nselection, education, and career development, of young mathematicians. In the\nharshest possible political environment, they were taking potentially lethal\nrisks.\n', 'Blaschke, Osgood, Wiener, Hadamard and the Early Development of Modern\n Mathematics in China In ancient times, China made great contributions to world civilization and in\nparticular to mathematics. However, modern sciences including mathematics came\nto China rather too late. The first Chinese university was founded in 1895. The\nfirst mathematics department in China was formally opened at the university\nonly in 1913. At the beginning of the twentieth century, some Chinese went to\nEurope, the United States of America and Japan for higher education in modern\nmathematics and returned to China as the pioneer generation. They created\nmathematics departments at the Chinese universities and sowed the seeds of\nmodern mathematics in China. In 1930s, when a dozen of Chinese universities\nalready had mathematics departments, several leading mathematicians from Europe\nand USA visited China, including Wilhelm Blaschke, George D. Birkhoff, William\nF. Osgood, Norbert Wiener and Jacques Hadamard. Their visits not only had\nprofound impact on the mathematical development in China, but also became\nsocial events sometimes. This paper tells the history of their visits.\n', 'In Memoriam Cem Tezer (1955-2020) Cem Tezer was a fastidious, meticulous, highly idiosyncratic and versatile\nscientist. Without him Turkish community of mathematics would be incomplete.\nOur sense of gratitude for his work in various areas of mathematics, history of\nsciences, literature, music and his encouragement to do mathematics for only\nits beauty was hardly unique and even unusual. After he passed away on 27\nFebruary 2020, while working actively at Middle East Technical University, the\nnumber of colleagues and former students described the ways in which their\nstudies and indeed their view towards mathematics had been transformed by\nhaving known him might have surprised only those who had never met him. In this\narticle not only, his contributions to mathematics will be classified and\nsummarized but also his unique and distinguished personality as a mathematician\nwill be emphasized.\n']","[('mathematician', 0.6674006581306458), ('mathematicians', 0.6458592414855957), ('mathematics education', 0.6125460863113403), ('mathematics', 0.5716867446899414), ('mathematical society', 0.5569125413894653), ('mathematical works', 0.5532761216163635), ('mathematical knowledge', 0.5275935530662537), ('new mathematics', 0.5107370018959045), ('mathematical research', 0.49701306223869324), ('mathematical', 0.47717300057411194)]" 323,323,90,323_graph signal processing_graph signals_graph signal_graph spectral,"['graph signal processing', 'graph signals', 'graph signal', 'graph spectral', 'sparse graph', 'graph sparsification', 'graph clustering', 'spectral graph', 'graph structures', 'graphs']","[""Graph Signal Processing Meets Blind Source Separation In graph signal processing (GSP), prior information on the dependencies in\nthe signal is collected in a graph which is then used when processing or\nanalyzing the signal. Blind source separation (BSS) techniques have been\ndeveloped and analyzed in different domains, but for graph signals the research\non BSS is still in its infancy. In this paper, this gap is filled with two\ncontributions. First, a nonparametric BSS method, which is relevant to the GSP\nframework, is refined, the Cram\\'{e}r-Rao bound (CRB) for mixing and unmixing\nmatrix estimators in the case of Gaussian moving average graph signals is\nderived, and for studying the achievability of the CRB, a new parametric method\nfor BSS of Gaussian moving average graph signals is introduced. Second, we also\nconsider BSS of non-Gaussian graph signals and two methods are proposed.\nIdentifiability conditions show that utilizing both graph structure and\nnon-Gaussianity provides a more robust approach than methods which are based on\nonly either graph dependencies or non-Gaussianity. It is also demonstrated by\nnumerical study that the proposed methods are more efficient in separating\nnon-Gaussian graph signals.\n"", 'Graph signal processing with categorical perspective In this paper, we propose a framework for graph signal processing using\ncategory theory. The aim is to generalize a few recent works on probabilistic\napproaches to graph signal processing, which handle signal and graph\nuncertainties.\n', 'Modelling Graph Errors: Towards Robust Graph Signal Processing The first step for any graph signal processing (GSP) procedure is to learn\nthe graph signal representation, i.e., to capture the dependence structure of\nthe data into an adjacency matrix. Indeed, the adjacency matrix is typically\nnot known a priori and has to be learned. However, it is learned with errors. A\nlittle attention has been paid to modelling such errors in the adjacency\nmatrix, and studying their effects on GSP methods. However, modelling errors in\nthe adjacency matrix will enable both to study the graph error effects in GSP\nand to develop robust GSP algorithms. In this paper, we therefore introduce\npractically justifiable graph error models. We also study, both analytically\nwhen possible and numerically, the graph error effect on the performance of GSP\nmethods in different types of problems such as filtering of graph signals and\nindependent component analysis of graph signals (graph decorrelation).\n']","[('graph signal processing', 0.7926475405693054), ('graph signals', 0.7073143124580383), ('graph signal', 0.6748658418655396), ('graph spectral', 0.5767446160316467), ('sparse graph', 0.5684632062911987), ('graph sparsification', 0.5523306131362915), ('graph clustering', 0.533004105091095), ('spectral graph', 0.49229952692985535), ('graph structures', 0.48492196202278137), ('graphs', 0.4799664616584778)]" 324,324,89,324_bundles rank_stable vector bundles_vector bundles_bundles projective,"['bundles rank', 'stable vector bundles', 'vector bundles', 'bundles projective', 'bundles smooth projective', 'line bundles', 'stable bundles', 'bundles', 'bundles smooth', 'bundle rank']","['On some ""sporadic"" moduli spaces of Ulrich bundles on some 3-fold\n scrolls over $\\mathbb{F}_0$ We investigate on the existence of some ""sporadic"", rank-$r \\geqslant 1$\nUlrich vector bundles on suitable $3$-fold scrolls $X$ over the Hirzebruch\nsurface $\\mathbb{F}_0$, which arise as tautological embeddings of\nprojectivization of very-ample vector bundles on $\\mathbb{F}_0$ that are\nuniform in the sense of Brosius and Aprodu--Brinzanescu. Such Ulrich bundles\narise as deformations of ``iterative"" extensions by means of ""sporadic"" Ulrich\nline bundles. We moreover explicitely describe irreducible components of the\ncorresponding ""sporadic"" moduli spaces of rank $r \\geqslant 1$ vector bundles\nwhich are Ulrich with respect to the tautological polarization on $X$. In some\ncases such irreducible components turn out to be a singleton, in some other\ncases such components are generically smooth, whose positive dimension has been\ncomputed and whose general point turns out to be a slope-stable vector bundle.\n', 'Ulrich bundles on a general blow--up of the plane We prove that on $X_n$, the plane blown--up at $n$ general points, there are\nUlrich line bundles with respect to a line bundle corresponding to curves of\ndegree $m$ passing simply through the $n$ blown--up points, with $m\\leq\n2\\sqrt{n}$ and such that the line bundle in question is very ample on $X_n$. We\nprove that the number of these Ulrich line bundles tends to infinity with $n$.\n We also prove the existence of slope--stable rank--$r$ Ulrich vector bundles\non $X_n$, for $n\\geq 2$ and any $r \\geq 1$ and we compute the dimensions of\ntheir moduli spaces. These computations imply that $X_n$ is {Ulrich wild}.\n', 'Characterization of Ulrich bundles on Hirzebruch surfaces In this work we characterize Ulrich bundles of any rank on polarized rational\nruled surfaces over $\\mathbb{P}^1$. We show that every Ulrich bundle admits a\nresolution in terms of line bundles. Conversely, given an injective map between\nsuitable totally decomposed vector bundles, we show that its cokernel is Ulrich\nif it satisfies a vanishing in cohomology. As a consequence we obtain, once we\nfix a polarization, the existence of Ulrich bundles for any admissible rank and\nfirst Chern class. Moreover we show the existence of stable Ulrich bundles for\ncertain pairs $(\\textrm{rk}(E),c_1(E))$ and with respect to a family of\npolarizations. Finally we construct examples of indecomposable Ulrich bundles\nfor several different polarizations and ranks.\n']","[('bundles rank', 0.6277967691421509), ('stable vector bundles', 0.6179108619689941), ('vector bundles', 0.6116608381271362), ('bundles projective', 0.6110982298851013), ('bundles smooth projective', 0.5997965931892395), ('line bundles', 0.5919497013092041), ('stable bundles', 0.5889906287193298), ('bundles', 0.5856747031211853), ('bundles smooth', 0.5745508074760437), ('bundle rank', 0.573387086391449)]" 325,325,89,325_causal discovery_structural causal models_learning causal_causal structures,"['causal discovery', 'structural causal models', 'learning causal', 'causal structures', 'causal graphs', 'structural causal', 'causal structure', 'causal models', 'models causal', 'causal inference']","['Axiomatization of Interventional Probability Distributions Causal intervention is an essential tool in causal inference. It is\naxiomatized under the rules of do-calculus in the case of structure causal\nmodels. We provide simple axiomatizations for families of probability\ndistributions to be different types of interventional distributions. Our\naxiomatizations neatly lead to a simple and clear theory of causality that has\nseveral advantages: it does not need to make use of any modeling assumptions\nsuch as those imposed by structural causal models; it only relies on\ninterventions on single variables; it includes most cases with latent variables\nand causal cycles; and more importantly, it does not assume the existence of an\nunderlying true causal graph as we do not take it as the primitive object--in\nfact, a causal graph is derived as a by-product of our theory. We show that,\nunder our axiomatizations, the intervened distributions are Markovian to the\ndefined intervened causal graphs, and an observed joint probability\ndistribution is Markovian to the obtained causal graph; these results are\nconsistent with the case of structural causal models, and as a result, the\nexisting theory of causal inference applies. We also show that a large class of\nnatural structural causal models satisfy the theory presented here. We note\nthat the aim of this paper is axiomatization of interventional families, which\nis subtly different from ""causal modeling.""\n', 'Causal Discovery in Linear Structural Causal Models with Deterministic\n Relations Linear structural causal models (SCMs) -- in which each observed variable is\ngenerated by a subset of the other observed variables as well as a subset of\nthe exogenous sources -- are pervasive in causal inference and casual\ndiscovery. However, for the task of causal discovery, existing work almost\nexclusively focus on the submodel where each observed variable is associated\nwith a distinct source with non-zero variance. This results in the restriction\nthat no observed variable can deterministically depend on other observed\nvariables or latent confounders. In this paper, we extend the results on\nstructure learning by focusing on a subclass of linear SCMs which do not have\nthis property, i.e., models in which observed variables can be causally\naffected by any subset of the sources, and are allowed to be a deterministic\nfunction of other observed variables or latent confounders. This allows for a\nmore realistic modeling of influence or information propagation in systems. We\nfocus on the task of causal discovery form observational data generated from a\nmember of this subclass. We derive a set of necessary and sufficient conditions\nfor unique identifiability of the causal structure. To the best of our\nknowledge, this is the first work that gives identifiability results for causal\ndiscovery under both latent confounding and deterministic relationships.\nFurther, we propose an algorithm for recovering the underlying causal structure\nwhen the aforementioned conditions are satisfied. We validate our theoretical\nresults both on synthetic and real datasets.\n', 'Confidence in Causal Inference under Structure Uncertainty in Linear\n Causal Models with Equal Variances Inferring the effect of interventions within complex systems is a fundamental\nproblem of statistics. A widely studied approach employs structural causal\nmodels that postulate noisy functional relations among a set of interacting\nvariables. The underlying causal structure is then naturally represented by a\ndirected graph whose edges indicate direct causal dependencies. In a recent\nline of work, additional assumptions on the causal models have been shown to\nrender this causal graph identifiable from observational data alone. One\nexample is the assumption of linear causal relations with equal error variances\nthat we will take up in this work. When the graph structure is known, classical\nmethods may be used for calculating estimates and confidence intervals for\ncausal effects. However, in many applications, expert knowledge that provides\nan a priori valid causal structure is not available. Lacking alternatives, a\ncommonly used two-step approach first learns a graph and then treats the graph\nas known in inference. This, however, yields confidence intervals that are\noverly optimistic and fail to account for the data-driven model choice. We\nargue that to draw reliable conclusions, it is necessary to incorporate the\nremaining uncertainty about the underlying causal structure in confidence\nstatements about causal effects. To address this issue, we present a framework\nbased on test inversion that allows us to give confidence regions for total\ncausal effects that capture both sources of uncertainty: causal structure and\nnumerical size of nonzero effects.\n']","[('causal discovery', 0.6841328144073486), ('structural causal models', 0.6640893816947937), ('learning causal', 0.6605302095413208), ('causal structures', 0.6483623385429382), ('causal graphs', 0.6455214023590088), ('structural causal', 0.6433388590812683), ('causal structure', 0.6386620402336121), ('causal models', 0.6342267990112305), ('models causal', 0.6336314082145691), ('causal inference', 0.6325345635414124)]" 326,326,89,326_lucas numbers_pell numbers_lucas sequences_generalized pell,"['lucas numbers', 'pell numbers', 'lucas sequences', 'generalized pell', 'fibonacci lucas', 'lucas sequence', 'two fibonacci numbers', 'fibonacci numbers', 'th fibonacci number', 'solutions diophantine']","['Pell or Pell-Lucas numbers as concatenations of two repdigits in base\n $b$ Let $b$ be a positive integer such that $2 \\leq b \\leq 10$. In this study, we\nfind all Pell or Pell-Lucas numbers as concatenations of two repdigits in base\n$b$. As a corollary, it is show that the largest Pell or Pell-Lucas numbers\nwhich can be expressible as a concatenations of two repdigits in base $b$ are\n$P_{11} = 5741$ and $Q_5 = 82$, respectively.\n', 'On Mixed Concatenations of Fibonacci and Lucas Numbers Which are\n Fibonacci Numbers Let $(F_n)_{n\\geq 0}$ and $(L_n)_{n\\geq 0}$ be the Fibonacci and Lucas\nsequences, respectively. In this paper we determine all Fibonacci numbers which\nare mixed concatenations of a Fibonacci and a Lucas numbers. By mixed\nconcatenations of $ a $ and $ b $, we mean the both concatenations\n$\\overline{ab}$ and $\\overline{ba}$ together, where $ a $ and $ b $ are any two\nnon negative integers. So, the mathematical formulation of this problem leads\nus searching the solutions of two Diophantine equations $ F_n=10^d F_m +L_k $\nand $ F_n=10^d L_m+F_k $ in non-negative integers $ (n,m,k) ,$ where $ d $\ndenotes the number of digits of $ L_k $ and $ F_k $, respectively. We use lower\nbounds for linear forms in logarithms and reduction method in Diophantine\napproximation to get the results.\n', 'Pell and Pell-Lucas numbers as sums of three repdigits In this study, we find all Pell and Pell-Lucas numbers which are sums of\nthree base 10 repdigits. The proof of our main theorem uses lower bounds for\nlinear forms in logarithms of algebraic numbers and a version of the\nBaker-Davenport reduction method.\n']","[('lucas numbers', 0.6012345552444458), ('pell numbers', 0.59117192029953), ('lucas sequences', 0.5876402258872986), ('generalized pell', 0.5538355112075806), ('fibonacci lucas', 0.5219541192054749), ('lucas sequence', 0.5087997317314148), ('two fibonacci numbers', 0.4902350902557373), ('fibonacci numbers', 0.47739115357398987), ('th fibonacci number', 0.46470844745635986), ('solutions diophantine', 0.4542323052883148)]" 327,327,88,327_directed polymers random_polymer models_random polymer_directed polymer,"['directed polymers random', 'polymer models', 'random polymer', 'directed polymer', 'directed polymers', 'polymers random', 'polymer measures', 'polymer', 'polymers', 'disorder phase']","['On the phase diagram of the polymer model In dimensions 3 or larger, it is a classical fact that the directed polymer\nmodel has two phases: Brownian behavior at high temperature, and non-Brownian\nbehavior at low temperature. We consider the response of the polymer to an\nexternal field or tilt, and show that at fixed temperature, the polymer has\nBrownian behavior for some fields and non-Brownian behavior for others. In\nother words, the external field can induce the phase transition in the directed\npolymer model.\n', ""Borodin-P\\'ech\\'e fluctuations of the free energy in directed random\n polymer models We consider two directed polymer models in the Kardar-Parisi-Zhang (KPZ)\nuniversality class: the O'Connell-Yor semi-discrete directed polymer with\nboundary sources and the continuum directed random polymer with (m,n)-spiked\nboundary perturbations. The free energy of the continuum polymer is the\nHopf-Cole solution of the KPZ equation with the corresponding (m,n)-spiked\ninitial condition. This new initial condition is constructed using two\nsemi-discrete polymer models with independent bulk randomness and coupled\nboundary sources. We prove that the limiting fluctuations of the free energies\nrescaled by the 1/3rd power of time in both polymer models converge to the\nBorodin-Peche type deformations of the GUE Tracy-Widom distribution.\n"", 'Pinning, diffusive fluctuations, and Gaussian limits for half-space\n directed polymer models Half-space directed polymers in random environments are models of interface\ngrowth in the presence of an attractive hard wall. They arise naturally in the\nstudy of wetting and entropic repulsion phenomena. In 1985, Kardar predicted a\n""depinning"" phase transition as the attractive force of the wall is weakened.\nThis phase transition has been rigorously established for integrable models of\nhalf-space last passage percolation, i.e. half-space directed polymers at zero\ntemperature, in a line of study tracing back to work of Baik--Rains. On the\nother hand, for integrable positive temperature models, the first rigorous\nproof of this phase transition has only been obtained very recently through a\nseries of works of Barraquand--Wang, Imamura--Mucciconi--Sasamoto [IMS],\nBarraquand--Corwin--Das, and Das--Zhu [DZ] on the half-space log-Gamma polymer.\nIn this paper we study a broad class of half-space directed polymer models with\nminimal assumptions on the random environment. We prove that an attractive\nforce on the wall strong enough to macroscopically increase the free energy\ninduces phenomena characteristic of the subcritical ""bound phase,"" namely the\npinning of the polymer to the wall and the diffusive fluctuations and limiting\nGaussianity of the free energy. Our arguments are geometric in nature and allow\nus to analyze the positive temperature and zero temperature models\nsimultaneously. Moreover, given the macroscopic free energy increase proven in\n[IMS] for the half-space log-Gamma polymer, our arguments can be used to\nreprove the results of [IMS, DZ] on polymer geometry and free energy\nfluctuations in the bound phase.\n']","[('directed polymers random', 0.6765324473381042), ('polymer models', 0.6175298094749451), ('random polymer', 0.5882711410522461), ('directed polymer', 0.5862219929695129), ('directed polymers', 0.572493314743042), ('polymers random', 0.5718855857849121), ('polymer measures', 0.46606460213661194), ('polymer', 0.45150917768478394), ('polymers', 0.44433706998825073), ('disorder phase', 0.42157626152038574)]" 328,328,88,328_stochastic bilevel optimization_bilevel optimization_optimization bilevel_bilevel optimization problems,"['stochastic bilevel optimization', 'bilevel optimization', 'optimization bilevel', 'bilevel optimization problems', 'single level optimization', 'hyperparameter optimization', 'bi level optimization', 'optimization', 'level optimization', 'solving bilevel']","['Overcoming Lower-Level Constraints in Bilevel Optimization: A Novel\n Approach with Regularized Gap Functions Constrained bilevel optimization tackles nested structures present in\nconstrained learning tasks like constrained meta-learning, adversarial\nlearning, and distributed bilevel optimization. However, existing bilevel\noptimization methods mostly are typically restricted to specific constraint\nsettings, such as linear lower-level constraints. In this work, we overcome\nthis limitation and develop a new single-loop, Hessian-free constrained bilevel\nalgorithm capable of handling more general lower-level constraints. We achieve\nthis by employing a doubly regularized gap function tailored to the constrained\nlower-level problem, transforming constrained bilevel optimization into an\nequivalent single-level optimization problem with a single smooth constraint.\nWe rigorously establish the non-asymptotic convergence analysis of the proposed\nalgorithm under the convexity of lower-level problem, avoiding the need for\nstrong convexity assumptions on the lower-level objective or coupling convexity\nassumptions on lower-level constraints found in existing literature.\nAdditionally, the generality of our method allows for its extension to bilevel\noptimization with minimax lower-level problem. We evaluate the effectiveness\nand efficiency of our algorithm on various synthetic problems, typical\nhyperparameter learning tasks, and generative adversarial network.\n', 'Alternating Implicit Projected SGD and Its Efficient Variants for\n Equality-constrained Bilevel Optimization Stochastic bilevel optimization, which captures the inherent nested structure\nof machine learning problems, is gaining popularity in many recent\napplications. Existing works on bilevel optimization mostly consider either\nunconstrained problems or constrained upper-level problems. This paper\nconsiders the stochastic bilevel optimization problems with equality\nconstraints both in the upper and lower levels. By leveraging the special\nstructure of the equality constraints problem, the paper first presents an\nalternating implicit projected SGD approach and establishes the $\\tilde{\\cal\nO}(\\epsilon^{-2})$ sample complexity that matches the state-of-the-art\ncomplexity of ALSET \\citep{chen2021closing} for unconstrained bilevel problems.\nTo further save the cost of projection, the paper presents two alternating\nimplicit projection-efficient SGD approaches, where one algorithm enjoys the\n$\\tilde{\\cal O}(\\epsilon^{-2}/T)$ upper-level and $\\tilde{\\cal\nO}(\\epsilon^{-1.5}/T^{\\frac{3}{4}})$ lower-level projection complexity with\n${\\cal O}(T)$ lower-level batch size, and the other one enjoys $\\tilde{\\cal\nO}(\\epsilon^{-1.5})$ upper-level and lower-level projection complexity with\n${\\cal O}(1)$ batch size. Application to federated bilevel optimization has\nbeen presented to showcase the empirical performance of our algorithms. Our\nresults demonstrate that equality-constrained bilevel optimization with\nstrongly-convex lower-level problems can be solved as efficiently as stochastic\nsingle-level optimization problems.\n', 'On Momentum-Based Gradient Methods for Bilevel Optimization with\n Nonconvex Lower-Level Bilevel optimization is a popular two-level hierarchical optimization, which\nhas been widely applied to many machine learning tasks such as hyperparameter\nlearning, meta learning and continual learning. Although many bilevel\noptimization methods recently have been developed, the bilevel methods are not\nwell studied when the lower-level problem is nonconvex. To fill this gap, in\nthe paper, we study a class of nonconvex bilevel optimization problems, where\nboth upper-level and lower-level problems are nonconvex, and the lower-level\nproblem satisfies Polyak-{\\L}ojasiewicz (PL) condition. We propose an efficient\nmomentum-based gradient bilevel method (MGBiO) to solve these deterministic\nproblems. Meanwhile, we propose a class of efficient momentum-based stochastic\ngradient bilevel methods (MSGBiO and VR-MSGBiO) to solve these stochastic\nproblems. Moreover, we provide a useful convergence analysis framework for our\nmethods. Specifically, under some mild conditions, we prove that our MGBiO\nmethod has a sample (or gradient) complexity of $O(\\epsilon^{-2})$ for finding\nan $\\epsilon$-stationary solution of the deterministic bilevel problems (i.e.,\n$\\|\\nabla F(x)\\|\\leq \\epsilon$), which improves the existing best results by a\nfactor of $O(\\epsilon^{-1})$. Meanwhile, we prove that our MSGBiO and VR-MSGBiO\nmethods have sample complexities of $\\tilde{O}(\\epsilon^{-4})$ and\n$\\tilde{O}(\\epsilon^{-3})$, respectively, in finding an $\\epsilon$-stationary\nsolution of the stochastic bilevel problems (i.e., $\\mathbb{E}\\|\\nabla\nF(x)\\|\\leq \\epsilon$), which improves the existing best results by a factor of\n$\\tilde{O}(\\epsilon^{-3})$. Extensive experimental results on bilevel PL game\nand hyper-representation learning demonstrate the efficiency of our algorithms.\nThis paper commemorates the mathematician Boris Polyak (1935 -2023).\n']","[('stochastic bilevel optimization', 0.6981062889099121), ('bilevel optimization', 0.6705852150917053), ('optimization bilevel', 0.6516332626342773), ('bilevel optimization problems', 0.6320083141326904), ('single level optimization', 0.524623692035675), ('hyperparameter optimization', 0.512276828289032), ('bi level optimization', 0.512045681476593), ('optimization', 0.4754711389541626), ('level optimization', 0.46559035778045654), ('solving bilevel', 0.4550883173942566)]" 329,329,88,329_closed symplectic manifolds_symplectic homology_symplectic manifolds_hamiltonian diffeomorphisms,"['closed symplectic manifolds', 'symplectic homology', 'symplectic manifolds', 'hamiltonian diffeomorphisms', 'manifolds hamiltonian', 'closed symplectic manifold', 'symplectic topology', 'symplectic manifold', 'group hamiltonian diffeomorphisms', 'manifold hamiltonian']","['On the existence of infinitely many non-contractible periodic orbits of\n Hamiltonian diffeomorphisms of closed symplectic manifolds We show that the presence of a non-contractible one-periodic orbit of a\nHamiltonian diffeomorphism of a connected closed symplectic manifold\n$(M,\\omega)$ implies the existence of infinitely many non-contractible simple\nperiodic orbits, provided that the symplectic form $\\omega$ is aspherical and\nthe fundamental group $\\pi_1(M)$ is either a virtually abelian group or an\n$\\mathrm{R}$-group. We also show that a similar statement holds for Hamiltonian\ndiffeomorphisms of closed monotone or negative monotone symplectic manifolds\nunder the same conditions on their fundamental groups. These results generalize\nsome works by Ginzburg and G\\""urel. The proof uses the filtered Floer--Novikov\nhomology for non-contractible periodic orbits.\n', 'The action spectrum and C^0 symplectic topology Our first main result states that the spectral norm on the group of\nHamiltonian diffeomorphisms, introduced in the works of Viterbo, Schwarz and\nOh, is continuous with respect to the C^0 topology, when M is symplectically\naspherical. This statement was previously proven only in the case of closed\nsurfaces. As a corollary, using a recent result of Kislev and Shelukhin, we\nobtain C^0 continuity of barcodes on aspherical symplectic manifolds, and\nfurthermore define barcodes for Hamiltonian homeomorphisms. We also present\nseveral applications to Hofer geometry and dynamics of Hamiltonian\nhomeomorphisms.\n Our second main result is related to the Arnold conjecture about fixed points\nof Hamiltonian diffeomorphisms. The recent example of a Hamiltonian\nhomeomorphism, on any closed symplectic manifold of dimension greater than 2,\nhaving only one fixed point, shows that the conjecture does not admit a direct\ngeneralization to the C^0 setting. However, in this paper we demonstrate that a\nreformulation of the conjecture in terms of fixed points as well as spectral\ninvariants still holds for Hamiltonian homeomorphisms on symplectically\naspherical manifolds.\n', 'On the Hofer-Zehnder conjecture for non-contractible periodic orbits in\n Hamiltonian dynamics In this paper, we treat an open problem related to the number of periodic\norbits of Hamiltonian diffeomorphisms on closed symplectic manifolds.\nHofer-Zehnder conjecture states that a Hamiltonian diffeomorphisms has\ninfinitely many periodic orbits if it has ""homologically unnecessary periodic\norbits"""". For example, non-contractible periodic orbits are homologically\nunnecessary periodic orbits because Floer homology of non-contractible periodic\norbits is trivial. We prove Hofer-Zehnder conjecture for non-contractible\nperiodic orbits for very wide classes of symplectic manifolds.\n']","[('closed symplectic manifolds', 0.6713241338729858), ('symplectic homology', 0.6660773158073425), ('symplectic manifolds', 0.6654714941978455), ('hamiltonian diffeomorphisms', 0.6561568379402161), ('manifolds hamiltonian', 0.6475052237510681), ('closed symplectic manifold', 0.64234858751297), ('symplectic topology', 0.6389654278755188), ('symplectic manifold', 0.6373451948165894), ('group hamiltonian diffeomorphisms', 0.6334617733955383), ('manifold hamiltonian', 0.6241819262504578)]" 330,330,88,330_secrecy capacity_covert communications_secrecy rate_secrecy constraint,"['secrecy capacity', 'covert communications', 'secrecy rate', 'secrecy constraint', 'covert communication', 'wiretap channels', 'strong secrecy', 'secrecy', 'wiretap channel', 'wiretap coding']","['The Secrecy Capacity of The Gaussian Wiretap Channel with Rate-Limited\n Help The Gaussian wiretap channel with rate-limited help, available at the\nlegitimate receiver (Rx) or/and transmitter (Tx), is studied under various\nchannel configurations (degraded, reversely degraded and non-degraded). In the\ncase of Rx help and all channel configurations, the rate-limited help results\nin a secrecy capacity boost equal to the help rate irrespective of whether the\nhelp is secure or not, so that the secrecy of help does not provide any\ncapacity increase. The secrecy capacity is positive for the reversely-degraded\nchannel (where the no-help secrecy capacity is zero) and no wiretap coding is\nneeded to achieve it. More noise at the legitimate receiver can sometimes\nresult in higher secrecy capacity. The secrecy capacity with Rx help is not\nincreased even if the helper is aware of the message being transmitted. The\nsame secrecy capacity boost also holds if non-secure help is available to the\ntransmitter (encoder), in addition to or instead of the same Rx help, so that,\nin the case of the joint Tx/Rx help, one help link can be omitted without\naffecting the capacity. If Rx/Tx help links are independent of each other, then\nthe boost in the secrecy capacity is the sum of help rates and no link can be\nomitted without a loss in the capacity. Non-singular correlation of the\nreceiver and eavesdropper noises does not affect the secrecy capacity and\nnon-causal help does not bring in any capacity increase over the causal one.\n', 'Probabilistic Shaped Multilevel Polar Coding for Wiretap Channel A wiretap channel is served as the fundamental model of physical layer\nsecurity techniques, where the secrecy capacity of the Gaussian wiretap channel\nis proven to be achieved by Gaussian input. However, there remains a gap\nbetween the Gaussian secrecy capacity and the secrecy rate with conventional\nuniformly distributed discrete constellation input, e.g. amplitude shift keying\n(ASK) and quadrature amplitude modulation (QAM). In this paper, we propose a\nprobabilistic shaped multilevel polar coding scheme to bridge the gap.\nSpecifically, the input distribution optimization problem for maximizing the\nsecrecy rate with ASK/QAM input is solved. Numerical results show that the\nresulting sub-optimal solution can still approach the Gaussian secrecy\ncapacity. Then, we investigate the polarization of multilevel polar codes for\nthe asymmetric discrete memoryless wiretap channel, and thus propose a\nmultilevel polar coding scheme integration with probabilistic shaping. It is\nproved that the scheme can achieve the secrecy capacity of the Gaussian wiretap\nchannel with discrete constellation input, and satisfies the reliability\ncondition and weak security condition. A security-oriented polar code\nconstruction method to natively satisfies the leakage-based security condition\nis also investigated. Simulation results show that the proposed scheme achieves\nmore efficient and secure transmission than the uniform constellation input\ncase over both the Gaussian wiretap channel and the Rayleigh fading wiretap\nchannel.\n', 'Finite-Length Analysis of Polar Secrecy Codes for Wiretap Channels In a classical wiretap channel setting, Alice communicates with Bob through a\nmain communication channel, while her transmission also reaches an eavesdropper\nEve through a wiretap channel. In this paper, we consider a general class of\npolar secrecy codes for wiretap channels and study their finite-length\nperformance. In particular, bounds on the normalized mutual information\nsecurity (MIS) leakage, a fundamental measure of secrecy in\ninformation-theoretic security frameworks, are presented for polar secrecy\ncodes. The bounds are utilized to characterize the finite-length scaling\nbehavior of polar secrecy codes, where scaling here refers to the\nnon-asymptotic behavior of both the gap to the secrecy capacity as well as the\nMIS leakage. Furthermore, the bounds are shown to facilitate characterizing\nnumerical bounds on the secrecy guarantees of polar secrecy codes in finite\nblock lengths of practical relevance, where directly calculating the MIS\nleakage is in general infeasible.\n']","[('secrecy capacity', 0.6716724634170532), ('covert communications', 0.6125853657722473), ('secrecy rate', 0.5963102579116821), ('secrecy constraint', 0.5915680527687073), ('covert communication', 0.5891890525817871), ('wiretap channels', 0.5684724450111389), ('strong secrecy', 0.5661767721176147), ('secrecy', 0.5582508444786072), ('wiretap channel', 0.5511655211448669), ('wiretap coding', 0.545809805393219)]" 331,331,87,331_trajectory optimization_trajectory optimization problems_optimal trajectory_trajectory generation,"['trajectory optimization', 'trajectory optimization problems', 'optimal trajectory', 'trajectory generation', 'trajectory design', 'trajectory planning', 'optimal trajectories', 'low thrust', 'maneuvers', 'trajectory']","['Optimization, guidance, and control of low-thrust transfers from the\n Lunar Gateway to low lunar orbit The Gateway will represent a primary space system useful for the Artemis\nprogram, Earth-Moon transportation, and deep space exploration. It is expected\nto serve as a staging location on the way to the lunar surface. This study\nfocuses on low-thrust transfer dynamics, from the Near-Rectilinear Halo Orbit\ntraveled by Gateway to a specified Low-altitude Lunar Orbit (LLO). This\nresearch addresses: (i) determination of the minimum-time low-thrust trajectory\nand (ii) design, implementation, and testing of a guidance and control\narchitecture, for a space vehicle that travels from Gateway to LLO. Orbit\ndynamics is described in terms of modified equinoctial elements, in the context\nof a high-fidelity ephemeris model. The minimum-time trajectory from Gateway to\na specified lunar orbit is detected through an indirect heuristic approach,\nwhich uses the analytical conditions arising in optimal control theory in\nconjunction with a heuristic technique. However, future missions will pursue a\ngrowing level of autonomy, and this circumstance implies the mandatory design\nof an efficient feedback guidance scheme, capable of compensating for\nnonnominal flight conditions. This research proposes nonlinear orbit control as\na viable option for autonomous explicit guidance of low-thrust transfers from\nGateway to LLO. This approach allows defining a feedback law that enjoys\nquasi-global stability properties without requiring any offline reference\ntrajectory. The overall spacecraft dynamics is modeled including attitude\ncontrol and actuation. The latter is demanded to an array of reaction wheels,\narranged in a pyramidal configuration. Guidance, attitude control, and\nactuation are implemented in an iterative scheme. Monte Carlo simulations\ndemonstrate that the guidance and control architecture is effective with random\nstarting points from Gateway and the temporary unavailability of the propulsion\nsystem.\n', 'Low-Thrust Many-Revolution Trajectory Design Under Operational\n Uncertainties for DESTINY+ Mission DESTINY+ is a planned JAXA medium-class Epsilon mission from Earth to deep\nspace using a low-thrust, many-revolution orbit. Such a trajectory design is a\nchallenging problem not only for trajectory design but also for flight\noperations, and in particular, it is essential to evaluate the impact of\noperational uncertainties to ensure mission success. In this study, we design\nthe low-thrust trajectory from Earth orbit to a lunar transfer orbit by\ndifferential dynamic programming using the Sundman transformation. The results\nof Monte Carlo simulations with operational uncertainties confirm that the\nspacecraft can be successfully guided to the lunar transfer orbit by using the\nfeedback control law of differential dynamic programming in the angular domain.\n', 'Low Thrust Trajectory Design Using A Semi-Analytic Approach Space missions that use low-thrust propulsion technology are becoming\nincreasingly popular since they utilize propellant more efficiently and thus\nreduce mission costs. However, optimizing continuous-thrust trajectories is\ncomplex, time-consuming, and extremely sensitive to initial guesses. Hence,\ngenerating approximate trajectories that can be used as reliable initial\nguesses in trajectory generators is essential. This paper presents a\nsemi-analytic approach for designing planar and three-dimensional trajectories\nusing Hills equations. The spacecraft is assumed to be acted upon by a constant\nthrust acceleration magnitude. The proposed equations are employed in a\nNonlinear Programming Problem (NLP) solver to obtain the thrust directions.\nTheir applicability is tested for various design scenarios like orbit raising,\norbit insertion, and rendezvous. The trajectory solutions are then validated as\ninitial guesses in high-fidelity optimal control tools. The usefulness of this\nmethod lies in the preliminary stages of low-thrust mission design, where speed\nand reliability are key.\n']","[('trajectory optimization', 0.6290619373321533), ('trajectory optimization problems', 0.6089245676994324), ('optimal trajectory', 0.5911309719085693), ('trajectory generation', 0.5574852228164673), ('trajectory design', 0.5508931279182434), ('trajectory planning', 0.5438511371612549), ('optimal trajectories', 0.5097714066505432), ('low thrust', 0.4813888669013977), ('maneuvers', 0.43571776151657104), ('trajectory', 0.43401089310646057)]" 332,332,86,332_mathbb f_q__q finite field__q finite_f_q,"['mathbb f_q', '_q finite field', '_q finite', 'f_q', 'mathbb _q finite', 'finite fields', 'finite fields let', 'arbitrary finite fields', 'distance finite', 'subset mathbb _q']","[""Distribution of similar configurations in subsets of $\\mathbb{F}_q^d$ Let $\\mathbb{F}_q$ be a finite field of order $q$ and $E$ be a set in\n$\\mathbb{F}_q^d$. The distance set of $E$ is defined by $\\Delta(E):=\\{\\lVert\nx-y \\rVert :x,y\\in E\\}$, where $\\lVert \\alpha\n\\rVert=\\alpha_1^2+\\dots+\\alpha_d^2$. Iosevich, Koh and Parshall (2018) proved\nthat if $d\\geq 2$ is even and $|E|\\geq 9q^{d/2}$, then $$\\mathbb{F}_q=\n\\frac{\\Delta(E)}{\\Delta(E)}=\\left\\{\\frac{a}{b}: a\\in \\Delta(E),\\ b\\in\n\\Delta(E)\\setminus\\{0\\} \\right\\}.$$ In other words, for each $r\\in\n\\mathbb{F}_q^*$ there exist $(x,y)\\in E^2$ and $(x',y')\\in E^2$ such that\n$\\lVert x-y\\rVert\\neq0$ and $\\lVert x'-y' \\rVert=r\\lVert x-y\\rVert$.\n Geometrically, this means that if the size of $E$ is large, then for any\ngiven $r \\in \\mathbb{F}_q^*$ we can find a pair of edges in the complete graph\n$K_{|E|}$ with vertex set $E$ such that one of them is dilated by $r\\in\n\\mathbb{F}_q^*$ with respect to the other. A natural question arises whether it\nis possible to generalize this result to arbitrary subgraphs of $K_{|E|}$ with\nvertex set $E$ and this is the goal of this paper.\n In this paper, we solve this problem for $k$-paths $(k\\geq 2)$, simplexes and\n4-cycles. We are using a mix of tools from different areas such as enumerative\ncombinatorics, group actions and Tur\\'an type theorems.\n"", 'Near optimal thresholds for existence of dilated configurations in\n $\\mathbb{F}_q^d$ Let $E\\subset\\mathbb{F}_q^d$ and $\\lVert \\cdot \\rVert:\\mathbb{F}_q^d\\to\n\\mathbb{F}_q$ defined as $\\lVert \\alpha\\rVert:= \\alpha_1^2+\\dots+\\alpha_d^2$ if\n$\\alpha=(\\alpha_1,\\dots,\\alpha_d)\\in \\mathbb{F}_q^d$, where $\\mathbb{F}_q^d$ is\nthe $d$-dimensional vector space over the finite field $\\mathbb{F}_q$ with $q$\nelements. Let $k\\geq 1$ and $A$ is a nonempty subset of $\\{(i,j):1\\leq i> q^{d/2}$, then $\\frac{\\Delta(E)}{\\Delta(E)}:= \\{\\frac{s}{t}:s,t\n\\in \\Delta(E), t\\not=0\\} =\\mathbb{F}_q^d$. The proof of the latter result is\nquite sophisticated and in \\cite{pham2023group}, a simple proof using a\ngroup-action approach was obtained for the case of $q \\equiv 3 \\mod 4$ when\n$d=2$. In the $q \\equiv 3 \\mod 4$ setting, for each $r \\in (\\mathbb{F}_q)^2$,\n\\cite{pham2023group} showed if $E \\subset \\mathbb{F}_q$, then $V(r):= \\#\n\\left\\{ (a,b,c,d) \\in E^2: \\frac{\\|a-b\\|^2}{\\|c-d\\|^2} = r \\right\\} >>\n\\frac{|E|^4}{q}$. In this work we use group action techniques in the $q \\equiv\n3 \\mod 4$ setting, for $d=2$ and improve the results of \\cite{pham2023group} by\nremoving the assumption on $r \\in (\\mathbb{F}_q)^2$. Specifically we show if\n$d=2$ and $q \\equiv 3 \\mod 4$, then for each $r \\in \\mathbb{F}_q^*$,$V(r)\\geq\n\\frac{|E|^4}{2q}$if $|E|\\geq \\sqrt{2}q$ for all $r \\in \\mathbb{F}_q$. Finally,\nwe improve the main result of \\cite{bhowmik2023near} using our proof techniques\nfrom our quotient set results.\n']","[('mathbb f_q', 0.48961204290390015), ('_q finite field', 0.471306174993515), ('_q finite', 0.40679532289505005), ('f_q', 0.3945041596889496), ('mathbb _q finite', 0.37346774339675903), ('finite fields', 0.3721294701099396), ('finite fields let', 0.3675437569618225), ('arbitrary finite fields', 0.36215081810951233), ('distance finite', 0.35219624638557434), ('subset mathbb _q', 0.3502488136291504)]" 333,333,86,333_painlev equations_equations painlev_painlev transcendents_painlev transcendent,"['painlev equations', 'equations painlev', 'painlev transcendents', 'painlev transcendent', 'solutions painlev', 'painlev type', 'associated painlev', 'discrete painlev', 'form painlev', 'painlev iii']","['Algebraic relations between solutions of Painlev\\\'e equations In this manuscript we make major progress classifying algebraic relations\nbetween solutions of Painlev\\\'e equations. Our main contribution is to\nestablish the algebraic independence of solutions of various pairs of equations\nin the Painlev\\\'e families; for generic coefficients, we show all algebraic\nrelations between solutions of equations in the same Painlev\\\'e family come\nfrom classically studied B{\\""a}cklund transformations. We also apply our\nanalysis of ranks to establish some transcendence results for pairs of\nPainlev\\\'e equations from different families. In that area, we answer several\nopen questions of Nagloo (2016), and in the process answer a question of Boalch\n(2012).\n We calculate model theoretic ranks of all Painlev\\\'e equations in this\narticle, extending results of Nagloo and Pillay (2017). We show that the type\nof the generic solution of any equation in the second Painlev\\\'e family is\ngeometrically trivial, extending a result of Nagloo (2015). We give the first\nmodel theoretic analysis of several special families of the third Painlev\\\'e\nequation, proving results analogous to Nagloo and Pillay (2017). We also give a\nnovel new proof of the irreducibility of the third, fifth and sixth Painlev\\\'e\nequations using recent work of Freitag, Jaoui, and Moosa (2022). Our proof is\nfundamentally different than the existing transcendence proofs of Watanabe\n(1998) or Cantat and Loray (2009).\n', ""On existence and properties of roots of third Painlev\\'e' transcendents A closed proof of existence of solutions to third Painlev\\'e' equation\n(Painlev\\'e' transcendents) vanishing at arbitrary given point distinct from\nzero is presented. The structure of the set of Painlev\\'e' transcendents with\ncommon parameters vanishing at a given point is described. The approximate\nexplicit representation of a Painlev\\'e' transcendent in vicinity of its\nnon-zero root is given.\n"", 'The wild monodromy of the Fifth Painlev\\\'e equation and its action on\n wild character variety: an approach of confluence The article studies the Fifth Painlev\\\'e equation and of the nonlinear Stokes\nphenomenon at its irregular singularity at infinity from the point of view of\nconfluence from the Sixth Painlev\\\'e equation. This approach is developped\nseparately on both sides of the Riemann-Hilbert correspondance. On the side of\nthe nonlinear Painlev\\\'e-Okamoto foliation the relation between the nonlinear\nmonodromy group of Painlev\\\'e VI and the ""nonlinear wild monodromy pseudogroup""\nof Painlev\\\'e V (that is the pseudogroup generated by nonlinear monodromy,\nnonlinear Stokes operators and nonlinear exponential torus) is explained in\ndetail. On the side of the corresponding linear isomonodromic problem, the\n""wild"" character variety (the space of the linear monodromy and Stokes data)\nassociated to Painlev\\\'e V is constructed through a birational transformation\nfrom the character variety (the space of the linear monodromy data) associated\nto Painlev\\\'e VI. This allows to transport the known description of the action\nof the nonlinear monodromy of Painlev\\\'e VI on its character variety to that of\nPainlev\\\'e V, and to provide explicit formulas for the action of the ""nonlinear\nwild monodromy"" of Painlev\\\'e V on its character variety.\n']","[('painlev equations', 0.7022639513015747), ('equations painlev', 0.6645783185958862), ('painlev transcendents', 0.6579515337944031), ('painlev transcendent', 0.600229024887085), ('solutions painlev', 0.5781053900718689), ('painlev type', 0.5595130324363708), ('associated painlev', 0.5346900820732117), ('discrete painlev', 0.5261051058769226), ('form painlev', 0.5180874466896057), ('painlev iii', 0.5085399746894836)]" 334,334,86,334_nematic liquid crystals_nematic liquid crystal_liquid crystals_liquid crystal,"['nematic liquid crystals', 'nematic liquid crystal', 'liquid crystals', 'liquid crystal', 'nematic liquid', 'solutions landau', 'crystalline', 'crystals', 'nematic', 'crystal']","['Existence of minimizers and convergence of critical points for a new\n Landau-de Gennes energy functional in nematic liquid crystals The Landau-de Gennes energy in nematic liquid crystals depends on four\nelastic constants $L_1$, $L_2$, $L_3$, $L_4$. In the case of $L_4\\neq 0$, Ball\nand Majumdar (Mol. Cryst. Liq. Cryst., 2010) found an example that the original\nLandau-de Gennes energy functional in physics does not satisfy a coercivity\ncondition, which causes a problem in mathematics to establish existence of\nenergy minimizers. At first, we introduce a new Landau-de Gennes energy density\nwith $L_4\\neq 0$, which is equivalent to the original Landau-de Gennes density\nfor uniaxial tensors and satisfies the coercivity condition for all\n$Q$-tensors. Secondly, we prove that solutions of the Landau-de Gennes system\ncan approach a solution of the $Q$-tensor Oseen-Frank system without using\nenergy minimizers. Thirdly, we develop a new approach to generalize the Nguyen\nand Zarnescu (Calc. Var. PDEs, 2013) convergence result to the case of non-zero\nelastic constants $L_2$, $L_3$, $L_4$.\n', 'Bayesian Parameter Identification in the Landau-de Gennes Theory for\n Nematic Liquid Crystals This manuscript establishes a pathway to reconstruct material parameters from\nmeasurements within the Landau-de Gennes model for nematic liquid crystals. We\npresent a Bayesian approach to this inverse problem and analyse its properties\nusing given, simulated data for benchmark problems of a planar bistable nematic\ndevice. In particular, we discuss the accuracy of the Markov chain Monte Carlo\napproximations, confidence intervals and the limits of identifiability.\n', 'A new representation for the Landau-de Gennes energy of nematic liquid\n crystals In the Landau-de Gennes theory on nematic liquid crystals, the well-known\nLandau-de Gennes energy depends on four elastic constants; $L_1$, $L_2$, $L_3$,\n$L_4$. For the general case of $L_4\\neq 0$, Ball-Majumdar \\cite {BM} found an\nexample that the Landau-de Gennes energy functional from physics literature\n\\cite{MN} does not satisfy a coercivity condition, which causes a problem in\nmathematics to establish existence of energy minimizers. In order to solve this\nproblem, we observe that the original third order term on $L_4$, proposed by\nSchiele and Trimper \\cite{ST} in physics, is a linear combination of a fourth\norder term and a second order term. Therefore, we can propose a new Landau-de\nGennes energy, which is equal to the original for uniaxial nematic $Q$-tensors.\nThe new Landau-de Gennes energy with general elastic constants satisfies the\ncoercivity condition for all $Q$-tensors, which establishes a new link between\nmathematical and physical theory. Similarly to the work of Majumdar-Zarnescu\n\\cite{MZ}, we prove existence and convergence of minimizers of the new\nLandau-de Gennes energy. Moreover, we find a new way to study the limiting\nproblem of the Landau-de Gennes system since the cross product method\n\\cite{Chen} on the Ginzburg-Landau equation does not work for the Landau-de\nGennes system.\n']","[('nematic liquid crystals', 0.59190434217453), ('nematic liquid crystal', 0.5760822892189026), ('liquid crystals', 0.49979567527770996), ('liquid crystal', 0.4724924564361572), ('nematic liquid', 0.44954049587249756), ('solutions landau', 0.41055426001548767), ('crystalline', 0.37830814719200134), ('crystals', 0.37492871284484863), ('nematic', 0.3473326563835144), ('crystal', 0.34525105357170105)]" 335,335,86,335_resonant frequencies_resonant modes_wave scattering_resonators,"['resonant frequencies', 'resonant modes', 'wave scattering', 'resonators', 'electromagnetic waves', 'metamaterials', 'sub wavelength', 'resonant states', 'resonances', 'metamaterial']","[""Mathematical theory on multi-layer high contrast acoustic subwavelength\n resonators Subwavelength resonance is a vital acoustic phenomenon in contrasting media.\nThe narrow bandgap width of single-layer resonator has prompted the exploration\nof multi-layer metamaterials as an effective alternative, which consist of\nalternating nests of high-contrast materials, called ``resonators'', and a\nbackground media. In this paper, we develop a general mathematical framework\nfor studying acoustics within multi-layer high-contrast structures. Firstly, by\nusing layer potential techniques, we establish the representation formula in\nterms of a matrix type operator with a block tridiagonal form for multi-layer\nstructures within general geometry. Then we prove the existence of\nsubwavelength resonances via Gohberg-Sigal theory, which generalizes the\ncelebrated Minnaert resonances in single-layer structures. Intriguingly, we\nfind that the primary contribution to mode splitting lies in the fact that as\nthe number of nested resonators increases, the degree of the corresponding\ncharacteristic polynomial also increases, while the type of resonance (consists\nsolely of monopolar resonances) remains unchanged. Furthermore, we derive\noriginal formulas for the subwavelength resonance frequencies of concentric\ndual-resonator. Numerical results associated with different nested resonators\nare presented to corroborate the theoretical findings.\n"", 'From all-dieletric nanoresonators to extended quasi-static plasmonic\n resonators We derive the electromagnetic medium equivalent to a cluster of\nall-dielectric nanoparticles (i.e. enjoying high refractive indices),\ndistributed periodically in a smooth domain $\\Omega$, while excited at nearly\nresonating dielectric incident frequencies (i.e. subwavelength Mie-resonant\nfrequencies). This effective medium is an alteration of the permeability that\nkeeps the permittivity unchanged. We provide regimes under which the effective\npermeability can be positive or negative valued. In addition, if the incident\nfrequency is close to any of the subwavelength all-dielectric resonances, then\nthe distributed cluster behaves as an extended quasi-static plasmonic\nresonator. Therefore, exciting the cluster of all-dielectric nanoresonators\nwith nearly resonating incident frequencies, we can generate an extended\nquasi-static plasmonic resonator which creates giant electromagnetic fields in\nits surrounding.\n', 'The interaction between two close-to-touching convex acoustic\n subwavelength resonators The Minneart resonance is a low frequency resonance in which the wavelength\nis much larger than the size of the resonators. It is interesting to study the\ninteraction between two adjacent bubbles when they are brought close together.\nBecause the bubbles are usually compressible, in this paper we mainly\ninvestigate resonant modes of two general convex resonators with arbitrary\nshapes to extend the results of Ammari, Davies, Yu in [4], where a pair of\nspherical resonators are considered by using bispherical coordinates. We\ncombine the layer potential method for Helmholtz equation in [4,5] and the\nelliptic theory for gradient estimates in [26,30] to calculate the capacitance\ncoefficients for the coupled $C^{2,\\alpha}$ resonators, then show the\nleading-order asymptotic behaviors of two different resonant modes and reveal\nthe dependance of the resonant frequencies on their geometric properties, such\nas convexity, volumes and curvatures. By the way, the blow-up rates of gradient\nof the scattered pressure are also presented.\n']","[('resonant frequencies', 0.5760574340820312), ('resonant modes', 0.5578566789627075), ('wave scattering', 0.4727904498577118), ('resonators', 0.4530487060546875), ('electromagnetic waves', 0.445627361536026), ('metamaterials', 0.434452086687088), ('sub wavelength', 0.43205130100250244), ('resonant states', 0.42991235852241516), ('resonances', 0.4143017828464508), ('metamaterial', 0.40731197595596313)]" 336,336,86,336_gromov hyperbolic spaces_gromov hyperbolic space_hyperbolic spaces_gromov hyperbolicity,"['gromov hyperbolic spaces', 'gromov hyperbolic space', 'hyperbolic spaces', 'gromov hyperbolicity', 'hyperbolic metric', 'metric hyperbolic', 'hyperbolic space', 'gromov hyperbolic', 'gromov hausdorff distance', 'metric gromov']","['A Gromov Hyperbolic metric and M\\""obius transformations We compare a Gromov hyperbolic metric with the hyperbolic metric in the unit\nball or in the upper half space, and prove sharp comparison inequalities\nbetween the Gromov hyperbolic metric and some hyperbolic type metrics. We also\nobtain several sharp distortion inequalities for the Gromov hyperbolic metric\nunder some families of M\\""{o}bius transformations.\n', 'Gromov-Hausdorff convergence of maximal Gromov hyperbolic spaces and\n their boundaries The relation between negatively curved spaces and their boundaries is\nimportant for various rigidity problems. In \\cite{biswas2024quasi}, the class\nof Gromov hyperbolic spaces called maximal Gromov hyperbolic spaces was\nintroduced, and the boundary functor $X \\mapsto \\partial X$ was shown to give\nan equivalence of categories between maximal Gromov hyperbolic spaces (with\nmorphisms being isometries) and a class of compact quasi-metric spaces called\nquasi-metric antipodal spaces (with morphisms being Moebius homeomorphisms).\nThe proof of this equivalence involved the construction of a filling functor $Z\n\\mapsto {\\mathcal M}(Z)$, associating to any quasi-metric antipodal space $Z$ a\nmaximal Gromov hyperbolic space ${\\mathcal M}(Z)$.\n We study the ``continuity"" properties of the boundary and filling functors.\nWe show that convergence of a sequence of quasi-metric antipodal spaces (in a\ncertain sense called ``almost-isometric convergence"") implies convergence (in\nthe Gromov-Hausdorff sense) of the associated maximal Gromov hyperbolic spaces.\nConversely, we show that convergence of maximal Gromov hyperbolic spaces\ntogether with a natural hypothesis of ``equicontinuity"" on the boundaries\nimplies convergence of boundaries. We use this to show that Gromov-Hausdorff\nconvergence of a sequence of proper, geodesically complete CAT(-1) spaces\nimplies Gromov-Hausdorff convergence of their boundaries equipped with visual\nmetrics. We also show that convergence of maximal Gromov hyperbolic spaces to a\nmaximal Gromov hyperbolic space with finite boundary implies convergence of\nboundaries.\n', 'Sphericalization with its applications in Gromov hyperbolic spaces In this paper, we study certain applications of sphericalization in Gromov\nhyperbolic metric spaces. We first show that the doubling property regarding\ntwo classes of metrics on the Gromov boundary of hyperbolic spaces are\ncoincided. Next, we obtain a characterization of unbounded Gromov hyperbolic\ndomains via metric spaces sphericalization. Finally, we investigate the\ntopological equivalence of Gromov hyperbolic $\\varphi$-uniform domains between\nthe Gromov boundary and the inner metric boundary.\n']","[('gromov hyperbolic spaces', 0.8211418986320496), ('gromov hyperbolic space', 0.7949934601783752), ('hyperbolic spaces', 0.7304816842079163), ('gromov hyperbolicity', 0.7281255125999451), ('hyperbolic metric', 0.7228191494941711), ('metric hyperbolic', 0.7121182084083557), ('hyperbolic space', 0.7011472582817078), ('gromov hyperbolic', 0.678946852684021), ('gromov hausdorff distance', 0.6280235052108765), ('metric gromov', 0.608828604221344)]" 337,337,86,337_zeros random polynomials_random polynomials_polynomials random_random polynomial,"['zeros random polynomials', 'random polynomials', 'polynomials random', 'random polynomial', 'roots polynomials', 'kac polynomials', 'distribution roots', 'polynomials gaussian', 'asymptotics', 'gaussian coefficients']","['Real roots of random polynomials with coefficients of polynomial growth:\n a comparison principle and applications This paper seeks to further explore the distribution of the real roots of\nrandom polynomials with non-centered coefficients. We focus on polynomials\nwhere the typical values of the coefficients have power growth and count the\naverage number of real zeros. Almost all previous results require coefficients\nwith zero mean, and it is non-trivial to extend these results to the general\ncase. Our approach is based on a novel comparison principle that reduces the\ngeneral situation to the mean-zero setting. As applications, we obtain new\nresults for the Kac polynomials, hyperbolic random polynomials, their\nderivatives, and generalizations of these polynomials. The proof features new\nlogarithmic integrability estimates for random polynomials (both local and\nglobal) and fairly sharp estimates for the local number of real zeros.\n', 'Real roots of random polynomials: asymptotics of the variance We compute the precise leading asymptotics of the variance of the number of\nreal roots for a large class of random polynomials, where the random\ncoefficients have polynomial growth. Our results apply to many classical\nensembles, including the Kac polynomials, hyperbolic polynomials, their\nderivatives, and any linear combinations of these polynomials. Prior to this\npaper, such asymptotics was only established for the Kac polynomials in the\n1970s, with the seminal contribution of Maslova. The main ingredients of the\nproof are new asymptotic estimates for the two-point correlation function of\nthe real roots, revealing geometric structures in the distribution of the real\nroots of these random polynomials. As a corollary, we obtain asymptotic\nnormality for the real roots for these random polynomials, extending and\nstrengthening a related result of O. Nguyen and V. Vu.\n', ""Random polynomials: central limit theorems for the real roots The number of real roots has been a central subject in the theory of random\npolynomials and random functions since the fundamental papers of\nLittlewood-Offord and Kac in the 1940s. The main task here is to determine the\nlimiting distribution of this random variable.\n In 1974, Maslova famously proved a central limit theorem (CLT) for the number\nof real roots of Kac polynomials. It has remained the only limiting theorem\navailable for the number of real roots for more than four decades.\n In this paper, using a new approach, we derive a general CLT for the number\nof real roots of a large class of random polynomials with coefficients growing\npolynomially. Our result both generalizes and strengthens Maslova's theorem.\n""]","[('zeros random polynomials', 0.6439638137817383), ('random polynomials', 0.6188182830810547), ('polynomials random', 0.5634115934371948), ('random polynomial', 0.5495743155479431), ('roots polynomials', 0.5032581686973572), ('kac polynomials', 0.49521946907043457), ('distribution roots', 0.48071083426475525), ('polynomials gaussian', 0.46819230914115906), ('asymptotics', 0.4247668981552124), ('gaussian coefficients', 0.4169030785560608)]" 338,338,86,338_quasilinear elliptic equations_sobolev orlicz_orlicz sobolev spaces_orlicz sobolev,"['quasilinear elliptic equations', 'sobolev orlicz', 'orlicz sobolev spaces', 'orlicz sobolev', 'quasilinear elliptic', 'semilinear elliptic', 'musielak orlicz sobolev', 'multiplicity positive solutions', 'double phase', 'singular solutions']","['Positive solutions for singular double phase problems We study the existence of positive solutions for a class of double phase\nDirichlet equations which have the combined effects of a singular term and of a\nparametric superlinear term. The differential operator of the equation is the\nsum of a $p$-Laplacian and of a weighted $q$-Laplacian ($q0$, the equation has at least two positive\nsolutions.\n', 'Parametric superlinear double phase problems with singular term and\n critical growth on the boundary In this paper we study quasilinear elliptic equations driven by the double\nphase operator along with a reaction that has a singular and a parametric\nsuperlinear term and with a nonlinear Neumann boundary condition of critical\ngrowth. Based on a new equivalent norm for Musielak-Orlicz Sobolev spaces and\nthe Nehari manifold along with the fibering method we prove the existence of at\nleast two weak solutions provided the parameter is sufficiently small.\n', 'A new class of anisotropic double phase problems: exponents depending on\n solutions and their gradients In this work, we introduce two novel classes of quasilinear elliptic\nequations, each driven by the double phase operator with variable exponents.\nThe first class features a new double phase equation where exponents depend on\nthe gradient of the solution. We delve into proving various properties of the\ncorresponding Musielak-Orlicz Sobolev spaces, including the $\\Delta_2$\nproperty, uniform convexity, density and compact embedding. Additionally, we\nexplore the characteristics of the new double phase operator, such as\ncontinuity, strict monotonicity, and the (S$_+$)-property. Employing both\nvariational and nonvariational methods, we establish the existence of solutions\nfor this inaugural class of double phase equations. In the second category, the\ntreatment of exponents is dependent on the solution itself. This class differs\nfrom the first one due to the unavailability of suitable Musielak-Orlicz\nSobolev spaces. For this reason, we employ a perturbation argument that leads\nto the classical double phase class. These two new classes highlight how\ndifferent physical processes like the movement of special fluids through porous\nmaterials, phase changes, and fluid dynamics interact with each other. Our\nresults are novel in this context and includes a self-contained techniques.\n']","[('quasilinear elliptic equations', 0.5306101441383362), ('sobolev orlicz', 0.5152391195297241), ('orlicz sobolev spaces', 0.5035319924354553), ('orlicz sobolev', 0.4958511292934418), ('quasilinear elliptic', 0.483857125043869), ('semilinear elliptic', 0.46725597977638245), ('musielak orlicz sobolev', 0.46237000823020935), ('multiplicity positive solutions', 0.45546966791152954), ('double phase', 0.4536304473876953), ('singular solutions', 0.4430954158306122)]" 339,339,86,339_optimized schwarz methods_helmholtz equations_schwarz methods_methods helmholtz,"['optimized schwarz methods', 'helmholtz equations', 'schwarz methods', 'methods helmholtz', 'helmholtz problems', 'schwarz preconditioners', 'heterogeneous helmholtz', 'high frequency helmholtz', 'finite element discretisations', 'domain decomposition methods']","['Convergence of overlapping domain decomposition methods with PML\n transmission conditions applied to nontrapping Helmholtz problems We study overlapping Schwarz methods for the Helmholtz equation posed in any\ndimension with large, real wavenumber and smooth variable wave speed. The\nradiation condition is approximated by a Cartesian perfectly-matched layer\n(PML). The domain-decomposition subdomains are overlapping hyperrectangles with\nCartesian PMLs at their boundaries. The overlaps of the subdomains and the\nwidths of the PMLs are all taken to be independent of the wavenumber.\n For both parallel (i.e., additive) and sequential (i.e., multiplicative)\nmethods, we show that after a specified number of iterations -- depending on\nthe behaviour of the geometric-optic rays -- the error is smooth and smaller\nthan any negative power of the wavenumber. For the parallel method, the\nspecified number of iterations is less than the maximum number of subdomains,\ncounted with their multiplicity, that a geometric-optic ray can intersect.\n These results, which are illustrated by numerical experiments, are the first\nwavenumber-explicit results about convergence of overlapping Schwarz methods\nfor the Helmholtz equation, and the first wavenumber-explicit results about\nconvergence of any domain-decomposition method for the Helmholtz equation with\na non-trivial scatterer (here a variable wave speed).\n', 'Two-level hybrid Schwarz Preconditioners for The Helmholtz Equation with\n high wave number In this work, we propose and analyze two two-level hybrid Schwarz\npreconditioners for solving the Helmholtz equation with high wave number in two\nand three dimensions. Both preconditioners are defined over a set of\noverlapping subdomains, with each preconditioner formed by a global coarse\nsolver and one local solver on each subdomain. The global coarse solver is\nbased on the localized orthogonal decomposition (LOD) technique, which was\nproposed in [30,31] originally for the discretization schemes for elliptic\nmultiscale problems with heterogeneous and highly oscillating coefficients and\nHelmholtz problems with high wave number to eliminate the pollution effect. The\nlocal subproblems are Helmholtz problems in subdomains with homogeneous\nboundary conditions (the first preconditioner) or impedance boundary conditions\n(the second preconditioner). Both preconditioners are shown to be optimal under\nsome reasonable conditions, that is, a uniform upper bound of the\npreconditioned operator norm and a uniform lower bound of the field of values\nare established in terms of all the key parameters, such as the fine mesh size,\nthe coarse mesh size, the subdomain size and the wave numbers. It is the first\ntime to show that the LOD solver can be a very effective coarse solver when it\nis used appropriately in the Schwarz method with multiple overlapping\nsubdomains. Numerical experiments are presented to confirm the optimality and\nefficiency of the two proposed preconditioners.\n', 'Convergence theory for two-level hybrid Schwarz preconditioners for\n high-frequency Helmholtz problems We give a novel convergence theory for two-level hybrid Schwarz\ndomain-decomposition (DD) methods for finite-element discretisations of the\nhigh-frequency Helmholtz equation. This theory gives sufficient conditions for\nthe preconditioned matrix to be close to the identity, and covers DD subdomains\nof arbitrary size, and arbitrary absorbing layers/boundary conditions on both\nthe global and local Helmholtz problems. The assumptions on the coarse space\nare satisfied by the approximation spaces using problem-adapted basis functions\nthat have been recently analysed as coarse spaces for the Helmholtz equation,\nas well as all spaces that are known to be quasi-optimal via a Schatz-type\nargument.\n As an example, we apply this theory when the coarse space consists of\npiecewise polynomials; these are then the first rigorous convergence results\nabout a two-level Schwarz preconditioner applied to the high-frequency\nHelmholtz equation with a coarse space that does not consist of problem-adapted\nbasis functions.\n']","[('optimized schwarz methods', 0.6129418611526489), ('helmholtz equations', 0.5659035444259644), ('schwarz methods', 0.5560148358345032), ('methods helmholtz', 0.5517004728317261), ('helmholtz problems', 0.5374416708946228), ('schwarz preconditioners', 0.5252017378807068), ('heterogeneous helmholtz', 0.5033714771270752), ('high frequency helmholtz', 0.47463148832321167), ('finite element discretisations', 0.467978835105896), ('domain decomposition methods', 0.45804449915885925)]" 340,340,85,340_graph neural networks_graph neural_graph convolutional neural_graph convolutional networks,"['graph neural networks', 'graph neural', 'graph convolutional neural', 'graph convolutional networks', 'graph neural network', 'graph learning', 'neural networks graph', 'networks gnns', 'graph representation learning', 'learning graph']","[""Optimization of Graph Neural Networks: Implicit Acceleration by Skip\n Connections and More Depth Graph Neural Networks (GNNs) have been studied through the lens of expressive\npower and generalization. However, their optimization properties are less well\nunderstood. We take the first step towards analyzing GNN training by studying\nthe gradient dynamics of GNNs. First, we analyze linearized GNNs and prove that\ndespite the non-convexity of training, convergence to a global minimum at a\nlinear rate is guaranteed under mild assumptions that we validate on real-world\ngraphs. Second, we study what may affect the GNNs' training speed. Our results\nshow that the training of GNNs is implicitly accelerated by skip connections,\nmore depth, and/or a good label distribution. Empirical results confirm that\nour theoretical results for linearized GNNs align with the training behavior of\nnonlinear GNNs. Our results provide the first theoretical support for the\nsuccess of GNNs with skip connections in terms of optimization, and suggest\nthat deep GNNs with skip connections would be promising in practice.\n"", 'GraphNorm: A Principled Approach to Accelerating Graph Neural Network\n Training Normalization is known to help the optimization of deep neural networks.\nCuriously, different architectures require specialized normalization methods.\nIn this paper, we study what normalization is effective for Graph Neural\nNetworks (GNNs). First, we adapt and evaluate the existing methods from other\ndomains to GNNs. Faster convergence is achieved with InstanceNorm compared to\nBatchNorm and LayerNorm. We provide an explanation by showing that InstanceNorm\nserves as a preconditioner for GNNs, but such preconditioning effect is weaker\nwith BatchNorm due to the heavy batch noise in graph datasets. Second, we show\nthat the shift operation in InstanceNorm results in an expressiveness\ndegradation of GNNs for highly regular graphs. We address this issue by\nproposing GraphNorm with a learnable shift. Empirically, GNNs with GraphNorm\nconverge faster compared to GNNs using other normalization. GraphNorm also\nimproves the generalization of GNNs, achieving better performance on graph\nclassification benchmarks.\n', ""On the Expressive Power of Geometric Graph Neural Networks The expressive power of Graph Neural Networks (GNNs) has been studied\nextensively through the Weisfeiler-Leman (WL) graph isomorphism test. However,\nstandard GNNs and the WL framework are inapplicable for geometric graphs\nembedded in Euclidean space, such as biomolecules, materials, and other\nphysical systems. In this work, we propose a geometric version of the WL test\n(GWL) for discriminating geometric graphs while respecting the underlying\nphysical symmetries: permutations, rotation, reflection, and translation. We\nuse GWL to characterise the expressive power of geometric GNNs that are\ninvariant or equivariant to physical symmetries in terms of distinguishing\ngeometric graphs. GWL unpacks how key design choices influence geometric GNN\nexpressivity: (1) Invariant layers have limited expressivity as they cannot\ndistinguish one-hop identical geometric graphs; (2) Equivariant layers\ndistinguish a larger class of graphs by propagating geometric information\nbeyond local neighbourhoods; (3) Higher order tensors and scalarisation enable\nmaximally powerful geometric GNNs; and (4) GWL's discrimination-based\nperspective is equivalent to universal approximation. Synthetic experiments\nsupplementing our results are available at\n\\url{https://github.com/chaitjo/geometric-gnn-dojo}\n""]","[('graph neural networks', 0.718954861164093), ('graph neural', 0.6804763674736023), ('graph convolutional neural', 0.6569922566413879), ('graph convolutional networks', 0.6547192931175232), ('graph neural network', 0.6534029245376587), ('graph learning', 0.6505913138389587), ('neural networks graph', 0.6398795247077942), ('networks gnns', 0.6215394139289856), ('graph representation learning', 0.6060059666633606), ('learning graph', 0.5868319272994995)]" 341,341,85,341_fractional diffusion equations_fractional diffusion_time fractional diffusion_fractional diffusion wave,"['fractional diffusion equations', 'fractional diffusion', 'time fractional diffusion', 'fractional diffusion wave', 'fractional reaction diffusion', 'fractional pdes', 'time fractional derivative', 'fractional derivatives', 'fractional derivative', 'time fractional']","['Inverse source problem with a posteriori boundary measurement for\n fractional diffusion equations In this article we study inverse source problems for time-fractional\ndiffusion equations from \\textit{a posteriori} boundary measurement. Using the\nmemory effect of these class of equations, we solve these inverse problems for\nseveral class of space or time dependent source terms. We prove also the unique\ndetermination of a general class of space-time dependent separated variables\nsource terms from such measurement. Our approach is based on the study of\nsingularities of the Laplace transform in time of boundary traces of solutions\nof time-fractional diffusion equations.\n', 'Logarithmic stable recovery of the source and the initial state of time\n fractional diffusion equations In this paper we study the inverse problem of identifying a source or an\ninitial state in a time-fractional diffusion equation from the knowledge of a\nsingle boundary measurement. We derive logarithmic stability estimates for both\ninversions. These results show that the ill-posedness increases exponentially\nwhen the fractional derivative order tends to zero, while it exponentially\ndecreases when the regularity of the source or the initial state becomes\nlarger. The stability estimate concerning the problem of recovering the initial\nstate can be considered as a weak observability inequality in control theory.\nThe analysis is mainly based on Laplace inversion techniques and a precise\nquantification of the unique continuation property for the resolvent of the\ntime-fractional diffusion operator as a function of the frequency in the\ncomplex plane. We also determine a global time regularity for the\ntime-fractional diffusion equation which is of interest itself.\n', 'Simultaneous uniqueness for multiple parameters identification in a\n fractional diffusion-wave equation This article deals with the uniqueness in identifying multiple parameters\nsimultaneously in the one-dimensional time-fractional diffusion-wave equation\nof fractional time-derivative order $\\in (0,2)$ with the zero Robin boundary\ncondition. Using the Laplace transform and a transformation formula, we prove\nthe uniqueness in determining an order of the fractional derivative, a\nspatially varying potential, initial values and Robin coefficients\nsimultaneously by boundary measurement data, provided that all the eigenmodes\nof an initial value do not vanish. Furthermore, for another formulation of\ninverse problem with input source term in place of initial value, by the\nuniqueness in the case of non-zero initial value and a Duhamel principle, we\nprove the simultaneous uniqueness in determining multiple parameters for a\ntime-fractional diffusion-wave equation.\n']","[('fractional diffusion equations', 0.7531884908676147), ('fractional diffusion', 0.7412456274032593), ('time fractional diffusion', 0.7405505180358887), ('fractional diffusion wave', 0.7209903001785278), ('fractional reaction diffusion', 0.6577085852622986), ('fractional pdes', 0.6560023427009583), ('time fractional derivative', 0.5913410186767578), ('fractional derivatives', 0.5319929718971252), ('fractional derivative', 0.5246750712394714), ('time fractional', 0.5057593584060669)]" 342,342,85,342_ricci curvatures_ollivier ricci curvature_ricci curvature_ricci curvature bound,"['ricci curvatures', 'ollivier ricci curvature', 'ricci curvature', 'ricci curvature bound', 'coarse ricci curvature', 'lower ricci curvature', 'discrete curvature', 'curvature free', 'curvatures', 'ollivier ricci']","['The convergence and uniqueness of a discrete-time nonlinear Markov chain In this paper, we prove the convergence and uniqueness of a general\ndiscrete-time nonlinear Markov chain with specific conditions. The results have\nimportant applications in discrete differential geometry. First, on a general\nfinite weighted graph, we prove the discrete-time Ollivier Ricci curvature flow\n$d_{n+1}\\coloneqq(1-\\alpha\\kappa_{d_{n}})d_{n}$ converges to a constant\ncurvature metric. Then the author in \\cite[Theorem 5.1]{M23} proved a Laplacian\nseparation principle on a locally finite graph with non-negative Ollivier\ncurvature. Here we prove the Laplacian separation flow converges to the\nconstant Laplacian solution and generalize the result to nonlinear $p$-Laplace\noperators. Moreover, our results can also be applied to study the long-time\nbehavior in the nonlinear Dirichlet forms theory and nonlinear\nPerron--Frobenius theory. At last, we define the Ollivier Ricci curvature of\nnonlinear Markov chain which is consistent with the classical Ollivier Ricci\ncurvature, sectional curvature \\cite{CMS24}, coarse Ricci curvature on\nhypergraphs \\cite{IKTU21} and the modified Ollivier Ricci curvature for\n$p$-Laplace. And we prove the convergence results for the nonlinear Markov\nchain with nonnegative Ollivier Ricci curvature.\n', 'Ollivier-Ricci curvature of regular graphs We derive explicit formulas for the Lin-Lu-Yau curvature and the\nOllivier-Ricci curvature in terms of graph parameters and an optimal\nassignment. Utilizing these precise expressions, we examine the relationship\nbetween the Lin-Lu-Yau curvature and the 0-Ollivier-Ricci curvature, resulting\nin an equality condition on regular graphs. This condition allows us to\ncharacterize edges that are bone idle in regular graphs of girth four and to\nconstruct a family of bone idle graphs with this girth. We then use our\nformulas to provide an efficient implementation of the Ollivier-Ricci curvature\non regular graphs, enabling us to identify all bone idle, regular graphs with\nfewer than 15 vertices. Moreover, we establish a rigidity theorem for cocktail\nparty graphs, proving that a regular graph is a cocktail party graph if and\nonly if its Lin-Lu-Yau curvature is equal to one. Furthermore, we present a\ncondition on the degree of a regular graph that guarantees positive Ricci\ncurvature. We conclude this work by discussing the maximal number of vertices\nthat a regular graph of fixed degree with positive Lin-Lu-Yau curvature can\nhave.\n', 'Discrete Ollivier-Ricci curvature We analyze both continuous and discrete-time Ollivier-Ricci curvatures of\nlocally-finite weighted graphs $\\G$ equipped with a given distance ""$\\dist$""\n(w.r.t. which $\\G$ is metrically complete) and for general random walks. We\nshow the continuous-time Ollivier-Ricci curvature is well-defined for a large\nclass of Markovian and non-Markovian random walks and provide a criterion for\nexistence of continuous-time Ollivier-Ricci curvature; the said results\ngeneralize the previous rather limited constructions in the literature. In\naddition, important properties of both discrete-time and continuous-time\nOllivier-Ricci curvatures are obtained including -- to name a few -- Lipschitz\ncontinuity, concavity properties, piece-wise regularity (piece-wise linearity\nin the case of linear walks) for the discrete-time Ollivier-Ricci as well as\nLipschitz continuity and limit-free formulation for the continuous-time\nOllivier-Ricci. these properties were previously known only for very specific\ndistances and very specific random walks. As an application of Lipschitz\ncontinuity, we obtain existence and uniqueness of generalized continuous-time\nOllivier-Ricci curvature flows. Along the way, we obtain -- by optimizing\nMcMullen\'s upper bounds -- a sharp upper bound estimate on the number of\nvertices of a convex polytope in terms of number of its facets and the ambient\ndimension, which might be of independent interest in convex geometry. The said\nupper bound allows us to bound the number of polynomial pieces of the\ndiscrete-time Ollivier-Ricci curvature as a function of time in the\ntime-polynomial random walk. The limit-free formulation we establish allows us\nto define an operator theoretic Ollivier-Ricci curvature which is a non-linear\nconcave functional on suitable operator spaces.\n']","[('ricci curvatures', 0.6258651614189148), ('ollivier ricci curvature', 0.6190553903579712), ('ricci curvature', 0.5951210260391235), ('ricci curvature bound', 0.5888552665710449), ('coarse ricci curvature', 0.5876798033714294), ('lower ricci curvature', 0.5697886347770691), ('discrete curvature', 0.548794150352478), ('curvature free', 0.5263609886169434), ('curvatures', 0.5157896280288696), ('ollivier ricci', 0.509640097618103)]" 343,343,85,343_rogers ramanujan identities_identities rogers ramanujan_ramanujan type identities_ramanujan identities,"['rogers ramanujan identities', 'identities rogers ramanujan', 'ramanujan type identities', 'ramanujan identities', 'identities ramanujan', 'rogers ramanujan type', 'series identities', 'ramanujan type', 'identities rogers', 'rogers ramanujan']","['Rogers-Ramanujan type identities and Chebyshev Polynomials of the third\n kind It is known that $q$-orthogonal polynomials play an important role in the\nfield of $q$-series and special functions. During studying Dyson\'s ""favorite""\nidentity of Rogers--Ramanujan type, Andrews pointed out that the classical\northogonal polynomials also have surprising applications in the world of $q$.\nBy inserting Chebyshev polynomials of the third and the fourth kinds into\nBailey pairs, Andrews derived a family of Rogers--Ramanujan type identities and\nalso results related to mock theta functions and Hecke--type series. In this\npaper, by constructing a new Bailey pair involving Chebyshev polynomials of the\nthird kind, we further extend Andrews\' way in the studying of Rogers--Ramanujan\ntype identities. By fitting this Bailey pair into different weak forms of\nBailey\'s lemma, we obtain a companion identity to Dyson\'s favorite one and also\nmany other Rogers--Ramanujan type identities. Furthermore, as immediate\nconsequences, we also obtain some results related to Appell--Lerch series and\nthe generalized Hecke--type series.\n', ""Bilateral Bailey pairs and Rogers-Ramanujan type identities Rogers-Ramanujan type identities occur in various branches of mathematics and\nphysics. As a classic and powerful tool to deal with Rogers-Ramanujan type\nidentities, the theory of Bailey's lemma has been extensively studied and\ngeneralized. In this paper, we found a bilateral Bailey pair that naturally\narises from the q-binomial theorem. By applying the bilateral versions of\nBailey lemmas, Bailey chains and Bailey lattices, we derive a number of\nRogers-Ramanujan type identities, which unify many known identities as special\ncases. Further combined with the bilateral Bailey chains due to Berkovich,\nMcCoy and Schilling and the bilateral Bailey lattices due to Jouhet et al., we\nalso obtain identities on Appell-Lerch series and identities of Andrews-Gordon\ntype. Moreover, by applying Andrews and Warnaar's bilateral Bailey lemmas, we\nderive identities on Hecke-type series.\n"", 'Rogers-Ramanujan Type Identities Involving Double Sums We prove four new Rogers-Ramanujan-type identities for double series. They\nfollow from the classical Rogers-Ramanujan identities using the constant term\nmethod and properties of Rogers-Szeg\\H{o} polynomials.\n']","[('rogers ramanujan identities', 0.8194177150726318), ('identities rogers ramanujan', 0.7887154221534729), ('ramanujan type identities', 0.7881442308425903), ('ramanujan identities', 0.7563080787658691), ('identities ramanujan', 0.7226468324661255), ('rogers ramanujan type', 0.5869064927101135), ('series identities', 0.5439280271530151), ('ramanujan type', 0.540023684501648), ('identities rogers', 0.5276141166687012), ('rogers ramanujan', 0.5022078156471252)]" 344,344,85,344_scalar curvature conformal_curvature conformal_conformal metrics_prescribed scalar curvature,"['scalar curvature conformal', 'curvature conformal', 'conformal metrics', 'prescribed scalar curvature', 'curvature metrics', 'positive scalar curvature', 'conformal metric', 'scalar curvatures', 'metrics constant curvature', 'metric conformal']","[""A generalization of Aubin's result for a Yamabe-type problem on smooth\n metric measure spaces The Yamabe problem in compact closed Riemannian manifolds is concerned with\nfinding a metric with constant scalar curvature in the conformal class of a\ngiven metric. This problem was solved by the combined work of Yamabe,\nTrudinger, Aubin, and Schoen. In particular, Aubin solved the case when the\nRiemannian manifold is compact, is nonlocally conformally flat and has a\ndimension equal to or greater than $6$. In $2015$, Case considered a\nYamabe-type problem in the setting of smooth measure space in manifolds and for\na parameter $m$, which generalizes the original Yamabe problem when $m=0$.\nAdditionally, Case solved this problem when the parameter $m$ is a natural\nnumber. In the context of the Yamabe-type problem, we generalize Aubin's result\nfor nonlocally conformally flat manifolds, with dimension equal and greater\nthan 6 and parameter $m$ close to nonnegative integers.\n"", 'A compactness theorem for conformal metrics with constant scalar\n curvature and constant boundary mean curvature in dimension three On a compact three-dimensional Riemannian manifold with boundary, we prove\nthe compactness of the full set of conformal metrics with positive constant\nscalar curvature and constant mean curvature on the boundary. This involves a\nblow-up analysis of a Yamabe equation with critical Sobolev exponents both in\nthe interior and on the boundary.\n', 'A priori estimates for negative constant scalar curvature conformal\n metrics with positive constant boundary mean curvature On a compact Riemannian manifold with boundary, we study the set of conformal\nmetrics of negative constant scalar curvature in the interior and positive\nconstant mean curvature on the boundary. Working in the case of positive Yamabe\nconformal invariant, we prove that this set is a priori bounded in the\nthree-dimensional case and in the locally conformally flat with umbilical\nboundary case in any dimension not less than three.\n']","[('scalar curvature conformal', 0.6955310702323914), ('curvature conformal', 0.668799102306366), ('conformal metrics', 0.642512857913971), ('prescribed scalar curvature', 0.6367846727371216), ('curvature metrics', 0.6339276432991028), ('positive scalar curvature', 0.6248174905776978), ('conformal metric', 0.6118388175964355), ('scalar curvatures', 0.6091641783714294), ('metrics constant curvature', 0.6082251667976379), ('metric conformal', 0.6070050001144409)]" 345,345,85,345_lorentzian metrics_minkowski spacetime_lorentzian metric_lorentzian manifolds,"['lorentzian metrics', 'minkowski spacetime', 'lorentzian metric', 'lorentzian manifolds', 'lorentzian geometry', 'lorentzian manifold', 'globally hyperbolic lorentzian', 'length spaces', 'hyperbolic spacetimes', 'globally hyperbolic spacetimes']","['Comparison theorems for Lorentzian length spaces with lower timelike\n curvature bounds In this article we introduce a notion of normalized angle for Lorentzian\npre-length spaces. This concept allows us to prove some equivalences to the\ndefinition of timelike curvature bounds from below for Lorentzian pre-length\nspaces. Specifically, we establish some comparison theorems known as the local\nLorentzian version of the Toponogov theorem and the Alexandrov convexity\nproperty. Finally, as an application we obtain a first variation Formula for\nnon-negatively curved globally hyperbolic Lorentzian length spaces.\n', ""Lorentzian metric spaces and their Gromov-Hausdorff convergence We present an abstract approach to Lorentzian Gromov-Hausdorff distance and\nconvergence, and an alternative approach to Lorentzian length spaces that does\nnot use auxiliary ``positive signature'' metrics or other unobserved fields. We\nbegin by defining a notion of (abstract) bounded Lorentzian-metric space which\nis sufficiently general to comprise compact causally convex subsets of globally\nhyperbolic spacetimes and causets. We define the Gromov-Hausdorff distance and\nshow that two bounded Lorentzian-metric spaces at zero GH distance are indeed\nboth isometric and homeomorphic. Then we show how to define from the Lorentzian\ndistance, beside topology, the causal relation and the causal curves for these\nspaces, obtaining useful limit curve theorems. Next, we define Lorentzian\n(length) prelength spaces via suitable (maximal) chronal connectedness\nproperties. These definitions are proved to be stable under GH limits.\nFurthermore, we define bounds on sectional curvature for our Lorentzian length\nspaces and prove that they are also stable under GH limits. We conclude with a\n(pre)compactness theorem.\n"", 'Null distance and convergence of Lorentzian length spaces The null distance of Sormani and Vega encodes the manifold topology as well\nas the causality structure of a (smooth) spacetime. We extend this concept to\nLorentzian length spaces, the analog of (metric) length spaces, which\ngeneralize Lorentzian causality theory beyond the manifold level. We then study\nGromov-Hausdorff convergence based on the null distance in warped product\nLorentzian length spaces and prove first results on its compatibility with\nsynthetic curvature bounds.\n']","[('lorentzian metrics', 0.6775479316711426), ('minkowski spacetime', 0.632887601852417), ('lorentzian metric', 0.6293992400169373), ('lorentzian manifolds', 0.6085663437843323), ('lorentzian geometry', 0.6019105911254883), ('lorentzian manifold', 0.5944165587425232), ('globally hyperbolic lorentzian', 0.5730610489845276), ('length spaces', 0.565985918045044), ('hyperbolic spacetimes', 0.550629198551178), ('globally hyperbolic spacetimes', 0.5438529849052429)]" 346,346,85,346_reduced order modeling_reduced order modelling_nonlinear reduction_reduced order models,"['reduced order modeling', 'reduced order modelling', 'nonlinear reduction', 'reduced order models', 'deep learning', 'reduced dynamics', 'parametrized pdes', 'deep learning based', 'dimensionality reduction', 'nonlinear time dependent']","[""Long-time prediction of nonlinear parametrized dynamical systems by deep\n learning-based reduced order models Deep learning-based reduced order models (DL-ROMs) have been recently\nproposed to overcome common limitations shared by conventional ROMs - built,\ne.g., exclusively through proper orthogonal decomposition (POD) - when applied\nto nonlinear time-dependent parametrized PDEs. In particular, POD-DL-ROMs can\nachieve extreme efficiency in the training stage and faster than real-time\nperformances at testing, thanks to a prior dimensionality reduction through POD\nand a DL-based prediction framework. Nonetheless, they share with conventional\nROMs poor performances regarding time extrapolation tasks. This work aims at\ntaking a further step towards the use of DL algorithms for the efficient\nnumerical approximation of parametrized PDEs by introducing the $\\mu\nt$-POD-LSTM-ROM framework. This novel technique extends the POD-DL-ROM\nframework by adding a two-fold architecture taking advantage of long short-term\nmemory (LSTM) cells, ultimately allowing long-term prediction of complex\nsystems' evolution, with respect to the training window, for unseen input\nparameter values. Numerical results show that this recurrent architecture\nenables the extrapolation for time windows up to 15 times larger than the\ntraining time domain, and achieves better testing time performances with\nrespect to the already lightning-fast POD-DL-ROMs.\n"", 'POD-DL-ROM: enhancing deep learning-based reduced order models for\n nonlinear parametrized PDEs by proper orthogonal decomposition Deep learning-based reduced order models (DL-ROMs) have been recently\nproposed to overcome common limitations shared by conventional reduced order\nmodels (ROMs) - built, e.g., through proper orthogonal decomposition (POD) -\nwhen applied to nonlinear time-dependent parametrized partial differential\nequations (PDEs). These might be related to (i) the need to deal with\nprojections onto high dimensional linear approximating trial manifolds, (ii)\nexpensive hyper-reduction strategies, or (iii) the intrinsic difficulty to\nhandle physical complexity with a linear superimposition of modes. All these\naspects are avoided when employing DL-ROMs, which learn in a non-intrusive way\nboth the nonlinear trial manifold and the reduced dynamics, by relying on deep\n(e.g., feedforward, convolutional, autoencoder) neural networks. Although\nextremely efficient at testing time, when evaluating the PDE solution for any\nnew testing-parameter instance, DL-ROMs require an expensive training stage,\nbecause of the extremely large number of network parameters to be estimated. In\nthis paper we propose a possible way to avoid an expensive training stage of\nDL-ROMs, by (i) performing a prior dimensionality reduction through POD, and\n(ii) relying on a multi-fidelity pretraining stage, where different physical\nmodels can be efficiently combined. The proposed POD-DL-ROM is tested on\nseveral (both scalar and vector, linear and nonlinear) time-dependent\nparametrized PDEs (such as, e.g., linear advection-diffusion-reaction,\nnonlinear diffusion-reaction, nonlinear elastodynamics, and Navier-Stokes\nequations) to show the generality of this approach and its remarkable\ncomputational savings.\n', 'A comprehensive deep learning-based approach to reduced order modeling\n of nonlinear time-dependent parametrized PDEs Traditional reduced order modeling techniques such as the reduced basis (RB)\nmethod (relying, e.g., on proper orthogonal decomposition (POD)) suffer from\nsevere limitations when dealing with nonlinear time-dependent parametrized\nPDEs, because of the fundamental assumption of linear superimposition of modes\nthey are based on. For this reason, in the case of problems featuring coherent\nstructures that propagate over time such as transport, wave, or\nconvection-dominated phenomena, the RB method usually yields inefficient\nreduced order models (ROMs) if one aims at obtaining reduced order\napproximations sufficiently accurate compared to the high-fidelity, full order\nmodel (FOM) solution. To overcome these limitations, in this work, we propose a\nnew nonlinear approach to set reduced order models by exploiting deep learning\n(DL) algorithms. In the resulting nonlinear ROM, which we refer to as DL-ROM,\nboth the nonlinear trial manifold (corresponding to the set of basis functions\nin a linear ROM) as well as the nonlinear reduced dynamics (corresponding to\nthe projection stage in a linear ROM) are learned in a non-intrusive way by\nrelying on DL algorithms; the latter are trained on a set of FOM solutions\nobtained for different parameter values. In this paper, we show how to\nconstruct a DL-ROM for both linear and nonlinear time-dependent parametrized\nPDEs; moreover, we assess its accuracy on test cases featuring different\nparametrized PDE problems. Numerical results indicate that DL-ROMs whose\ndimension is equal to the intrinsic dimensionality of the PDE solutions\nmanifold are able to approximate the solution of parametrized PDEs in\nsituations where a huge number of POD modes would be necessary to achieve the\nsame degree of accuracy.\n']","[('reduced order modeling', 0.5194048285484314), ('reduced order modelling', 0.5048559308052063), ('nonlinear reduction', 0.4615936577320099), ('reduced order models', 0.4418022036552429), ('deep learning', 0.4123944640159607), ('reduced dynamics', 0.3798721432685852), ('parametrized pdes', 0.3726089596748352), ('deep learning based', 0.37121137976646423), ('dimensionality reduction', 0.36696410179138184), ('nonlinear time dependent', 0.3648185431957245)]" 347,347,84,347_foliations manifolds_singular foliations_foliated manifolds_riemannian foliations,"['foliations manifolds', 'singular foliations', 'foliated manifolds', 'riemannian foliations', 'singular foliation', 'foliated manifold', 'riemannian foliation', 'dimensional foliations', 'foliations', 'foliations compact']","['A classification of neighborhoods around leaves of a singular foliation We classify singular foliations admitting a given leaf and a given transverse\nsingular foliation.\n', ""Leaf closures of Riemannian foliations: a survey on topological and\n geometric aspects of Killing foliations A smooth foliation is Riemannian when its leaves are locally equidistant. The\nclosures of the leaves of a Riemannian foliation on a simply connected\nmanifold, or more generally of a Killing foliation, are described by flows of\ntransverse Killing vector fields. This offers significant technical advantages\nin the study of this class of foliations, which nonetheless includes other\nimportant classes, such as those given by the orbits of isometric Lie group\nactions. Aiming at a broad audience, in this survey we introduce Killing\nfoliations from the very basics, starting with a brief revision of the main\nobjects appearing in this theory, such as pseudogroups, sheaves, holonomy and\nbasic cohomology. We then review Molino's structural theory for Riemannian\nfoliations and present its transverse counterpart in the theory of complete\npseudogroups of isometries, emphasizing the connections between these topics.\nWe also survey some classical results and recent developments in the theory of\nKilling foliations. Finally, we review some topics in the theory of singular\nRiemannian foliations and discuss singular Killing foliations.\n"", ""Singular foliations through diffeology A singular foliation is a partition of a manifold into leaves of perhaps\nvarying dimension. Stefan and Sussmann carried out fundamental work on singular\nfoliations in the 1970s. We survey their contributions, show how diffeological\nobjects and ideas arise naturally in this setting, and highlight some\nconsequences within diffeology. We then introduce a definition of transverse\nequivalence of singular foliations, following Molino's definition for regular\nfoliations. We show that, whereas transverse equivalent singular foliations\nalways have diffeologically diffeomorphic leaf spaces, the converse holds only\nfor certain classes of singular foliations. We finish by showing that the basic\ncohomology of a singular foliation is invariant under transverse equivalence.\n""]","[('foliations manifolds', 0.8084205985069275), ('singular foliations', 0.8074313998222351), ('foliated manifolds', 0.7747153043746948), ('riemannian foliations', 0.7691821455955505), ('singular foliation', 0.7579966187477112), ('foliated manifold', 0.7579653263092041), ('riemannian foliation', 0.7433251738548279), ('dimensional foliations', 0.7333378195762634), ('foliations', 0.7264592051506042), ('foliations compact', 0.7133316993713379)]" 348,348,84,348_finite element exterior_element exterior calculus_exterior calculus_finite element spaces,"['finite element exterior', 'element exterior calculus', 'exterior calculus', 'finite element spaces', 'differential forms', 'tetrahedral meshes', 'de rham complexes', 'geometric decompositions', 'finite element space', 'hilbert complexes']","[""Symmetry and Invariant Bases in Finite Element Exterior Calculus We study symmetries of bases and spanning sets in finite element exterior\ncalculus, using representation theory. We want to know which vector-valued\nfinite element spaces have bases invariant under permutation of vertex indices.\nThe permutations of vertex indices correspond to the symmetry group of the\nsimplex. That symmetry group is represented on simplicial finite element spaces\nby the pullback action. We determine a natural notion of invariance and\nsufficient conditions on the dimension and polynomial degree for the existence\nof invariant bases. We conjecture that these conditions are necessary too. We\nutilize Djokovi\\'c and Malzan's classification of monomial irreducible\nrepresentations of the symmetric group, and show new symmetries of the\ngeometric decomposition and canonical isomorphisms of the finite element\nspaces. Explicit invariant bases with complex coefficients are constructed in\ndimensions two and three for different spaces of finite element differential\nforms.\n"", 'Finite Element de Rham and Stokes Complexes in Three Dimensions Finite element de Rham complexes and finite element Stokes complexes with\nvarious smoothness in three dimensions are systematically constructed. First\nsmooth scalar finite elements in three dimensions are derived through a\nnon-overlapping decomposition of the simplicial lattice. Based on the smooth\nscalar finite elements, both H(div)-conforming finite elements and\nH(curl)-conforming finite elements with various smoothness are devised, which\ninduce the finite element de Rham complexes with various smoothness and the\nassociated commutative diagrams. The div stability is established for the\nH(div)-conforming finite elements, and the exactness of these finite element\ncomplexes.\n', 'Conforming Finite Element Function Spaces in Four Dimensions, Part II:\n The Pentatope and Tetrahedral Prism In this paper, we present explicit expressions for conforming finite element\nfunction spaces, basis functions, and degrees of freedom on the pentatope and\ntetrahedral prism elements. More generally, our objective is to construct\nfinite element function spaces that maintain conformity with\ninfinite-dimensional spaces of a carefully chosen de Rham complex. This paper\nis a natural extension of the companion paper entitled ""Conforming Finite\nElement Function Spaces in Four Dimensions, Part I: Foundational Principles and\nthe Tesseract"" by Nigam and Williams, (2023). In contrast to Part I, in this\npaper we focus on two of the most popular elements which do not possess a full\ntensor-product structure in all four coordinate directions. We note that these\nelements appear frequently in existing space-time finite element methods. In\norder to build our finite element spaces, we utilize powerful techniques from\nthe recently developed \'Finite Element Exterior Calculus\'. Subsequently, we\ntranslate our results into the well-known language of linear algebra (vectors\nand matrices) in order to facilitate implementation by scientists and\nengineers.\n']","[('finite element exterior', 0.5510908961296082), ('element exterior calculus', 0.5447045564651489), ('exterior calculus', 0.5252583622932434), ('finite element spaces', 0.49445343017578125), ('differential forms', 0.48843318223953247), ('tetrahedral meshes', 0.4767918288707733), ('de rham complexes', 0.47433748841285706), ('geometric decompositions', 0.4639429748058319), ('finite element space', 0.45623764395713806), ('hilbert complexes', 0.43423527479171753)]" 349,349,84,349_information decomposition_partial information decomposition_information theoretic_information theoretic quantities,"['information decomposition', 'partial information decomposition', 'information theoretic', 'information theoretic quantities', 'information theoretic approaches', 'information theoretic measures', 'higher order information', 'redundant information', 'mutual information', 'partial information']","['A scalable, synergy-first backbone decomposition of higher-order\n structures in complex systems Since its introduction in 2011, the partial information decomposition (PID)\nhas triggered an explosion of interest in the field of multivariate information\ntheory and the study of emergent, higher-order (""synergistic"") interactions in\ncomplex systems. Despite its power, however, the PID has a number of\nlimitations that restrict its general applicability: it scales poorly with\nsystem size and the standard approach to decomposition hinges on a definition\nof ""redundancy"", leaving synergy only vaguely defined as ""that information not\nredundant."" Other heuristic measures, such as the O-information, have been\nintroduced, although these measures typically only provided a summary statistic\nof redundancy/synergy dominance, rather than direct insight into the synergy\nitself. To address this issue, we present an alternative decomposition that is\nsynergy-first, scales much more gracefully than the PID, and has a\nstraightforward interpretation. Our approach defines synergy as that\ninformation in a set that would be lost following the minimally invasive\nperturbation on any single element. By generalizing this idea to sets of\nelements, we construct a totally ordered ""backbone"" of partial synergy atoms\nthat sweeps systems scales. Our approach starts with entropy, but can be\ngeneralized to the Kullback-Leibler divergence, and by extension, to the total\ncorrelation and the single-target mutual information. Finally, we show that\nthis approach can be used to decompose higher-order interactions beyond just\ninformation theory: we demonstrate this by showing how synergistic combinations\nof pairwise edges in a complex network supports signal communicability and\nglobal integration. We conclude by discussing how this perspective on\nsynergistic structure (information-based or otherwise) can deepen our\nunderstanding of part-whole relationships in complex systems.\n', 'A partial information decomposition for discrete and continuous\n variables Conceptually, partial information decomposition (PID) is concerned with\nseparating the information contributions several sources hold about a certain\ntarget by decomposing the corresponding joint mutual information into\ncontributions such as synergistic, redundant, or unique information. Despite\nPID conceptually being defined for any type of random variables, so far, PID\ncould only be quantified for the joint mutual information of discrete systems.\nRecently, a quantification for PID in continuous settings for two or three\nsource variables was introduced. Nonetheless, no ansatz has managed to both\nquantify PID for more than three variables and cover general measure-theoretic\nrandom variables, such as mixed discrete-continuous, or continuous random\nvariables yet. In this work we will propose an information quantity, defining\nthe terms of a PID, which is well-defined for any number or type of source or\ntarget random variable. This proposed quantity is tightly related to a recently\ndeveloped local shared information quantity for discrete random variables based\non the idea of shared exclusions. Further, we prove that this newly proposed\ninformation-measure fulfills various desirable properties, such as satisfying a\nset of local PID axioms, invariance under invertible transformations,\ndifferentiability with respect to the underlying probability density, and\nadmitting a target chain rule.\n', 'Bits and Pieces: Understanding Information Decomposition from Part-whole\n Relationships and Formal Logic Partial information decomposition (PID) seeks to decompose the multivariate\nmutual information that a set of source variables contains about a target\nvariable into basic pieces, the so called ""atoms of information"". Each atom\ndescribes a distinct way in which the sources may contain information about the\ntarget. In this paper we show, first, that the entire theory of partial\ninformation decomposition can be derived from considerations of elementary\nparthood relationships between information contributions. This way of\napproaching the problem has the advantage of directly characterizing the atoms\nof information, instead of taking an indirect approach via the concept of\nredundancy. Secondly, we describe several intriguing links between PID and\nformal logic. In particular, we show how to define a measure of PID based on\nthe information provided by certain statements about source realizations.\nFurthermore, we show how the mathematical lattice structure underlying PID\ntheory can be translated into an isomorphic structure of logical statements\nwith a particularly simple ordering relation: logical implication. The\nconclusion to be drawn from these considerations is that there are three\nisomorphic ""worlds"" of partial information decomposition, i.e. three equivalent\nways to mathematically describe the decomposition of the information carried by\na set of sources about a target: the world of parthood relationships, the world\nof logical statements, and the world of antichains that was utilized by\nWilliams and Beer in their original exposition of PID theory. We additionally\nshow how the parthood perspective provides a systematic way to answer a type of\nquestion that has been much discussed in the PID field: whether a partial\ninformation decomposition can be uniquely determined based on concepts other\nthan redundant information.\n']","[('information decomposition', 0.6980679035186768), ('partial information decomposition', 0.6973376870155334), ('information theoretic', 0.6343063712120056), ('information theoretic quantities', 0.6321653723716736), ('information theoretic approaches', 0.6078740954399109), ('information theoretic measures', 0.6070868968963623), ('higher order information', 0.6019494533538818), ('redundant information', 0.6017341613769531), ('mutual information', 0.5841729044914246), ('partial information', 0.5799974203109741)]" 350,350,84,350_klein gordon equations_nonlinear klein gordon_wave klein gordon_klein gordon system,"['klein gordon equations', 'nonlinear klein gordon', 'wave klein gordon', 'klein gordon system', 'gordon equations', 'nonlinear klein', 'linear klein gordon', 'wave klein', 'klein gordon', 'linear klein']","['Global Existence and Scattering of the Klein-Gordon-Zakharov System in\n Two Space Dimensions We are interested in the Klein-Gordon-Zakharov system in $\\mathbb{R}^{1+2}$,\nwhich is an important model in plasma physics with extensive mathematical\nstudies. The system can be regarded as semilinear coupled wave and Klein-Gordon\nequations with nonlinearities violating the null conditions. Without the\ncompactness assumptions on the initial data, we aim to establish the existence\nof small global solutions, and in addition, we want to illustrate the optimal\npointwise decay of the solutions. Furthermore, we show that the Klein-Gordon\npart of the system enjoys linear scattering while the wave part has uniformly\nbounded low-order energy. None of these goals is easy because of the slow\npointwise decay nature of the linear wave and Klein-Gordon components in\n$\\mathbb{R}^{1+2}$. We tackle the difficulties by carefully exploiting the\nproperties of the wave and the Klein-Gordon components, and by relying on the\nghost weight energy estimates to close higher-order energy estimates. This\nappears to be the first pointwise decay result and the first scattering result\nfor the Klein-Gordon-Zakharov system in $\\mathbb{R}^{1+2}$ without compactness\nassumptions.\n', ""Global solution to the wave and Klein-Gordon system under null condition\n in dimension two We are interested in studying the coupled wave and Klein-Gordon equations\nwith null quadratic nonlinearities in $\\mathbb{R}^{2+1}$. We want to establish\nthe small data global existence result, and in addition, we also demonstrate\nthe pointwise asymptotic behaviour of the solution to the coupled system. The\ninitial data are not required to have compact support, and this is achieved by\napplying the Alinhac's ghost weight method to both the wave and the\nKlein-Gordon equations.\n"", 'Asymptotic Behavior of the Solution to the Klein-Gordon-Zakharov Model\n in Dimension Two Consider the Klein-Gordon-Zakharov equations in $\\mathbb{R}^{1+2}$, and we\nare interested in establishing the small global solution to the equations and\nin investigating the pointwise asymptotic behavior of the solution. The\nKlein-Gordon-Zakharov equations can be regarded as a coupled semilinear wave\nand Klein-Gordon system with quadratic nonlinearities which do not satisfy the\nnull conditions, and the fact that wave components and Klein-Gordon components\ndo not decay sufficiently fast makes it harder to conduct the analysis. In\norder to conquer the difficulties, we will rely on the hyperboloidal foliation\nmethod and a minor variance of the ghost weight method. As a side result of the\nanalysis, we are also able to show the small data global existence result for a\nclass of quasilinear wave and Klein-Gordon system violating the null\nconditions.\n']","[('klein gordon equations', 0.7093415260314941), ('nonlinear klein gordon', 0.6906729340553284), ('wave klein gordon', 0.6314749121665955), ('klein gordon system', 0.6292123198509216), ('gordon equations', 0.5974247455596924), ('nonlinear klein', 0.5772050023078918), ('linear klein gordon', 0.5520870089530945), ('wave klein', 0.5281139612197876), ('klein gordon', 0.47577762603759766), ('linear klein', 0.45498722791671753)]" 351,351,83,351_thz frequencies_thz communications_thz wireless_millimeter wave,"['thz frequencies', 'thz communications', 'thz wireless', 'millimeter wave', '28 ghz', '100 ghz', 'thz channel', 'ghz', 'thz communication', 'channel characteristics']","['3-D Statistical Indoor Channel Model for Millimeter-Wave and\n Sub-Terahertz Bands Millimeter-wave (mmWave) and Terahertz (THz) will be used in the\nsixth-generation (6G) wireless systems, especially for indoor scenarios. This\npaper presents an indoor three-dimensional (3-D) statistical channel model for\nmmWave and sub-THz frequencies, which is developed from extensive channel\npropagation measurements conducted in an office building at 28 GHz and 140 GHz\nin 2014 and 2019. Over 15,000 power delay profiles (PDPs) were recorded to\nstudy channel statistics such as the number of time clusters, cluster delays,\nand cluster powers. All the parameters required in the channel generation\nprocedure are derived from empirical measurement data for 28 GHz and 140 GHz\nline-of-sight (LOS) and non-line-of-sight (NLOS) scenarios. The channel model\nis validated by showing that the simulated root mean square (RMS) delay spread\nand RMS angular spread yield good agreements with measured values. An indoor\nchannel simulation software is built upon the popular NYUSIM outdoor channel\nsimulator, which can generate realistic channel impulse response, PDP, and\npower angular spectrum.\n', '220 GHz Urban Microcell Channel Measurement and Characterization on a\n University Campus Owning abundant bandwidth resources, the Terahertz (THz) band (0.1-10~THz) is\nenvisioned as a key technology to realize ultra-high-speed communications in 6G\nand beyond wireless networks. To realize reliable THz communications in urban\nmicrocell (UMi) environments, propagation analysis and channel characterization\nare still insufficient. In this paper, channel measurement campaigns are\nconducted in a UMi scenario at 220~GHz, using a correlation-based time domain\nchannel sounder. 24 positions are measured along a road on the university\ncampus, with distances ranging from 34~m to 410~m. Based on the measurement\nresults, the spatial consistency and interaction of THz waves to the\nsurrounding environments are analyzed. Moreover, the additional loss due to\nfoliage blockage is calculated and an average value of 16.7~dB is observed.\nFurthermore, a full portrait of channel characteristics, including path loss,\nshadow fading, K-factor, delay and angular spreads, as well as cluster\nparameters, is calculated and analyzed. Specifically, an average K-factor value\nof 17.5 dB is measured in the line-of-sight (LoS) case, which is nearly two\ntimes larger than the extrapolated values from the 3GPP standard, revealing\nweak multipath effects in the THz band. Additionally, 2.5 clusters on average\nare observed in the LoS case, around one fifth of what is defined in the 3GPP\nmodel, which uncovers the strong sparsity in THz UMi. The results and analysis\nin this work can offer guidance for system design for future THz UMi networks.\n', 'Terahertz Channel Measurement and Analysis on a University Campus Street Owning abundant bandwidth resource, the Terahertz (0.1-10 THz) band is a\npromising spectrum to support sixth-generation (6G) and beyond communications.\nAs the foundation of channel study in the spectrum, channel measurement is\nongoing in covering representative 6G communication scenarios and promising THz\nfrequency bands. In this paper, a wideband channel measurement in an L-shaped\nuniversity campus street is conducted at 306-321 GHz and 356-371 GHz. In\nparticular, ten line-of-sight (LoS) and eight non-line-of-sight (NLoS) points\nare measured at the two frequency bands, respectively. In total, 6480 channel\nimpulse responses (CIRs) are obtained from the measurement, based on which\nmulti-path propagation in the L-shaped roadway in the THz band is elaborated to\nidentify major scatterers of walls, vehicles, etc. in the environment and their\nimpact on multi-path components (MPCs). Furthermore, outdoor THz channel\ncharacteristics in the two frequency bands are analyzed, including path losses,\nshadow fading, cluster parameters, delay spread and angular spread. In contrast\nwith the counterparts in the similar outdoor scenario at lower frequencies, the\nresults verify the sparsity of MPCs at THz frequencies and indicate smaller\npower spreads in both temporal and spatial domains in the THz band.\n']","[('thz frequencies', 0.5388880968093872), ('thz communications', 0.5356906056404114), ('thz wireless', 0.5064778327941895), ('millimeter wave', 0.5044837594032288), ('28 ghz', 0.47853007912635803), ('100 ghz', 0.4726574122905731), ('thz channel', 0.46562644839286804), ('ghz', 0.45826268196105957), ('thz communication', 0.44302308559417725), ('channel characteristics', 0.4252130687236786)]" 352,352,83,352_mock theta functions_ramanujan theta_functions ramanujan_theta series,"['mock theta functions', 'ramanujan theta', 'functions ramanujan', 'theta series', 'theta functions', 'identities ramanujan', 'mock theta', 'analogues ramanujan', 'order mock theta', 'identities theta']","['A Comprehensive Study of Complete Generalized New Mock Theta Functions The generalization of new mock theta functions of Andrews and Bringmann et al\nare given. Further we have given the expansion of these bilateral generalized\nnew mock theta functions as 2 phi 1 series by Slaters transformation. After\nthat we have given the continued fraction representation of these generalized\nmock theta functions.\n', ""On Ramanujan's lost notebook and new tenth-order like identities for\n second-, sixth-, and eighth-order mock theta functions Ramanujan's lost notebook contains many mock theta functions and mock theta\nfunction identities not mentioned in his last letter to Hardy. For example, we\nfind the four tenth-order mock theta functions and their six identities. The\nsix identities themselves are of a spectacular nature and were first proved by\nChoi. We also find eight sixth-order mock theta functions in the lost notebook,\nbut among their many identities there is only a single relationship like those\nof the tenth-orders. Using Appell function properties of Hickerson and\nMortenson, we discover and prove three new identities for the sixth-order mock\ntheta functions that are in the spirit of the six tenth-order identities. We\nalso include an additional nineteen tenth-order like identities for various\ncombinations of second-, sixth-, and eighth-order mock theta functions.\n"", ""Splitting Appell functions in terms of single quotients of theta\n functions Ramanujan's last letter to Hardy introduced the world to mock theta\nfunctions, and the mock theta function identities found in Ramanujan's lost\nnotebook added to their intriguing nature. For example, we find the four\ntenth-order mock theta functions and their six identities. The six identities\nthemselves are of a spectacular nature and were first proved by Choi. We also\nfind over eight sixth-order mock theta functions in the lost notebook, but\namong their many identities there is only one relationship like those of the\ntenth-orders. Recently, three new identities for the sixth-order mock theta\nfunctions that are in the spirit of the six tenth-order identities were\ndiscovered. Here we present several families of tenth-order like identities for\nAppell functions, which are the building blocks of Ramanujan's mock theta\nfunctions.\n""]","[('mock theta functions', 0.6545985341072083), ('ramanujan theta', 0.6295924186706543), ('functions ramanujan', 0.5943416357040405), ('theta series', 0.587457537651062), ('theta functions', 0.5813612937927246), ('identities ramanujan', 0.5551382899284363), ('mock theta', 0.5442083477973938), ('analogues ramanujan', 0.5418627858161926), ('order mock theta', 0.5290905237197876), ('identities theta', 0.5153177380561829)]" 353,353,83,353_game graphs_planar graphs graphs_cops robbers_p_5 free graphs,"['game graphs', 'planar graphs graphs', 'cops robbers', 'p_5 free graphs', 'planar graphs', 'free graphs', 'game graph', 'graphs graphs can', 'robbers', 'game played graphs']","['Cops and Attacking Robbers with Cycle Constraints This paper considers the Cops and Attacking Robbers game, a variant of Cops\nand Robbers, where the robber is empowered to attack a cop in the same way a\ncop can capture the robber. In a graph $G$, the number of cops required to\ncapture a robber in the Cops and Attacking Robbers game is denoted by\n$\\attCop(G)$. We characterise the triangle-free graphs $G$ with $\\attCop(G)\n\\leq 2$ via a natural generalisation of the cop-win characterisation by\nNowakowski and Winkler \\cite{nowakowski1983vertex}. We also prove that all\nbipartite planar graphs $G$ have $\\attCop(G) \\leq 4$ and show this is tight by\nconstructing a bipartite planar graph $G$ with $\\attCop(G) = 4$. Finally we\nconstruct $17$ non-isomorphic graphs $H$ of order $58$ with $\\attCop(H) = 6$\nand $\\cop(H)=3$. This provides the first example of a graph $H$ with\n$\\attCop(H) - \\cop(H) \\geq 3$ extending work by Bonato, Finbow, Gordinowicz,\nHaidar, Kinnersley, Mitsche, Pra\\l{}at, and Stacho \\cite{bonato2014robber}. We\nconclude with a list of conjectures and open problems.\n', ""Cops and Robbers for Graphs on Surfaces with Crossings Cops and Robbers is a game played on a graph where a set of cops attempt to\ncapture a single robber. The game proceeds in rounds, where each round first\nconsists of the cops' turn, followed by the robber's turn. In the cops' turn,\nevery cop can choose to either stay on the same vertex or move to an adjacent\nvertex, and likewise the robber in his turn. The robber is considered to be\ncaptured if, at any point in time, there is some cop on the same vertex as the\nrobber. A natural question in this game concerns the cop-number of a graph --\nthe minimum number of cops needed to capture the robber. It has long been known\nthat graphs embeddable (without crossings) on surfaces of bounded genus have\nbounded cop-number. In contrast, the class of 1-planar graphs -- graphs that\ncan be drawn on the plane with at most one crossing per edge -- does not have\nbounded cop-number. This paper initiates an investigation into how distance\nbetween crossing pairs of edges influences a graph's cop number. In particular,\nwe look at Distance $d$ Cops and Robbers, a variant of the classical game,\nwhere the robber is considered to be captured if there is a cop within distance\n$d$ of the robber. Let $c_d(G)$ denote the minimum number of cops required in\nthe graph $G$ to capture a robber within distance $d$. We look at various\nclasses of graphs, such as 1-plane graphs, $k$-plane graphs (graphs where each\nedge is crossed at most $k$ times), and even general graph drawings, and show\nthat if every crossing pair of edges can be connected by a path of small\nlength, then $c_d(G)$ is bounded, for small values of $d$.\n"", ""On 1-Planar Graphs with Bounded Cop-Number Cops and Robbers is a type of pursuit-evasion game played on a graph where a\nset of cops try to capture a single robber. The cops first choose their initial\nvertex positions, and later the robber chooses a vertex. The cops and robbers\nmake their moves in alternate turns: in the cops' turn, every cop can either\nchoose to move to an adjacent vertex or stay on the same vertex, and likewise\nthe robber in his turn. If the cops can capture the robber in a finite number\nof rounds, the cops win, otherwise the robber wins. The cop-number of a graph\nis the minimum number of cops required to catch a robber in the graph. It has\nlong been known that graphs embedded on surfaces (such as planar graphs and\ntoroidal graphs) have a small cop-number. Recently, Durocher et al. [Graph\nDrawing, 2023] investigated the problem of cop-number for the class of\n$1$-planar graphs, which are graphs that can be embedded in the plane such that\neach edge is crossed at most once. They showed that unlike planar graphs which\nrequire just three cops, 1-planar graphs have an unbounded cop-number. On the\npositive side, they showed that maximal 1-planar graphs require only three cops\nby crucially using the fact that the endpoints of every crossing in an embedded\nmaximal 1-planar graph induce a $K_4$. In this paper, we show that the\ncop-number remains bounded even under the relaxed condition that the endpoints\ninduce at least three edges. More precisely, let an $\\times$-crossing of an\nembedded 1-planar graph be a crossing whose endpoints induce a matching; i.e.,\nthere is no edge connecting the endpoints apart from the crossing edges\nthemselves. We show that any 1-planar graph that can be embedded without\n$\\times$-crossings has cop-number at most 21. Moreover, any 1-planar graph that\ncan be embedded with at most $\\gamma$ $\\times$-crossings has cop-number at most\n$\\gamma + 21$.\n""]","[('game graphs', 0.5541633367538452), ('planar graphs graphs', 0.5490993857383728), ('cops robbers', 0.5303875207901001), ('p_5 free graphs', 0.5277249217033386), ('planar graphs', 0.5254729986190796), ('free graphs', 0.5139639377593994), ('game graph', 0.5112987160682678), ('graphs graphs can', 0.5092583894729614), ('robbers', 0.5053318738937378), ('game played graphs', 0.5026987195014954)]" 354,354,83,354_g_2 manifolds_g_2 manifold__2 manifolds_closed g_2 structure,"['g_2 manifolds', 'g_2 manifold', '_2 manifolds', 'closed g_2 structure', 'g_2 structures', 'g_2 structure', 'manifolds admitting', 'manifolds', 'compact manifolds', 'holonomy metrics']","['A new construction of compact torsion-free $G_2$-manifolds by gluing\n families of Eguchi-Hanson spaces We give a new construction of compact Riemannian 7-manifolds with holonomy\n$G_2$. Let $M$ be a torsion-free $G_2$-manifold (which can have holonomy a\nproper subgroup of $G_2$) such that $M$ admits an involution $\\iota$ preserving\nthe $G_2$-structure. Then $M/{\\langle \\iota \\rangle}$ is a $G_2$-orbifold, with\nsingular set $L$ an associative submanifold of $M$, where the singularities are\nlocally of the form $\\mathbb R^3 \\times (\\mathbb R^4 / \\{\\pm 1\\})$. We resolve\nthis orbifold by gluing in a family of Eguchi-Hanson spaces, parametrized by a\nnonvanishing closed and coclosed $1$-form $\\lambda$ on $L$. Much of the\nanalytic difficulty lies in constructing appropriate closed $G_2$-structures\nwith sufficiently small torsion to be able to apply the general existence\ntheorem of the first author. In particular, the construction involves solving a\nfamily of elliptic equations on the noncompact Eguchi-Hanson space,\nparametrized by the singular set $L$. We also present two generalizations of\nthe main theorem, and we discuss several methods of producing examples from\nthis construction.\n', 'Bryant-Salamon $\\mathrm{G}_2$ manifolds and coassociative fibrations Bryant-Salamon constructed three 1-parameter families of complete manifolds\nwith holonomy $\\mathrm{G}_2$ which are asymptotically conical to a holonomy\n$\\mathrm{G}_2$ cone. For each of these families, including their asymptotic\ncone, we construct a fibration by asymptotically conical and conically singular\ncoassociative 4-folds. We show that these fibrations are natural\ngeneralizations of the following three well-known coassociative fibrations on\n$\\mathbb R^7$: the trivial fibration by 4-planes, the product of the standard\nLefschetz fibration of $\\mathbb C^3$ with a line, and the Harvey-Lawson\ncoassociative fibration. In particular, we describe coassociative fibrations of\nthe bundle of anti-self-dual 2-forms over the 4-sphere $\\mathcal{S}^4$, and the\ncone on $\\mathbb C \\mathbb P^3$, whose smooth fibres are $T^*\\mathcal{S}^2$,\nand whose singular fibres are $\\mathbb R^4/\\{\\pm 1\\}$. We relate these\nfibrations to hypersymplectic geometry, Donaldson\'s work on Kovalev-Lefschetz\nfibrations, harmonic 1-forms and the Joyce--Karigiannis construction of\nholonomy $\\mathrm{G}_2$ manifolds, and we construct vanishing cycles and\nassociative ""thimbles"" for these fibrations.\n', 'Infinitely many new families of complete cohomogeneity one\n G_2-manifolds: G_2 analogues of the Taub-NUT and Eguchi-Hanson spaces We construct infinitely many new 1-parameter families of simply connected\ncomplete noncompact G_2-manifolds with controlled geometry at infinity. The\ngeneric member of each family has so-called asymptotically locally conical\n(ALC) geometry. However, the nature of the asymptotic geometry changes at two\nspecial parameter values: at one special value we obtain a unique member of\neach family with asymptotically conical (AC) geometry; on approach to the other\nspecial parameter value the family of metrics collapses to an AC Calabi-Yau\n3-fold. Our infinitely many new diffeomorphism types of AC G_2-manifolds are\nparticularly noteworthy: previously the three examples constructed by Bryant\nand Salamon in 1989 furnished the only known simply connected AC G_2-manifolds.\n We also construct a closely related conically singular G_2 holonomy space:\naway from a single isolated conical singularity, where the geometry becomes\nasymptotic to the G_2-cone over the standard nearly K\\""ahler structure on the\nproduct of a pair of 3-spheres, the metric is smooth and it has ALC geometry at\ninfinity. We argue that this conically singular ALC G_2-space is the natural\nG_2 analogue of the Taub-NUT metric in 4-dimensional hyperKaehler geometry and\nthat our new AC G_2-metrics are all analogues of the Eguchi-Hanson metric, the\nsimplest ALE hyperK\\""ahler manifold. Like the Taub-NUT and Eguchi-Hanson\nmetrics, all our examples are cohomogeneity one, i.e. they admit an isometric\nLie group action whose generic orbit has codimension one.\n']","[('g_2 manifolds', 0.6567509770393372), ('g_2 manifold', 0.6394803524017334), ('_2 manifolds', 0.6204916834831238), ('closed g_2 structure', 0.5776509046554565), ('g_2 structures', 0.5484468340873718), ('g_2 structure', 0.5306441187858582), ('manifolds admitting', 0.5083328485488892), ('manifolds', 0.5038849115371704), ('compact manifolds', 0.48590150475502014), ('holonomy metrics', 0.478613018989563)]" 355,355,82,355_trained transformers_trained transformer_transformer models_attention weights,"['trained transformers', 'trained transformer', 'transformer models', 'attention weights', 'large language models', 'transformer', 'transformers', 'transformer architectures', 'transformer architecture', 'softmax']","[""Clustering in pure-attention hardmax transformers and its role in\n sentiment analysis Transformers are extremely successful machine learning models whose\nmathematical properties remain poorly understood. Here, we rigorously\ncharacterize the behavior of transformers with hardmax self-attention and\nnormalization sublayers as the number of layers tends to infinity. By viewing\nsuch transformers as discrete-time dynamical systems describing the evolution\nof points in a Euclidean space, and thanks to a geometric interpretation of the\nself-attention mechanism based on hyperplane separation, we show that the\ntransformer inputs asymptotically converge to a clustered equilibrium\ndetermined by special points called leaders. We then leverage this theoretical\nunderstanding to solve sentiment analysis problems from language processing\nusing a fully interpretable transformer model, which effectively captures\n`context' by clustering meaningless words around leader words carrying the most\nmeaning. Finally, we outline remaining challenges to bridge the gap between the\nmathematical analysis of transformers and their real-life implementation.\n"", 'AlgoFormer: An Efficient Transformer Framework with Algorithmic\n Structures Besides natural language processing, transformers exhibit extraordinary\nperformance in solving broader applications, including scientific computing and\ncomputer vision. Previous works try to explain this from the expressive power\nand capability perspectives that standard transformers are capable of\nperforming some algorithms. To empower transformers with algorithmic\ncapabilities and motivated by the recently proposed looped transformer, we\ndesign a novel transformer framework, dubbed Algorithm Transformer (abbreviated\nas AlgoFormer). We provide an insight that efficient transformer architectures\ncan be designed by leveraging prior knowledge of tasks and the underlying\nstructure of potential algorithms. Compared with the standard transformer and\nvanilla looped transformer, the proposed AlgoFormer can perform efficiently in\nalgorithm representation in some specific tasks. In particular, inspired by the\nstructure of human-designed learning algorithms, our transformer framework\nconsists of a pre-transformer that is responsible for task preprocessing, a\nlooped transformer for iterative optimization algorithms, and a\npost-transformer for producing the desired results after post-processing. We\nprovide theoretical evidence of the expressive power of the AlgoFormer in\nsolving some challenging problems, mirroring human-designed algorithms.\nFurthermore, some theoretical and empirical results are presented to show that\nthe designed transformer has the potential to perform algorithm representation\nand learning. Experimental results demonstrate the empirical superiority of the\nproposed transformer in that it outperforms the standard transformer and\nvanilla looped transformer in some specific tasks. An extensive experiment on\nreal language tasks (e.g., neural machine translation of German and English,\nand text classification) further validates the expressiveness and effectiveness\nof AlgoFormer.\n', 'Transformers learn variable-order Markov chains in-context Large language models have demonstrated impressive in-context learning (ICL)\ncapability. However, it is still unclear how the underlying transformers\naccomplish it, especially in more complex scenarios. Toward this goal, several\nrecent works studied how transformers learn fixed-order Markov chains (FOMC) in\ncontext, yet natural languages are more suitably modeled by variable-order\nMarkov chains (VOMC), i.e., context trees (CTs). In this work, we study the ICL\nof VOMC by viewing language modeling as a form of data compression and focus on\nsmall alphabets and low-order VOMCs. This perspective allows us to leverage\nmature compression algorithms, such as context-tree weighting (CTW) and\nprediction by partial matching (PPM) algorithms as baselines, the former of\nwhich is Bayesian optimal for a class of CTW priors. We empirically observe a\nfew phenomena: 1) Transformers can indeed learn to compress VOMC in-context,\nwhile PPM suffers significantly; 2) The performance of transformers is not very\nsensitive to the number of layers, and even a two-layer transformer can learn\nin-context quite well; and 3) Transformers trained and tested on non-CTW priors\ncan significantly outperform the CTW algorithm. To explain these phenomena, we\nanalyze the attention map of the transformers and extract two mechanisms, on\nwhich we provide two transformer constructions: 1) A construction with $D+2$\nlayers that can mimic the CTW algorithm accurately for CTs of maximum order\n$D$, 2) A 2-layer transformer that utilizes the feed-forward network for\nprobability blending. One distinction from the FOMC setting is that a counting\nmechanism appears to play an important role. We implement these synthetic\ntransformer layers and show that such hybrid transformers can match the ICL\nperformance of transformers, and more interestingly, some of them can perform\neven better despite the much-reduced parameter sets.\n']","[('trained transformers', 0.5952528715133667), ('trained transformer', 0.5869207382202148), ('transformer models', 0.5072760581970215), ('attention weights', 0.5011747479438782), ('large language models', 0.4823548197746277), ('transformer', 0.4761291742324829), ('transformers', 0.47298306226730347), ('transformer architectures', 0.4721764326095581), ('transformer architecture', 0.458271861076355), ('softmax', 0.44750717282295227)]" 356,356,82,356_control false discovery_false discovery rate_discovery rate fdr_discovery rate control,"['control false discovery', 'false discovery rate', 'discovery rate fdr', 'discovery rate control', 'false discovery', 'multiple hypothesis testing', 'discovery rate', 'multiple testing', 'rate fdr control', 'hypothesis testing']","['A New Procedure for Controlling False Discovery Rate in Large-Scale\n t-tests This paper is concerned with false discovery rate (FDR) control in\nlarge-scale multiple testing problems. We first propose a new data-driven\ntesting procedure for controlling the FDR in large-scale t-tests for one-sample\nmean problem. The proposed procedure achieves exact FDR control in finite\nsample settings when the populations are symmetric no matter the number of\ntests or sample sizes. Comparing with the existing bootstrap method for FDR\ncontrol, the proposed procedure is computationally efficient. We show that the\nproposed method can control the FDR asymptotically for asymmetric populations\neven when the test statistics are not independent. We further show that the\nproposed procedure with a simple correction is as accurate as the bootstrap\nmethod to the second-order degree, and could be much more effective than the\nexisting normal calibration. We extend the proposed procedure to two-sample\nmean problem. Empirical results show that the proposed procedures have better\nFDR control than existing ones when the proportion of true alternative\nhypotheses is not too low, while maintaining reasonably good detection ability.\n', 'Conditional calibration for false discovery rate control under\n dependence We introduce a new class of methods for finite-sample false discovery rate\n(FDR) control in multiple testing problems with dependent test statistics where\nthe dependence is fully or partially known. Our approach separately calibrates\na data-dependent p-value rejection threshold for each hypothesis, relaxing or\ntightening the threshold as appropriate to target exact FDR control. In\naddition to our general framework we propose a concrete algorithm, the\ndependence-adjusted Benjamini-Hochberg (dBH) procedure, which adaptively\nthresholds the q-value for each hypothesis. Under positive regression\ndependence the dBH procedure uniformly dominates the standard BH procedure, and\nin general it uniformly dominates the Benjamini-Yekutieli (BY) procedure (also\nknown as BH with log correction). Simulations and real data examples illustrate\npower gains over competing approaches to FDR control under dependence.\n', 'Large-scale Multiple Testing: Fundamental Limits of False Discovery Rate\n Control and Compound Oracle The false discovery rate (FDR) and the false non-discovery rate (FNR),\ndefined as the expected false discovery proportion (FDP) and the false\nnon-discovery proportion (FNP), are the most popular benchmarks for multiple\ntesting. Despite the theoretical and algorithmic advances in recent years, the\noptimal tradeoff between the FDR and the FNR has been largely unknown except\nfor certain restricted classes of decision rules, e.g., separable rules, or for\nother performance metrics, e.g., the marginal FDR and the marginal FNR (mFDR\nand mFNR). In this paper, we determine the asymptotically optimal FDR-FNR\ntradeoff under the two-group random mixture model when the number of hypotheses\ntends to infinity. Distinct from the optimal mFDR-mFNR tradeoff, which is\nachieved by separable decision rules, the optimal FDR-FNR tradeoff requires\ncompound rules even in the large-sample limit and for models as simple as the\nGaussian location model. This suboptimality of separable rules also holds for\nother objectives, such as maximizing the expected number of true discoveries.\nFinally, to address the limitation of the FDR which only controls the\nexpectation but not the fluctuation of the FDP, we also determine the optimal\ntradeoff when the FDP is controlled with high probability and show it coincides\nwith that of the mFDR and the mFNR. Extensions to models with a fixed non-null\nproportion are also obtained.\n']","[('control false discovery', 0.6075212955474854), ('false discovery rate', 0.5963813662528992), ('discovery rate fdr', 0.5503056645393372), ('discovery rate control', 0.5147057175636292), ('false discovery', 0.476547509431839), ('multiple hypothesis testing', 0.47511419653892517), ('discovery rate', 0.4400155246257782), ('multiple testing', 0.42730021476745605), ('rate fdr control', 0.4174032509326935), ('hypothesis testing', 0.40313130617141724)]" 357,357,82,357_quantum codes_new quantum codes_codes quantum_codes entanglement,"['quantum codes', 'new quantum codes', 'codes quantum', 'codes entanglement', 'quasi cyclic codes', 'linear codes', 'assisted quantum error', 'self dual codes', 'cyclic codes', 'binary quantum']","['New MDS Entanglement-Assisted Quantum Codes from MDS Hermitian\n Self-Orthogonal Codes The intersection ${\\bf C}\\bigcap {\\bf C}^{\\perp_H}$ of a linear code ${\\bf C}\n\\subset {\\bf F}_{q^2}$ and its Hermitian dual ${\\bf C}^{\\perp_H}$ is called the\nHermitian hull of this code. A linear code ${\\bf C} \\subset {\\bf F}_{q^2}$\nsatisfying ${\\bf C} \\subset {\\bf C}^{\\perp_H}$ is called Hermitian\nself-orthogonal. Many Hermitian self-orthogonal codes were given for the\nconstruction of MDS quantum error correction codes (QECCs). In this paper we\nprove that for a nonnegative integer $h$ satisfying $0 \\leq h \\leq k$, a linear\nHermitian self-orthogonal $[n, k]_{q^2}$ code is equivalent to a linear\n$h$-dimension Hermitian hull code. Therefore a lot of new MDS\nentanglement-assisted quantum error correction (EAQEC) codes can be constructed\nfrom previous known Hermitian self-orthogonal codes. Actually our method shows\nthat previous constructed quantum MDS codes from Hermitian self-orthogonal\ncodes can be transformed to MDS entanglement-assisted quantum codes with\nnonzero consumption parameter $c$ directly. We prove that MDS EAQEC $[[n, k, d,\nc]]_q$ codes with nonzero $c$ parameters and $d\\leq \\frac{n+2}{2}$ exist for\narbitrary length $n \\leq q^2+1$. Moreover any QECC constructed from\n$k$-dimensional Hermitian self-orthogonal codes can be transformed to $k$\ndifferent EAQEC codes.\n', 'Cyclic codes and some new entanglement-assisted quantum MDS codes Entanglement-assisted quantum error correcting codes (EAQECCs) play a\nsignificant role in protecting quantum information from decoherence and quantum\nnoise. Recently, constructing entanglement-assisted quantum maximum distance\nseparable (EAQMDS) codes with flexible parameters has received much attention.\nIn this work, four families of EAQMDS codes with a more general length are\npresented. And the method of selecting defining set is different from others.\nCompared with all the previously known results, the EAQMDS codes we constructed\nhave larger minimum distance. All of these EAQMDS codes are new in the sense\nthat their parameters are not covered by the quantum codes available in the\nliterature.\n', 'Constructions of entanglement-assisted quantum MDS codes from\n generalized Reed-Solomon codes By generalizing the stabilizer quantum error-correcting codes,\nentanglement-assisted quantum error-correcting (EAQEC) codes were introduced,\nwhich could be derived from any classical linear codes via the relaxation of\nself-orthogonality conditions with the aid of pre-shared entanglement between\nthe sender and the receiver. In this paper, three classes of\nentanglement-assisted quantum error-correcting maximum-distance-separable\n(EAQMDS) codes are constructed through generalized Reed-Solomon codes. Under\nour constructions, the minimum distances of our EAQMDS codes are much larger\nthan those of the known EAQMDS codes of the same lengths that consume the same\nnumber of ebits. Furthermore, some of the lengths of the EAQMDS codes are not\ndivisors of $q^2-1$, which are completely new and unlike all those known\nlengths existed before.\n']","[('quantum codes', 0.7173324227333069), ('new quantum codes', 0.7068290114402771), ('codes quantum', 0.7065497040748596), ('codes entanglement', 0.6712090373039246), ('quasi cyclic codes', 0.5026440024375916), ('linear codes', 0.5006842613220215), ('assisted quantum error', 0.49590864777565), ('self dual codes', 0.4902454614639282), ('cyclic codes', 0.48366236686706543), ('binary quantum', 0.480954647064209)]" 358,358,82,358_sum stochastic games_stochastic games_stochastic game_games stochastic,"['sum stochastic games', 'stochastic games', 'stochastic game', 'games stochastic', 'pure nash equilibrium', 'games finite', 'zero sum games', 'nash equilibrium', 'pure nash equilibria', 'random games']","['Limit Value in Zero-Sum Stochastic Games with Vanishing Stage Duration\n and Public Signals We consider the behaviour of $\\lambda$-discounted zero-sum games as the\ndiscount factor $\\lambda$ approaches $0$ (that is, the players are more and\nmore patient), in the context of games with stage duration. In stochastic games\nwith stage duration $h$, players act at times $0, h, 2h,$ and so on. The payoff\nand leaving probabilities are proportional to $h$. When $h$ tends to $0$, such\ndiscrete-time games approximate games played in continuous time. The asymptotic\nbehavior of the values (when both $\\lambda$ and $h$ tend to $0$) was already\nstudied in the case of stochastic games with perfect observation of the state\nand in the state-blind case. We consider the same question for the case of\nstochastic games with imperfect observation of the state. More precisely, we\nconsider a particular case of such games, stochastic games with public signals,\nin which players are given at each stage a public signal that depends only on\nthe current state. Our main result states that there exists a stochastic game\nwith public signals, with no limit value (as the discount factor $\\lambda$ goes\nto $0$) if stage duration is $1$, but with a limit value when stage duration\n$h$ and discount factor $\\lambda$ both tend to $0$. Informally speaking, it\nmeans that the limit value in discrete time does not exist, but the limit value\nin continuous time (i.e. when $h$ approaches $0$) exists. Such a situation is\nimpossible in the case of stochastic games with perfect observation of the\nstate.\n', 'Limit Value in Zero-Sum Stochastic Games with Vanishing Stage Duration\n and Public Signals We consider the behaviour of $\\lambda$-discounted zero-sum games as the\ndiscount factor $\\lambda$ approaches 0 (that is, the players are more and more\npatient), in the context of games with stage duration. In stochastic games with\nstage duration h, players act at times 0, h, 2h, and so on. The payoff and\nleaving probabilities are proportional to h. When h tends to 0, such\ndiscrete-time games approximate games played in continuous time. The asymptotic\nbehavior of the values (when both $\\lambda$ and h tend to 0) was already\nstudied in the case of stochastic games with perfect observation of the state\nand in the state-blind case.We consider the same question for the case of\nstochastic games with imperfect observation of the state. More precisely, we\nconsider a particular case of such games, stochastic games with public signals,\nin which players are given at each stage a public signal that depends only on\nthe current state. Our main result states that there exists a stochastic game\nwith public signals, with no limit value (as the discount factor $\\lambda$ goes\nto 0) if stage duration is 1, but with a limit value when stage duration h and\ndiscount factor $\\lambda$ both tend to 0. Informally speaking, it means that\nthe limit value in discrete time does not exist, but the limit value in\ncontinuous time (i.e. when h approaches 0) exists. Such a situation is\nimpossible in the case of stochastic games with perfect observation of the\nstate.\n', ""Best-Response dynamics in two-person random games with correlated\n payoffs We consider finite two-player normal form games with random payoffs. Player\nA's payoffs are i.i.d. from a uniform distribution. Given p in [0, 1], for any\naction profile, player B's payoff coincides with player A's payoff with\nprobability p and is i.i.d. from the same uniform distribution with probability\n1-p. This model interpolates the model of i.i.d. random payoff used in most of\nthe literature and the model of random potential games. First we study the\nnumber of pure Nash equilibria in the above class of games. Then we show that,\nfor any positive p, asymptotically in the number of available actions, best\nresponse dynamics reaches a pure Nash equilibrium with high probability.\n""]","[('sum stochastic games', 0.6986882090568542), ('stochastic games', 0.6968392729759216), ('stochastic game', 0.6794417500495911), ('games stochastic', 0.6700209975242615), ('pure nash equilibrium', 0.6056612133979797), ('games finite', 0.5907350778579712), ('zero sum games', 0.582808256149292), ('nash equilibrium', 0.5689256191253662), ('pure nash equilibria', 0.5567223429679871), ('random games', 0.5148462653160095)]" 359,359,82,359_crossing number graph_crossing edges_number crossings_crossings,"['crossing number graph', 'crossing edges', 'number crossings', 'crossings', 'crossing number', 'number edges', 'edges cross', 'planar graphs', 'crossing', 'crossing critical']","[""An algorithm for estimating the crossing number of dense graphs, and\n continuous analogs of the crossing and rectilinear crossing numbers We present a deterministic $n^{2+o(1)}$-time algorithm that approximates the\ncrossing number of any graph $G$ of order $n$ up to an additive error of\n$o(n^4)$. We also provide a randomized polynomial-time algorithm that\nconstructs a drawing of $G$ with $\\text{cr}(G)+o(n^4)$ crossings. These results\nyield a $1+o(1)$ approximation algorithm for the crossing number of dense\ngraphs. Our work complements a paper of Fox, Pach and S\\'uk, who obtained\nsimilar results for the rectilinear crossing number.\n The results of Fox, Pach and S\\'uk and in this paper imply that the\n(normalized) crossing and rectilinear crossing numbers are estimable\nparameters. Motivated by this, we introduce two graphon parameters, the\n\\textit{crossing density} and the \\textit{rectilinear crossing density}, and we\nprove that, in a precise sense, these are the correct continuous analogs of the\ncrossing and rectilinear crossing numbers of graphs.\n"", 'Rectilinear Crossing Number of Graphs Excluding Single-Crossing Graphs\n as Minors The crossing number of a graph $G$ is the minimum number of crossings in a\ndrawing of $G$ in the plane. A rectilinear drawing of a graph $G$ represents\nvertices of $G$ by a set of points in the plane and represents each edge of $G$\nby a straight-line segment connecting its two endpoints. The rectilinear\ncrossing number of $G$ is the minimum number of crossings in a rectilinear\ndrawing of $G$.\n By the crossing lemma, the crossing number of an $n$-vertex graph $G$ can be\n$O(n)$ only if $|E(G)|\\in O(n)$. Graphs of bounded genus and bounded degree\n(B\\""{o}r\\""{o}czky, Pach and T\\\'{o}th, 2006) and in fact all bounded degree\nproper minor-closed families (Wood and Telle, 2007) have been shown to admit\nlinear crossing number, with tight $\\Theta(\\Delta n)$ bound shown by\nDujmovi\\\'c, Kawarabayashi, Mohar and Wood, 2008.\n Much less is known about rectilinear crossing number. It is not bounded by\nany function of the crossing number. We prove that graphs that exclude a\nsingle-crossing graph as a minor have the rectilinear crossing number $O(\\Delta\nn)$. This dependence on $n$ and $\\Delta$ is best possible. A single-crossing\ngraph is a graph whose crossing number is at most one. Thus the result applies\nto $K_5$-minor-free graphs, for example. It also applies to bounded treewidth\ngraphs, since each family of bounded treewidth graphs excludes some fixed\nplanar graph as a minor. Prior to our work, the only bounded degree\nminor-closed families known to have linear rectilinear crossing number were\nbounded degree graphs of bounded treewidth (Wood and Telle, 2007), as well as,\nbounded degree $K_{3,3}$-minor-free graphs (Dujmovi\\\'c, Kawarabayashi, Mohar\nand Wood, 2008). In the case of bounded treewidth graphs, our $O(\\Delta n)$\nresult is again tight and improves on the previous best known bound of\n$O(\\Delta^2 n)$ by Wood and Telle, 2007 (obtained for convex geometric\ndrawings).\n', 'Improvement on the crossing number of crossing-critical graphs The crossing number of a graph $G$ is the minimum number of edge crossings\nover all drawings of $G$ in the plane. A graph $G$ is $k$-crossing-critical if\nits crossing number is at least $k$, but if we remove any edge of $G$, its\ncrossing number drops below $k$. There are examples of $k$-crossing-critical\ngraphs that do not have drawings with exactly $k$ crossings. Richter and\nThomassen proved in 1993 that if $G$ is $k$-crossing-critical, then its\ncrossing number is at most $2.5k+16$. We improve this bound to\n$2k+6\\sqrt{k}+44$.\n']","[('crossing number graph', 0.6488727331161499), ('crossing edges', 0.6253199577331543), ('number crossings', 0.603298544883728), ('crossings', 0.55625319480896), ('crossing number', 0.5324494242668152), ('number edges', 0.515736997127533), ('edges cross', 0.507216215133667), ('planar graphs', 0.5050764679908752), ('crossing', 0.5036954879760742), ('crossing critical', 0.5019853711128235)]" 360,360,82,360_lipschitz stability inverse_stability inverse source_stability inverse_inverse boundary value,"['lipschitz stability inverse', 'stability inverse source', 'stability inverse', 'inverse boundary value', 'inverse boundary', 'stability estimates', 'inverse source problems', 'estimate inverse', 'lipschitz stability', 'stability estimate']","['Stability for inverse source problems by Carleman estimates In this article, we provide a modified argument for proving conditional\nstability for inverse problems of determining spatially varying functions in\nevolution equations by Carleman estimates. Our method needs not any cut-off\nprocedures and can simplify the existing proofs. We establish the conditional\nstability for inverse source problems for a hyperbolic equation and a parabolic\nequation, and our method is widely applicable to various evolution equations.\n', 'Lipschitz stability for an inverse source problem in anisotropic\n parabolic equations with dynamic boundary conditions In this paper, we study an inverse problem for linear parabolic system with\nvariable diffusion coefficients subject to dynamic boundary conditions. We\nprove a global Lipschitz stability for the inverse problem involving a\nsimultaneous recovery of two source terms from a single measurement and\ninterior observations, based on a recent Carleman estimate for such problems.\n', 'Carleman estimate and an inverse source problem for the Kelvin-Voigt\n model for viscoelasticity We consider the Kelvin-Voigt model for the viscoelasticity, and prove a\nCarleman estimate for functions without compact supports. Then we apply the\nCarleman estimate to prove the Lipschitz stability in determining a spatial\nvarying function in an external source term of Kelvin-Voigt model by a single\nmeasurement. Finally as a related system, we consider an isothermal\ncompressible fluid system and apply the Carleman estimate to establish the\nLipschitz stability for an inverse source problem for the compressible fluid\nsystem.\n']","[('lipschitz stability inverse', 0.6540228724479675), ('stability inverse source', 0.6118014454841614), ('stability inverse', 0.5806444883346558), ('inverse boundary value', 0.5293729901313782), ('inverse boundary', 0.5090106725692749), ('stability estimates', 0.5011268258094788), ('inverse source problems', 0.4926595985889435), ('estimate inverse', 0.48376035690307617), ('lipschitz stability', 0.4674394130706787), ('stability estimate', 0.45525774359703064)]" 361,361,82,361_nonexpansive mappings_fixed point nonexpansive_nonexpansive operators_mappings banach,"['nonexpansive mappings', 'fixed point nonexpansive', 'nonexpansive operators', 'mappings banach', 'point nonexpansive', 'mappings banach spaces', 'nonexpansiveness', 'point mappings', 'existence fixed points', 'mappings uniformly']","['Convergence of modified Picard-Mann hybrid iteration process for nearly\n nonexpansive mappings In this paper, we prove the strong convergence theorems for nearly\nnonexpansive mappings, using the modified Picard-Mann hybrid iteration process\nin the context of uniformly convex Banach space.\n', 'On a useful lemma that relates quasi-nonexpansive and demicontractive\n mappings in Hilbert spaces We give a brief account on a basic result (Lemma \\ref{lem2}) which is a very\nuseful tool in proving various convergence theorems in the framework of the\niterative approximation of fixed points of demicontractive mappings in Hilbert\nspaces. This Lemma relates the class of quasi-nonexpansive mappings, by one\nhand, and the class of $k$-demicontractive mappings (quasi $k$-strict\npseudocontractions), on the other hand and essentially states that the class of\ndemicontractive mappings, which strictly includes the class of\nquasi-nonexpansive mappings, can be embedded in the later by means of an\naveraged perturbation. From the point of view of the fixed point problem, this\nmeans that any convergence result for Krasnoselskij-Mann iterative algorithms\nin the class of $k$-demicontractive mappings can be derived from its\ncorresponding counterpart from quasi-nonexpansive mappings.\n', 'Fixed points theorems for $b$-enriched multivalued nonexpansive mappings\n and *-$b$-enriched nonexpansive mappings The main purpose of this paper is to extend some fixed point results for\nsingle valued $b$-enriched nonexpansive mappings to the case of multivalued\nmappings. To this end, we introduce *-$b$-enriched nonexpansive mappings, as a\ngeneralization of *-nonexpansive mappings \\cite{Abdul Rahim Khan} for which we\nestablish an existence theorem in Hilbert space.\n We proved weak and strong convergence results of Krasnoselskii iteration\nprocess for $b$-enriched multivalued nonexpasive mappings and *-$b$-enriched\nnonexpansive mappings.\n']","[('nonexpansive mappings', 0.7482295036315918), ('fixed point nonexpansive', 0.6364729404449463), ('nonexpansive operators', 0.5305425524711609), ('mappings banach', 0.5253399014472961), ('point nonexpansive', 0.49718889594078064), ('mappings banach spaces', 0.49029868841171265), ('nonexpansiveness', 0.4706607758998871), ('point mappings', 0.4569548964500427), ('existence fixed points', 0.4548880457878113), ('mappings uniformly', 0.4458502233028412)]" 362,362,81,362_monic polynomial mathbb_quartic polynomials_monic irreducible polynomial_monic polynomial,"['monic polynomial mathbb', 'quartic polynomials', 'monic irreducible polynomial', 'monic polynomial', 'cyclic galois group', 'quartic fields', 'galois groups', 'quadratic fields', 'algebraic number field', 'galois group mathbb']","['Monogenic trinomials and class numbers of related quadratic fields We say that a monic polynomial $f(x)\\in {\\mathbb Z}[x]$ of degree $N\\ge 2$ is\nmonogenic if $f(x)$ is irreducible over ${\\mathbb Q}$ and\n$\\{1,\\theta,\\theta^2,\\ldots ,\\theta^{N-1}\\}$ is a basis for the ring of\nintegers of ${\\mathbb Q}(\\theta)$, where $f(\\theta)=0$. In this article, we\ninvestigate the divisibility of the class numbers of quadratic fields ${\\mathbb\nQ}(\\sqrt{\\delta})$ for certain families of monogenic trinomials\n$f(x)=x^N+Ax+B$, where $\\delta\\ne \\pm 1$ is a squarefree divisor of the\ndiscriminant of $f(x)$.\n', 'Monogenic Cyclic Quartic Trinomials A monic polynomial $f(x)\\in {\\mathbb Z}[x]$ of degree $N$ is called monogenic\nif $f(x)$ is irreducible over ${\\mathbb Q}$ and $\\{1,\\theta,\\theta^2,\\ldots\n,\\theta^{N-1}\\}$ is a basis for the ring of integers of ${\\mathbb Q}(\\theta)$,\nwhere $f(\\theta)=0$. In this brief note, we prove that there exist exactly\nthree distinct monogenic trinomials of the form $x^4+bx^2+d$ whose Galois group\nis the cyclic group of order 4.\n', 'Monogenic Reciprocal Quartic Polynomials And Their Galois Groups Suppose that $f(x)=x^4+Ax^3+Bx^2+Ax+1\\in {\\mathbb Z}[x]$. We say that $f(x)$\nis monogenic if $f(x)$ is irreducible over ${\\mathbb Q}$ and\n$\\{1,\\theta,\\theta^2,\\theta^3\\}$ is a basis for the ring of integers of\n${\\mathbb Q}(\\theta)$, where $f(\\theta)=0$. For each possible Galois group $G$\nthat can occur in the two cases of $A\\ne 0$ with $B=0$, and $AB\\ne 0$, we\ndetermine all monogenic polynomials $f(x)$ with Galois group $G$.\n']","[('monic polynomial mathbb', 0.5325750112533569), ('quartic polynomials', 0.5195972919464111), ('monic irreducible polynomial', 0.5091495513916016), ('monic polynomial', 0.47688817977905273), ('cyclic galois group', 0.46957871317863464), ('quartic fields', 0.4653441309928894), ('galois groups', 0.4612483084201813), ('quadratic fields', 0.4561796188354492), ('algebraic number field', 0.4532676935195923), ('galois group mathbb', 0.4448647201061249)]" 363,363,81,363_gabor frames_frame operator_gabor frame_frames mathbb,"['gabor frames', 'frame operator', 'gabor frame', 'frames mathbb', 'gabor transform', 'frames finite', 'wavelet frames', 'frames frames', 'frames', 'dual frames']","['On Gabor g-frames and Fourier series of operators We show that Hilbert-Schmidt operators can be used to define frame-like\nstructures for $L^2(\\mathbb{R}^d)$ over lattices in $\\mathbb{R}^{2d}$ that\ninclude multi-window Gabor frames as a special case. These frame-like\nstructures are called Gabor g-frames, as they are examples of g-frames as\nintroduced by Sun. We show that Gabor g-frames share many properties of Gabor\nframes, including a Janssen representation and Wexler-Raz biorthogonality\nconditions. A central part of our analysis is a notion of Fourier series of\nperiodic operators based on earlier work by Feichtinger and Kozek, where we\nshow in particular a Poisson summation formula for trace class operators. By\nchoosing operators from certain Banach subspaces of the Hilbert Schmidt\noperators, Gabor g-frames give equivalent norms for modulation spaces in terms\nof weighted $\\ell^p$-norms of an associated sequence, as previously shown for\nlocalization operators by D\\""orfler, Feichtinger and Gr\\""ochenig.\n', 'Gabor Frames: Characterizations and Coarse Structure This survey offers a systematic and streamlined exposition of the most\nimportant characterizations of Gabor frames over a lattice. The goal is to\ncollect the most important characterizations of Gabor frames and offer a\nsystematic exposition of these structures. In the center of these\ncharacterizations is the duality theorem for Gabor frames. Most\ncharacterizations within the $L^2$-theory follow directly from this fundamental\nduality. In particular, the celebrated characterizations of Janssen and\nRon-Shen are consequences of the duality theorem, and the characterization of\nZeevi and Zibulski for rational lattices also becomes a corollary. The novelty\nis the streamlined sequence of proofs, so that most of the structure theory of\nGabor frames fits into a single, short article. The only prerequisite is the\nthorough mastery of the Poisson summation formula and some basic facts about\nframes and Riesz sequences.\n', 'Matrix-Valued Gabor Frames over LCA Groups for Operators G\\v avruta studied atomic systems in terms of frames for range of operators\n(that is, for subspaces), namely $K$-frames, where the lower frame condition is\ncontrolled by the Hilbert-adjoint of a bounded linear operator $K$. For a\nlocally compact abelian group G and a positive integer $n$, we study frames of\nmatrix-valued Gabor systems in the matrix-valued Lebesgue space $L^2(G,\n\\mathbb{C}^{n\\times n})$ , where a bounded linear operator $\\Theta$ on $L^2(G,\n\\mathbb{C}^{n\\times n})$ controls not only lower but also the upper frame\ncondition. We term such frames matrix-valued $(\\Theta, \\Theta^*)$-Gabor frames.\nFirstly, we discuss frame preserving mapping in terms of hyponormal operators.\nSecondly, we give necessary and sufficient conditions for the existence of\nmatrix-valued $(\\Theta, \\Theta^*)$- Gabor frames in terms of hyponormal\noperators. It is shown that if $\\Theta$ is adjointable hyponormal operator,\nthen $L^2(G, \\mathbb{C}^{n\\times n})$ admits a $\\lambda$-tight $(\\Theta,\n\\Theta^*)$-Gabor frame for every positive real number $\\lambda$. A\ncharacterization of matrix-valued $(\\Theta, \\Theta^*)$-Gabor frames is given.\nFinally, we show that matrix-valued $(\\Theta, \\Theta^*)$-Gabor frames are\nstable under small perturbation of window functions. Several examples are given\nto support our study.\n']","[('gabor frames', 0.6047268509864807), ('frame operator', 0.5672231316566467), ('gabor frame', 0.5481982231140137), ('frames mathbb', 0.5198169946670532), ('gabor transform', 0.5086774230003357), ('frames finite', 0.4911607801914215), ('wavelet frames', 0.47465020418167114), ('frames frames', 0.4694933295249939), ('frames', 0.44996631145477295), ('dual frames', 0.44576403498649597)]" 364,364,80,364_k_ free graphs_bounded clique number_k_ free graph_bounded clique,"['k_ free graphs', 'bounded clique number', 'k_ free graph', 'bounded clique', 'maximum cliques', 'subgraphs', 'induced subgraph', 'free graphs', 'cliques size', 'number cliques']","['Small subgraphs with large average degree In this paper we study the fundamental problem of finding small dense\nsubgraphs in a given graph. For a real number $s>2$, we prove that every graph\non $n$ vertices with average degree at least $d$ contains a subgraph of average\ndegree at least $s$ on at most $nd^{-\\frac{s}{s-2}}(\\log d)^{O_s(1)}$ vertices.\nThis is optimal up to the polylogarithmic factor, and resolves a conjecture of\nFeige and Wagner. In addition, we show that every graph with $n$ vertices and\naverage degree at least $n^{1-\\frac{2}{s}+\\varepsilon}$ contains a subgraph of\naverage degree at least $s$ on $O_{\\varepsilon,s}(1)$ vertices, which is also\noptimal up to the constant hidden in the $O(.)$ notation, and resolves a\nconjecture of Verstra\\""ete.\n', 'Balanced subdivisions of cliques in graphs Given a graph $H$, a balanced subdivision of $H$ is a graph obtained from $H$\nby subdividing every edge the same number of times. In 1984, Thomassen\nconjectured that for each integer $k\\ge 1$, high average degree is sufficient\nto guarantee a balanced subdivision of $K_k$. Recently, Liu and Montgomery\nresolved this conjecture. We give an optimal estimate up to an absolute\nconstant factor by showing that there exists $c>0$ such that for sufficiently\nlarge $d$, every graph with average degree at least $d$ contains a balanced\nsubdivision of a clique with at least $cd^{1/2}$ vertices. It also confirms a\nconjecture from Verstra{\\""e}te: every graph of average degree $cd^2$, for some\nabsolute constant $c>0$, contains a pair of disjoint isomorphic subdivisions of\nthe complete graph $K_d$. We also prove that there exists some absolute $c>0$\nsuch that for sufficiently large $d$, every $C_4$-free graph with average\ndegree at least $d$ contains a balanced subdivision of the complete graph\n$K_{cd}$, which extends a result of Balogh, Liu and Sharifzadeh.\n', ""Induced subdivisions in $K_{s,s}$-free graphs with polynomial average\n degree In this paper we prove that for every $s\\geq 2$ and every graph $H$ the\nfollowing holds. Let $G$ be a graph with average degree $\\Omega_H(s^{C|H|^2})$,\nfor some absolute constant $C>0$, then $G$ either contains a $K_{s,s}$ or an\ninduced subdivision of $H$. This is essentially tight and confirms a conjecture\nof Bonamy, Bousquet, Pilipczuk, Rz\\k{a}\\.zewski, Thomass\\'e, and Walczak. A\nslightly weaker form of this has been independently proved by Bourneuf,\nBuci\\'c, Cook, and Davies.\n We actually prove a much more general result which implies the above (with\nworse dependence on $|H|$). We show that for every $ k\\geq 2$ there is $C_k>0$\nsuch that any graph $G$ with average degree $s^{C_k}$ either contains a\n$K_{s,s}$ or an induced subgraph $G'\\subseteq G$ without $C_4$'s and with\naverage degree at least $k$.\n Finally, using similar methods we can prove the following. For every $k,t\\geq\n2$ every graph $G$ with average degree at least $C_tk^{\\Omega(t)}$ must contain\neither a $K_k$, an induced $K_{t,t}$ or an induced subdivision of $K_k$. This\nis again essentially tight up to the implied constants and answers in a strong\nform a question of Davies.\n""]","[('k_ free graphs', 0.5627554059028625), ('bounded clique number', 0.5537981986999512), ('k_ free graph', 0.5176203846931458), ('bounded clique', 0.5075780749320984), ('maximum cliques', 0.4916137754917145), ('subgraphs', 0.4840104281902313), ('induced subgraph', 0.47054368257522583), ('free graphs', 0.4500736892223358), ('cliques size', 0.42718854546546936), ('number cliques', 0.42507264018058777)]" 365,365,80,365_quasi newton methods_hessian approximations_superlinear convergence rate_hessian approximation,"['quasi newton methods', 'hessian approximations', 'superlinear convergence rate', 'hessian approximation', 'regularized newton', 'memory quasi newton', 'newton methods', 'quasi newton', 'superlinear convergence', 'cubic regularized newton']","['Sharpened Quasi-Newton Methods: Faster Superlinear Rate and Larger Local\n Convergence Neighborhood Non-asymptotic analysis of quasi-Newton methods have gained traction\nrecently. In particular, several works have established a non-asymptotic\nsuperlinear rate of $\\mathcal{O}((1/\\sqrt{t})^t)$ for the (classic) BFGS method\nby exploiting the fact that its error of Newton direction approximation\napproaches zero. Moreover, a greedy variant of BFGS was recently proposed which\naccelerates its convergence by directly approximating the Hessian, instead of\nthe Newton direction, and achieves a fast local quadratic convergence rate.\nAlas, the local quadratic convergence of Greedy-BFGS requires way more updates\ncompared to the number of iterations that BFGS requires for a local superlinear\nrate. This is due to the fact that in Greedy-BFGS the Hessian is directly\napproximated and the Newton direction approximation may not be as accurate as\nthe one for BFGS. In this paper, we close this gap and present a novel BFGS\nmethod that has the best of both worlds in that it leverages the approximation\nideas of both BFGS and Greedy-BFGS to properly approximate the Newton direction\nand the Hessian matrix simultaneously. Our theoretical results show that our\nmethod out-performs both BFGS and Greedy-BFGS in terms of convergence rate,\nwhile it reaches its quadratic convergence rate with fewer steps compared to\nGreedy-BFGS. Numerical experiments on various datasets also confirm our\ntheoretical findings.\n', 'Regularization of Limited Memory Quasi-Newton Methods for Large-Scale\n Nonconvex Minimization This paper deals with regularized Newton methods, a flexible class of\nunconstrained optimization algorithms that is competitive with line search and\ntrust region methods and potentially combines attractive elements of both. The\nparticular focus is on combining regularization with limited memory\nquasi-Newton methods by exploiting the special structure of limited memory\nalgorithms. Global convergence of regularization methods is shown under mild\nassumptions and the details of regularized limited memory quasi-Newton updates\nare discussed including their compact representations.\n Numerical results using all large-scale test problems from the CUTEst\ncollection indicate that our regularized version of L-BFGS is competitive with\nstate-of-the-art line search and trust-region L-BFGS algorithms and previous\nattempts at combining L-BFGS with regularization, while potentially\noutperforming some of them, especially when nonmonotonicity is involved.\n', 'Limited-Memory Greedy Quasi-Newton Method with Non-asymptotic\n Superlinear Convergence Rate Non-asymptotic convergence analysis of quasi-Newton methods has gained\nattention with a landmark result establishing an explicit local superlinear\nrate of O$((1/\\sqrt{t})^t)$. The methods that obtain this rate, however,\nexhibit a well-known drawback: they require the storage of the previous Hessian\napproximation matrix or all past curvature information to form the current\nHessian inverse approximation. Limited-memory variants of quasi-Newton methods\nsuch as the celebrated L-BFGS alleviate this issue by leveraging a limited\nwindow of past curvature information to construct the Hessian inverse\napproximation. As a result, their per iteration complexity and storage\nrequirement is O$(\\tau d)$ where $\\tau\\le d$ is the size of the window and $d$\nis the problem dimension reducing the O$(d^2)$ computational cost and memory\nrequirement of standard quasi-Newton methods. However, to the best of our\nknowledge, there is no result showing a non-asymptotic superlinear convergence\nrate for any limited-memory quasi-Newton method. In this work, we close this\ngap by presenting a Limited-memory Greedy BFGS (LG-BFGS) method that can\nachieve an explicit non-asymptotic superlinear rate. We incorporate\ndisplacement aggregation, i.e., decorrelating projection, in post-processing\ngradient variations, together with a basis vector selection scheme on variable\nvariations, which greedily maximizes a progress measure of the Hessian estimate\nto the true Hessian. Their combination allows past curvature information to\nremain in a sparse subspace while yielding a valid representation of the full\nhistory. Interestingly, our established non-asymptotic superlinear convergence\nrate demonstrates an explicit trade-off between the convergence speed and\nmemory requirement, which to our knowledge, is the first of its kind. Numerical\nresults corroborate our theoretical findings and demonstrate the effectiveness\nof our method.\n']","[('quasi newton methods', 0.6801259517669678), ('hessian approximations', 0.5986191034317017), ('superlinear convergence rate', 0.5887972712516785), ('hessian approximation', 0.5826637148857117), ('regularized newton', 0.5527123212814331), ('memory quasi newton', 0.5460689067840576), ('newton methods', 0.5448038578033447), ('quasi newton', 0.5198156237602234), ('superlinear convergence', 0.5197476744651794), ('cubic regularized newton', 0.5082272291183472)]" 366,366,80,366_functions quaternionic_regular functions_functions slice_slice regular,"['functions quaternionic', 'regular functions', 'functions slice', 'slice regular', 'quaternionic analogues', 'axially symmetric domains', 'quaternion valued', 'quaternions', 'quaternionic', 'riemann operators']","['Quaternionic slice regular functions and quaternionic Laplace transforms The functions studied in the paper are quaternion-valued functions of a\nquaternionic variable. It is show that the left slice regular functions and\nright slice regular functions are related by a particular involution. The\nrelation between left slice regular functions, right slice regular functions\nand intrinsic regular functions is revealed. The classical Laplace transform\ncan be naturally generalized to quaternions in two different ways, which\ntransform a quaternion-valued function of a real variable to a left or right\nslice regular quaternion-valued function of a quaternionic variable. The usual\nproperties of the classical Laplace transforms are generalized to quaternionic\nLaplace transforms.\n', ""Zeroes of weakly slice regular functions of several quaternionic\n variables on non-axially symmetric domains In this research, we study zeroes of weakly slice regular functions within\nthe framework of several quaternionic variables, specifically focusing on\nnon-axially symmetric domains. Our recent work introduces path-slice stem\nfunctions, along with a novel $*$-product, tailored for weakly slice regular\nfunctions. This innovation allows us to explore new techniques for conjugating\nand symmetrizing path-slice functions. A key finding of our study is the\ndiscovery that the zeroes of a path-slice function are comprehensively\nencapsulated within the zeroes of its symmetrized counterpart. This insight is\nparticularly significant in the context of path-slice stem functions. We\nestablish that for weakly slice regular functions, the processes of conjugation\nand symmetrization gain prominence once the function's slice regularity is\naffirmed. Furthermore, our investigation sheds light on the intricate nature of\nthe zeroes of a slice regular function. We ascertain that these zeroes\nconstitute a path-slice analytic set. This conclusion is drawn from the\nobserved phenomenon that the zeroes of the symmetrization of a slice regular\nfunction also form a path-slice analytic set. This finding marks an advancement\nin understanding the complex structure and properties of weakly slice regular\nfunctions in quaternionic analysis.\n"", 'Algebra of slice regular functions on non-symmetric domains in several\n quaternionic variables The primary objective of this paper is to establish an algebraic framework\nfor the space of weakly slice regular functions over several quaternionic\nvariables. We recently introduced a $*$-product that maintains the path-slice\nproperty within the class of path-slice functions. It is noteworthy that this\n$*$-product is directly applicable to weakly slice regular functions, as every\nslice regular function defined on a slice-open set inherently possesses\npath-slice properties. Building on this foundation, we propose a precise\ndefinition of an open neighborhood for a path $\\gamma$ in the path space\n$\\mathscr{P}(\\mathbb{C}^n)$. This definition is pivotal in establishing the\nholomorphism of stem functions. Consequently, we demonstrate that the\n$*$-product of two weakly slice regular functions retains its weakly slice\nregular nature. This retention is facilitated by holomorphy of stem functions\nand their relationship with weakly slice regular functions, providing a\ncomprehensive algebraic structure for this class of functions.\n']","[('functions quaternionic', 0.5740630626678467), ('regular functions', 0.5192071199417114), ('functions slice', 0.5058193206787109), ('slice regular', 0.4808725118637085), ('quaternionic analogues', 0.4705413281917572), ('axially symmetric domains', 0.46582043170928955), ('quaternion valued', 0.4533429443836212), ('quaternions', 0.4433773458003998), ('quaternionic', 0.40399011969566345), ('riemann operators', 0.40103036165237427)]" 367,367,80,367_random permutation_random permutations_permutons_mallows permutations,"['random permutation', 'random permutations', 'permutons', 'mallows permutations', 'mallows permutation', 'uniform permutations', 'permutations size', 'baxter permutations', 'avoiding permutations', 'permutations also']","['High-dimensional permutons: theory and applications Permutons, which are probability measures on the unit square $[0, 1]^2$ with\nuniform marginals, are the natural scaling limits for sequences of (random)\npermutations.\n We introduce a $d$-dimensional generalization of these measures for all $d\n\\ge 2$, which we call $d$-dimensional permutons, and extend -- from the\ntwo-dimensional setting -- the theory to prove convergence of sequences of\n(random) $d$-dimensional permutations to (random) $d$-dimensional permutons.\n Building on this new theory, we determine the random high-dimensional\npermuton limits for two natural families of high-dimensional permutations.\nFirst, we determine the $3$-dimensional permuton limit for Schnyder wood\npermutations, which bijectively encode planar triangulations decorated by\ntriples of spanning trees known as Schnyder woods. Second, we identify the\n$d$-dimensional permuton limit for $d$-separable permutations, a\npattern-avoiding class of $d$-dimensional permutations generalizing ordinary\nseparable permutations.\n Both high-dimensional permuton limits are random and connected to previously\nstudied universal 2-dimensional permutons, such as the Brownian separable\npermutons and the skew Brownian permutons, and share interesting connections\nwith objects arising from random geometry, including the continuum random tree,\nSchramm--Loewner evolutions, and Liouville quantum gravity surfaces.\n', 'Random Permutations -- A geometric point of view We look at geometric limits of large random non-uniform permutations. We\nmainly consider two theories for limits of permutations: permuton limits,\nintroduced by Hoppen, Kohayakawa, Moreira, Rath, and Sampaio to define a notion\nof scaling limits for permutations; and Benjamini-Schramm limits, introduced by\nthe author to define a notion of local limits for permutations. The models of\nrandom permutations that we consider are mainly constrained models, that is,\nuniform permutations belonging to a given subset of the set of all\npermutations. We often identify this subset using pattern-avoidance, focusing\non: permutations avoiding a pattern of length three, substitution-closed\nclasses, (almost) square permutations, permutation families encoded by\ngenerating trees, and Baxter permutations. We explore some universal phenomena\nfor the models mentioned above. For Benjamini-Schramm limits we explore a\nconcentration phenomenon for the limiting objects. For permuton limits we\ndeepen the study of some known universal permutons, called biased Brownian\nseparable permutons, and we introduce some new ones, called Baxter permuton and\nskew Brownian permutons. In addition, for (almost) square permutations, we\ninvestigate the occurrence of a phase transition for the limiting permutons. On\nthe way, we establish various combinatorial results both for permutations and\nother related objects. Among others, we give a complete description of the\nfeasible region for consecutive patterns as the cycle polytope of a specific\ngraph; and we find new bijections relating Baxter permutations, bipolar\norientations, walks in cones, and a new family of discrete objects called\ncoalescent-walk processes.\n', 'Large deviation principle for random permutations We derive a large deviation principle for random permutations induced by\nprobability measures of the unit square, called permutons. These permutations\nare called $\\mu$-random permutations. We also introduce and study a new general\nclass of models of random permutations, called Gibbs permutation models, which\ncombines and generalizes $\\mu$-random permutations and the celebrated Mallows\nmodel for permutations. Most of our results hold in the general setting of\nGibbs permutation models.\n We apply the tools that we develop to the case of $\\mu$-random permutations\nconditioned to have an atypical proportion of patterns. Several results are\nmade more concrete in the specific case of inversions. For instance, we prove\nthe existence of at least one phase transition for a generalized version of the\nMallows model where the base measure is non-uniform. This is in contrast with\nthe results of Starr (2009, 2018) on the (standard) Mallows model, where the\nabsence of phase transition, i.e., phase uniqueness, was proven.\n Our results naturally lead us to investigate a new notion of permutons,\ncalled conditionally constant permutons, which generalizes both\npattern-avoiding and pattern-packing permutons. We describe some properties of\nconditionally constant permutons with respect to inversions. The study of\nconditionally constant permutons for general patterns seems to be a challenging\nproblem.\n']","[('random permutation', 0.5658107995986938), ('random permutations', 0.5631712675094604), ('permutons', 0.5559492707252502), ('mallows permutations', 0.5422400832176208), ('mallows permutation', 0.5403287410736084), ('uniform permutations', 0.5309769511222839), ('permutations size', 0.5104572772979736), ('baxter permutations', 0.4800531566143036), ('avoiding permutations', 0.474301278591156), ('permutations also', 0.4519740343093872)]" 368,368,79,368_rough path theory_rough paths_geometric rough path_rough path,"['rough path theory', 'rough paths', 'geometric rough path', 'rough path', 'rough differential', 'rough differential equations', 'driven rough', 'geometric rough', 'unbounded rough', 'rough stochastic']","['A combinatorial approach to geometric rough paths and their controlled\n paths We develop the structure theory for transformations of weakly geometric rough\npaths of bounded $1 < p$-variation and their controlled paths. Our approach\ndiffers from existing approaches as it does not rely on smooth approximations.\nWe derive an explicit combinatorial expression for the rough path lift of a\ncontrolled path, and use it to obtain fundamental identities such as the\nassociativity of the rough integral, the adjunction between pushforwards and\npullbacks, and a change of variables formula for rough differential equations\n(RDEs). As applications we define rough paths, rough integration and RDEs on\nmanifolds, extending the results of [CDL15] to the case of arbitrary $p$.\n', 'Rough differential equations and planarly branched universal limit\n theorem The universal limit theorem is a central result in rough path theory, which\nhas been proved for: (i) rough paths with roughness $\\frac{1}{3}< \\alpha \\leq\n\\frac{1}{2}$; (ii) geometric rough paths with roughness $0< \\alpha \\leq 1$;\n(iii) branched rough paths with roughness $0< \\alpha \\leq 1$. Planarly branched\nrough paths are natural generalizations of both rough paths and branched rough\npaths, in the sense that post-Lie algebras are generalizations of both Lie\nalgebras and pre-Lie algebras. Here the primitive elements of the graded dual\nHopf algebra of the Hopf algebra corresponding to the planarly branched rough\npaths (resp. rough paths, resp. branched rough paths) form a post-Lie (resp.\nLie, resp. pre-Lie algebra). In this paper, we prove the universal limit\ntheorem for planarly branched rough paths with roughness $\\frac{1}{4}< \\alpha\n\\leq \\frac{1}{3}$, via the method of Banach fixed point theorem.\n', ""A Transfer Principle for Branched Rough Paths A branched rough path $X$ consists of a rough integral calculus for $X \\colon\n[0, T] \\to \\mathbb R^d$ which may fail to satisfy integration by parts. Using\nKelly's bracket extension [Kel12], we define a notion of pushforward of\nbranched rough paths through smooth maps, which leads naturally to a definition\nof branched rough path on a smooth manifold. Once a covariant derivative is\nfixed, we are able to give a canonical, coordinate-free definition of integral\nagainst such rough paths. After characterising quasi-geometric rough paths in\nterms of their bracket extension, we use the same framework to define\nmanifold-valued rough differential equations (RDEs) driven by quasi-geometric\nrough paths. These results extend previous work on $3 > p$-rough paths\n[ABCRF22], itself a generalisation of the Ito calculus on manifolds developed\nby Meyer and Emery [Mey81, E89, E90], to the setting of non-geometric rough\ncalculus of arbitrarily low regularity.\n""]","[('rough path theory', 0.6322948336601257), ('rough paths', 0.6299737095832825), ('geometric rough path', 0.6043637990951538), ('rough path', 0.5799274444580078), ('rough differential', 0.5558889508247375), ('rough differential equations', 0.5412273406982422), ('driven rough', 0.5251142382621765), ('geometric rough', 0.522034764289856), ('unbounded rough', 0.5071966052055359), ('rough stochastic', 0.43973803520202637)]" 369,369,79,369_nematic liquid crystals_nematic liquid crystal_nematic liquid_liquid crystals,"['nematic liquid crystals', 'nematic liquid crystal', 'nematic liquid', 'liquid crystals', 'liquid crystal', 'navier stokes system', 'navier stokes equations', 'nematic', 'navier stokes', 'hydrodynamics']","[""Global Well-posedness and Long-time Behavior of the General\n Ericksen--Leslie System in 2D under a Magnetic Field In this paper, we investigate the global well-posedness and long-time\nbehavior of the two-dimensional general Ericksen--Leslie system for a nematic\nliquid crystal in a constant magnetic field. The PDE system consists of\nNavier--Stokes equations and the harmonic heat flow equation for the\norientations of liquid crystal molecules. For incompressible nematic liquid\ncrystal fluids with either isotropic or anisotropic properties in torus\n$\\mathbb{T}^2$, we derive the global well-posedness of strong solutions through\nhigher-order energy estimates combined with compactness methods and acquire the\nlong-time behavior of the solutions by using the \\L ojasiewicz--Simon\ninequality after obtaining the boundedness of the nematic liquid crystal\nmolecules' angle.\n"", 'Singularity formation for full Ericksen-Leslie system of nematic liquid\n crystal flows in dimension two In this paper, we prove the singularity formation for Poiseuille laminar flow\nof full Ericksen-Leslie system modeling nematic liquid crystal flows in\ndimension two. The singularity is due to the geometric effect at the origin.\n', 'A note on the Stochastic Ericksen-Leslie equations for nematic liquid\n crystals In this note we prove the existence and uniqueness of local maximal smooth\nsolution of the stochastic simplified Ericksen-Leslie systems modelling the\ndynamics of nematic liquid crystals under stochastic perturbations.\n']","[('nematic liquid crystals', 0.6692168712615967), ('nematic liquid crystal', 0.6397054195404053), ('nematic liquid', 0.575665295124054), ('liquid crystals', 0.5380709767341614), ('liquid crystal', 0.4880436062812805), ('navier stokes system', 0.449400395154953), ('navier stokes equations', 0.416167289018631), ('nematic', 0.403351366519928), ('navier stokes', 0.40269002318382263), ('hydrodynamics', 0.39862632751464844)]" 370,370,79,370_coagulation_weak solutions_weak solutions continuous_conserving solutions,"['coagulation', 'weak solutions', 'weak solutions continuous', 'conserving solutions', 'classical solutions', 'fragmentation models', 'fragmentation', 'growth fragmentation', 'flux solutions', 'solutions continuous']","['Discrete Coagulation-Fragmentation equations with multiplicative\n coagulation kernel and constant fragmentation kernel Here, we study a discrete Coagulation-Fragmentation equation with a\nmultiplicative coagulation kernel and a constant fragmentation kernel, which is\ncritical. We apply the discrete Bernstein transform to the original\nCoagulation-Fragmentation equation to get two new singular Hamilton-Jacobi\nequations and use viscosity solution methods to analyze them. We obtain\nwell-posedness, regularity, and long-time behaviors of the viscosity solutions\nto the Hamilton-Jacobi equations in certain ranges, which imply the\nwell-posedness and long-time behaviors of mass-conserving solutions to the\nCoagulation-Fragmentation equation. The results obtained provide some\ndefinitive answers to a conjecture posed in [11,10], and are counterparts to\nthose for the continuous case studied in [32].\n', 'Coagulation-Fragmentation equations with multiplicative coagulation\n kernel and constant fragmentation kernel We study a critical case of Coagulation-Fragmentation equations with\nmultiplicative coagulation kernel and constant fragmentation kernel. Our method\nis based on the study of viscosity solutions to a new singular Hamilton-Jacobi\nequation, which results from applying the Bernstein transform to the original\nCoagulation-Fragmentation equation. Our results include wellposedness,\nregularity and long-time behaviors of viscosity solutions to the\nHamilton-Jacobi equation in certain regimes, which have implications to\nwellposedness and long-time behaviors of \\emph{mass-conserving} solutions to\nthe Coagulation-Fragmentation equation.\n', 'Mass-conserving weak solutions to Oort-Hulst-Safronov coagulation\n equation with singular rates Existence of global weak solutions to the continuous Oort-Hulst-Safronov\n(OHS) coagulation equation is investigated for coagulation kernels capturing a\nsingularity near zero and growing linearly at infinity. The proof mainly relies\non a relation, between classical Smoluchowski coagulation equation (SCE) and\nOHS coagulation equation, which is introduced in [16] as generalized\ncoagulation equation. Moreover, all weak solutions formulated in a suitable\nsense are demonstrated to be mass-conserving. We obtain here a similar result\nfor OHS coagulation equation as the one in [6] for SCE.\n']","[('coagulation', 0.48731693625450134), ('weak solutions', 0.42593106627464294), ('weak solutions continuous', 0.37288910150527954), ('conserving solutions', 0.3680550158023834), ('classical solutions', 0.33930352330207825), ('fragmentation models', 0.32461753487586975), ('fragmentation', 0.31416141986846924), ('growth fragmentation', 0.3097873628139496), ('flux solutions', 0.30852189660072327), ('solutions continuous', 0.3037676513195038)]" 371,371,79,371_definable minimal structure_definable minimal_every definable_definable sets,"['definable minimal structure', 'definable minimal', 'every definable', 'definable sets', 'locally minimal', 'definable subsets', 'minimal structures', 'definable version', 'structures minimal', 'minimal structure']","['Approximation and zero set of definable functions in a definably\n complete locally o-minimal structure We consider a definably complete locally o-minimal expansion of an ordered\nfield. We treat two topics in this paper. The first topic is a definable\n$\\mathcal C^r$ approximation of a definable $\\mathcal C^{r-1}$ map between\ndefinable $\\mathcal C^r$ submanifolds in the definable $\\mathcal C^{r-1}$\ntopology. The second topic is the imbedding theorem for definably compact\ndefinable $\\mathcal C^r$ manifolds. We demonstrate that a definably normal\ndefinable $\\mathcal C^r$ manifold is a definably $\\mathcal C^r$ diffeomorphic\nto a definable $\\mathcal C^r$ submanifold. It enables us to show that the\ndefinable quotient of a definably compact definable $\\mathcal C^r$ group by a\ndefinable subgroup exists.\n', ""Tameness of definably complete locally o-minimal structures and\n definable bounded multiplication We first show that the projection image of a discrete definable set is again\ndiscrete for an arbitrary definably complete locally o-minimal structure. This\nfact together with the results in a previous paper implies tame dimension\ntheory and decomposition theorem into good-shaped definable subsets called\nquasi-special submanifolds. Using this fact, in the latter part of this paper,\nwe investigate definably complete locally o-minimal expansions of ordered\ngroups when the restriction of multiplication to an arbitrary bounded open box\nis definable. Similarly to o-minimal expansions of ordered fields,\n{\\L}ojasiewicz's inequality, Tietze extension theorem and affiness of\npsudo-definable spaces hold true for such structures under the extra assumption\nthat the domains of definition and the psudo-definable spaces are definably\ncompact. Here, a pseudo-definable space is a topological spaces having finite\ndefinable atlases. We also demonstrate Michael's selection theorem for\ndefinable set-valued functions with definably compact domains of definition.\n"", 'Definable quotients in locally o-minimal structures Let $\\mathcal F=(F, +. \\cdot, <, 0, 1, \\dots)$ be a definably complete\nlocally o-minimal expansion of an ordered field. We demonstrate the existence\nof definable quotients of definable sets by definable equivalence relations\nwhen several technical conditions are satisfied. These conditions are satisfied\nwhen $X$ is a locally closed definable subset of $F^n$ and there is a definable\nproper action of a definable group $G$ on $X$.\n']","[('definable minimal structure', 0.7417447566986084), ('definable minimal', 0.6895357370376587), ('every definable', 0.5720868706703186), ('definable sets', 0.5707852840423584), ('locally minimal', 0.5706207156181335), ('definable subsets', 0.5548571944236755), ('minimal structures', 0.5542487502098083), ('definable version', 0.5531508326530457), ('structures minimal', 0.5457032918930054), ('minimal structure', 0.5383472442626953)]" 372,372,79,372_prior distributions_posterior predictive distribution_posterior inference_posterior distributions,"['prior distributions', 'posterior predictive distribution', 'posterior inference', 'posterior distributions', 'bayes estimators', 'bayesian estimation', 'posterior predictive', 'prior distribution', 'posteriors', 'generalized bayes']","['Relations Between the Conditional Normalized Maximum Likelihood\n Distributions and the Latent Information Priors We reveal the relations between the conditional normalized maximum likelihood\n(CNML) distributions and Bayesian predictive densities based on the latent\ninformation priors (LIPs). In particular, CNML3, which is one type of CNML\ndistributions, is investigated. The Bayes projection of a predictive density,\nwhich is an information projection of the predictive density on a set of\nBayesian predictive densities, is considered. We prove that the sum of the\nBayes projection divergence of CNML3 and the conditional mutual information is\nasymptotically constant. This result implies that the Bayes projection of CNML3\n(BPCNML3) is asymptotically identical to the Bayesian predictive density based\non LIP. In addition, under some stronger assumptions, we show that BPCNML3\nexactly coincides with the Bayesian predictive density based on LIP.\n', 'Accuracy of Gaussian approximation in nonparametric Bernstein -- von\n Mises Theorem The prominent Bernstein -- von Mises (BvM) result claims that the posterior\ndistribution after centering by the efficient estimator and standardizing by\nthe square root of the total Fisher information is nearly standard normal. In\nparticular, the prior completely washes out from the asymptotic posterior\ndistribution. This fact is fundamental and justifies the Bayes approach from\nthe frequentist viewpoint. In the nonparametric setup the situation changes\ndramatically and the impact of prior becomes essential even for the contraction\nof the posterior; see [vdV2008], [Bo2011], [CaNi2013,CaNi2014] for different\nmodels like Gaussian regression or i.i.d. model in different weak topologies.\nThis paper offers another non-asymptotic approach to studying the behavior of\nthe posterior for a special but rather popular and useful class of statistical\nmodels and for Gaussian priors. First we derive tight finite sample bounds on\nposterior contraction in terms of the so called effective dimension of the\nparameter space. Our main results describe the accuracy of Gaussian\napproximation of the posterior. In particular, we show that restricting to the\nclass of all centrally symmetric credible sets around pMLE allows to get\nGaussian approximation up to order (n^{-1}). We also show that the posterior\ndistribution mimics well the distribution of the penalized maximum likelihood\nestimator (pMLE) and reduce the question of reliability of credible sets to\nconsistency of the pMLE-based confidence sets. The obtained results are\nspecified for nonparametric log-density estimation and generalized regression.\n', 'Enriched standard conjugate priors and the right invariant prior for\n Wishart distributions The prediction of the variance-covariance matrix of the multivariate normal\ndistribution is important in the multivariate analysis. We investigated\nBayesian predictive distributions for Wishart distributions under the\nKullback-Leibler divergence. The conditional reducibility of the family of\nWishart distributions enables us to decompose the risk of a Bayesian predictive\ndistribution. We considered a recently introduced class of prior distributions,\nwhich is called the family of enriched standard conjugate prior distributions,\nand compared the Bayesian predictive distributions based on these prior\ndistributions. Furthermore, we studied the performance of the Bayesian\npredictive distribution based on the reference prior distribution in the family\nand showed that there exists a prior distribution in the family that dominates\nthe reference prior distribution. Our study provides new insight into the\nmultivariate analysis when there exists an ordered inferential importance for\nthe independent variables.\n']","[('prior distributions', 0.5922869443893433), ('posterior predictive distribution', 0.5913994312286377), ('posterior inference', 0.5881401896476746), ('posterior distributions', 0.5864154696464539), ('bayes estimators', 0.5639004707336426), ('bayesian estimation', 0.538489043712616), ('posterior predictive', 0.5384443998336792), ('prior distribution', 0.5374892950057983), ('posteriors', 0.5299583673477173), ('generalized bayes', 0.5249616503715515)]" 373,373,79,373_supersonic flow_euler flows_steady euler equations_shock solutions,"['supersonic flow', 'euler flows', 'steady euler equations', 'shock solutions', 'compressible euler equations', 'shocks', 'potential flow', 'euler poisson system', 'steady euler', 'solutions euler poisson']","['Transonic shocks for steady Euler flows with an external force in an\n axisymmetric perturbed cylinder We concern the structural stability of transonic shocks for the steady Euler\nsystem with an external force in an axisymmetric perturbed cylinder. For a\nclass of external forces, we first prove the existence and uniqueness of the\ntransonic shock solution to the one-dimensional steady Euler system with an\nexternal force, which shows that the external force has a stabilization effect\non the transonic shock in the flat cylinder and the shock position is uniquely\ndetermined. We then establish the existence and stability of the transonic\nshock solution under axisymmetric perturbations of the incoming supersonic\nflow, the nozzle boundary, the exit pressure and the external force. Different\nfrom the transonic shock problem in two-dimensional nozzles, there exists a\nsingularity along the symmetric axis for axisymmetric flows. We introduce an\ninvertible modified Lagrangian transformation to overcome this difficulty and\nstraighten the streamline. One of the key elements in the analysis is to\nutilize the deformation-curl decomposition to effectively decouple the\nhyperbolic and elliptic modes in the steady axisymmetric Euler system with an\nexternal force. Another one is an equivalent reformulation of the\nRankine-Hugoniot conditions so that the shock front is uniquely determined by\nan algebraic equation.\n', 'Uniqueness of Transonic Shock Solutions for Two-Dimensional Steady\n Compressible Euler Flows in an Expanding Nozzle In this paper, we are trying to show the uniqueness of transonic shock\nsolutions in an expanding nozzle under certain conditions and assumptions on\nthe boundary data and the shock solution. The idea is to compare two transonic\nshock solutions and show that they should coincide if the perturbation of the\nnozzle is sufficiently small. To this end, a condition on the pressure of the\nflow across the shock front is proposed, such that a priori estimates for the\nsubsonic flow behind the shock front could be established without the\nassumption that it is a small perturbation of the unperturbed uniform subsonic\nstate. With the help of these estimates, the uniqueness of the position of the\nintersection point between the shock front and the nozzle boundary could be\nfurther established by demonstrating the monotonicity of the solvability\ncondition for the elliptic sub-problem of the subsonic flow behind the shock\nfront. Then, via contraction arguments, two transonic shock solutions could be\nverified to coincide as the perturbation is small, which leads to the\nuniqueness of the transonic shock solution.\n', 'Structural Stability of Transonic Shock Flows with an External Force This paper is devoted to the structural stability of a transonic shock\npassing through a flat nozzle for two-dimensional steady compressible flows\nwith an external force. We first establish the existence and uniqueness of one\ndimensional transonic shock solutions to the steady Euler system with an\nexternal force by prescribing suitable pressure at the exit of the nozzle when\nthe upstream flow is a uniform supersonic flow. It is shown that the external\nforce helps to stabilize the transonic shock in flat nozzles and the shock\nposition is uniquely determined. Then we are concerned with the structural\nstability of these transonic shoc solutions when the exit pressure is suitably\nperturbed. One of the new ingredients in our analysis is to use the\ndeformation-curl decomposition to the steady Euler system developed in\n\\cite{WengX2019} to deal with the transonic shock problem.\n']","[('supersonic flow', 0.5381531119346619), ('euler flows', 0.49902528524398804), ('steady euler equations', 0.4807656705379486), ('shock solutions', 0.4643316864967346), ('compressible euler equations', 0.43051785230636597), ('shocks', 0.3949955701828003), ('potential flow', 0.3814949095249176), ('euler poisson system', 0.38061726093292236), ('steady euler', 0.36908647418022156), ('solutions euler poisson', 0.3603183329105377)]" 374,374,79,374_c_0 semigroups_c_0 semigroup_operator semigroups_strongly continuous semigroups,"['c_0 semigroups', 'c_0 semigroup', 'operator semigroups', 'strongly continuous semigroups', 'continuous semigroups', 'semigroup bounded', 'semigroups banach', 'semigroups', 'semigroups general', 'semigroups hilbert']","['On asymptotics for $C_0$-semigroups We stretch the spectral bound equal growth bound condition along with a\ngeneralized Lyapunov stability theorem, known to hold for $C_0$-semigroups of\nnormal operators on complex Hilbert spaces, to $C_0$-semigroups of scalar type\nspectral operators on complex Banach spaces. For such semigroups, we obtain\nexponential estimates with the best stability constants. We also extend to a\nBanach space setting a celebrated characterization of uniform exponential\nstability for $C_0$-semigroups on complex Hilbert spaces and thereby acquire a\ncharacterization of uniform exponential stability for scalar type spectral and\neventually norm-continuous $C_0$-semigroups.\n', 'Characterizations of the Crandall--Pazy Class of $C_0$-semigroups on\n Hilbert Spaces and Their Application to Decay Estimates We investigate immediately differentiable $C_0$-semigroups $(e^{-tA})_{t \\geq\n0}$ satisfying $\\sup_{0 < t <1} t^{1/\\beta}\\|Ae^{-tA}\\| < \\infty$ for some $0 <\n\\beta \\leq 1$. Such $C_0$-semigroups are referred to as the Crandall--Pazy\nclass of $C_0$-semigroups. In the Hilbert space setting, we present two\ncharacterizations of the Crandall--Pazy class. We then apply these\ncharacterizations to estimate decay rates for Crank--Nicolson schemes with\nsmooth initial data when the associated abstract Cauchy problem is governed by\nan exponentially stable $C_0$-semigroup in the Crandall--Pazy class. The first\napproach is based on a functional calculus called the $\\mathcal{B}$-calculus.\nThe second approach builds upon estimates derived from Lyapunov equations and\nimproves the decay estimate obtained in the first approach, under the\nadditional assumption that $-A^{-1}$ generates a bounded $C_0$-semigroup.\n', ""On the regularity of scalar type spectral $C_0$-semigroups We show that, for the $C_0$-semigroups of scalar type spectral operators, a\nwell-known necessary condition for the generation of eventually norm-continuous\n$C_0$-semigroups, formulated exclusively in terms of the location of the\nspectrum of the semigroup's generator in the complex plane, is also sufficient\nand, in fact, characterizes the generators of immediately norm-continuous such\nsemigroups.\n Combining characterizations of the immediate differentiability and the Gevrey\nultradifferentiability of scalar type spectral $C_0$-semigroups with the\ngeneration theorem, found earlier by the author, we arrive at respective\ncharacterizations of the generation of such semigroups.\n We further establish characterizations of the generation of eventually\ndifferentiable and immediately compact scalar type spectral $C_0$-semigroups\nalso in terms of the generator's spectrum and show that, for such semigroups,\neventual compactness implies immediate.\n All the obtained results are instantly transferred to the $C_0$-semigroups of\nnormal operators.\n""]","[('c_0 semigroups', 0.740020215511322), ('c_0 semigroup', 0.7138640284538269), ('operator semigroups', 0.6977649927139282), ('strongly continuous semigroups', 0.6962099075317383), ('continuous semigroups', 0.6893165111541748), ('semigroup bounded', 0.6752175092697144), ('semigroups banach', 0.6722471117973328), ('semigroups', 0.6282438635826111), ('semigroups general', 0.6268917918205261), ('semigroups hilbert', 0.6171889901161194)]" 375,375,79,375_length geodesic_closed geodesics_simple closed geodesics_simple closed geodesic,"['length geodesic', 'closed geodesics', 'simple closed geodesics', 'simple closed geodesic', 'closed geodesic', 'geodesic surfaces', 'geodesics closed', 'geodesics riemannian', 'simple geodesic', 'curvature geodesic']","['The length of the shortest closed geodesic on positively curved\n 2-spheres We show that the shortest closed geodesic on a 2-sphere with non-negative\ncurvature has length bounded above by three times the diameter. We prove a new\nisoperimetric inequality for 2-spheres with pinched curvature; this allows us\nto improve our bound on the length of the shortest closed geodesic in the\npinched curvature setting.\n', 'From curve shortening to flat link stability and Birkhoff sections of geodesic flows We employ the curve shortening flow to establish three new results on the dynamics of geodesic flows of closed Riemannian surfaces. The first one is the stability, under $C^0$-small perturbations of the Riemannian metric, of certain flat links of closed geodesics. The second one is a forced existence theorem for closed connected orientable Riemannian surfaces: for surfaces of positive genus, the existence of a contractible simple closed geodesic $\\gamma$ forces the existence of infinitely many closed geodesics intersecting $\\gamma$ in every primitive free homotopy class of loops; for the 2-sphere, the existence of two disjoint simple closed geodesics forces the existence of a third one intersecting both. The final result asserts the existence of Birkhoff sections for the geodesic flow of any closed connected orientable Riemannian surface.', 'Minimizing closed geodesics on polygons and disks In this paper we study 1/k geodesics, those closed geodesics that minimize on\nall subintervals of length $L/k$, where $L$ is the length of the geodesic. We\ndevelop new techniques to study the minimizing properties of these curves on\ndoubled polygons, and demonstrate a sequence of doubled polygons whose closed\ngeodesics exhibit unbounded minimizing properties. We also compute the length\nof the shortest closed geodesic on doubled odd-gons and show that this length\napproaches 4 times the diameter.\n']","[('length geodesic', 0.7613329887390137), ('closed geodesics', 0.7600989937782288), ('simple closed geodesics', 0.7563445568084717), ('simple closed geodesic', 0.7343205213546753), ('closed geodesic', 0.7256487607955933), ('geodesic surfaces', 0.720312774181366), ('geodesics closed', 0.7098394632339478), ('geodesics riemannian', 0.6985927224159241), ('simple geodesic', 0.6962644457817078), ('curvature geodesic', 0.6936958432197571)]" 376,376,79,376_pricing hedging_asset pricing_arbitrage free_martingale optimal transport,"['pricing hedging', 'asset pricing', 'arbitrage free', 'martingale optimal transport', 'arbitrage', 'martingale optimal', 'semimartingales', 'martingale', 'financial markets', 'hedging']","['No-arbitrage conditions and pricing from discrete-time to\n continuous-time strategies In this paper, a general framework is developed for continuous-time financial\nmarket models defined from simple strategies through conditional topologies\nthat avoid stochastic calculus and do not necessitate semimartingale models. We\nthen compare the usual no-arbitrage conditions of the literature, e.g. the\nusual no-arbitrage conditions NFL, NFLVR and NUPBR and the recent AIP\ncondition. With appropriate pseudo-distance topologies, we show that they hold\nin continuous time if and only if they hold in discrete time. Moreover, the\nsuper-hedging prices in continuous time coincide with the discrete-time\nsuper-hedging prices, even without any no-arbitrage condition.\n', 'Super-hedging-pricing formulas and Immediate-Profit arbitrage for market\n models under random horizon In this paper, we consider the discrete-time setting, and the market model\ndescribed by (S,F,T)$. Herein F is the ``public"" flow of information which is\navailable to all agents overtime, S is the discounted price process of\nd-tradable assets, and T is an arbitrary random time whose occurrence might not\nbe observable via F. Thus, we consider the larger flow G which incorporates F\nand makes T an observable random time. This framework covers the credit risk\ntheory setting, the life insurance setting and the setting of employee stock\noption valuation. For the stopped model (S^T,G) and for various vulnerable\nclaims, based on this model, we address the super-hedging pricing valuation\nproblem and its intrinsic Immediate-Profit arbitrage (IP hereafter for short).\nOur first main contribution lies in singling out the impact of change of prior\nand/or information on conditional essential supremum, which is a vital tool in\nsuper-hedging pricing. The second main contribution consists of describing as\nexplicit as possible how the set of super-hedging prices expands under the\nstochasticity of T and its risks, and we address the IP arbitrage for (S^T,G)\nas well. The third main contribution resides in elaborating as explicit as\npossible pricing formulas for vulnerable claims, and singling out the various\ninformational risks in the prices\' dynamics.\n', 'Pricing and hedging for a sticky diffusion We introduce a financial market model featuring a risky asset whose price\nfollows a sticky geometric Brownian motion and a riskless asset that grows with\na constant interest rate $r\\in \\mathbb R $. We prove that this model satisfies\nNo Arbitrage (NA) and No Free Lunch with Vanishing Risk (NFLVR) only when $r=0\n$. Under this condition, we derive the corresponding arbitrage-free pricing\nequation, assess replicability and representation of the replication strategy.\nWe then show that all locally bounded replicable payoffs for the standard\nBlack--Scholes model are also replicable for the sticky model. Last, we\nevaluate via numerical experiments the impact of hedging in discrete time and\nof misrepresenting price stickiness.\n']","[('pricing hedging', 0.5562582612037659), ('asset pricing', 0.4642876386642456), ('arbitrage free', 0.4443102478981018), ('martingale optimal transport', 0.4397875666618347), ('arbitrage', 0.43526315689086914), ('martingale optimal', 0.4332718253135681), ('semimartingales', 0.42639437317848206), ('martingale', 0.42539092898368835), ('financial markets', 0.42518162727355957), ('hedging', 0.41913920640945435)]" 377,377,79,377_incompleteness_completeness_undecidability_formal theory,"['incompleteness', 'completeness', 'undecidability', 'formal theory', 'formal systems', 'theorems', 'provability', 'computably enumerable', 'undecidable', 'arithmetical']","['On Constructivity and the Rosser Property: a closer look at some\n G\\""odelean proofs The proofs of Kleene, Chaitin and Boolos for G\\""odel\'s First Incompleteness\nTheorem are studied from the perspectives of constructivity and the Rosser\nproperty. A proof of the incompleteness theorem has the Rosser property when\nthe independence of the true but unprovable sentence can be shown by assuming\nonly the (simple) consistency of the theory. It is known that G\\""odel\'s own\nproof for his incompleteness theorem does not have the Rosser property, and we\nshow that neither do Kleene\'s or Boolos\' proofs. However, we show that a\nvariant of Chaitin\'s proof can have the Rosser property. The proofs of G\\""odel,\nRosser and Kleene are constructive in the sense that they explicitly construct,\nby algorithmic ways, the independent sentence(s) from the theory. We show that\nthe proofs of Chaitin and Boolos are not constructive, and they prove only the\nmere existence of the independent sentences.\n', 'A Machine-Assisted Proof of G\\""odel\'s Incompleteness Theorems for the\n Theory of Hereditarily Finite Sets A formalisation of G\\""odel\'s incompleteness theorems using the Isabelle proof\nassistant is described. This is apparently the first mechanical verification of\nthe second incompleteness theorem. The work closely follows {\\\'S}wierczkowski\n(2003), who gave a detailed proof using hereditarily finite set theory. The\nadoption of this theory is generally beneficial, but it poses certain technical\nissues that do not arise for Peano arithmetic. The formalisation itself should\nbe useful to logicians, particularly concerning the second incompleteness\ntheorem, where existing proofs are lacking in detail.\n', ""Some reflections on the relationship between logical incompleteness and\n concrete incompleteness In this paper, we aim to conceptually examine the relationship between\nlogical incompleteness and concrete incompleteness which both study the\nincompleteness phenomenon. We argue for two main theses. Firstly, the current\nresearch on concrete incompleteness reals both similarities and differences\nbetween logical incompleteness and concrete incompleteness. Similarities\nbetween them are not universal, and differences between them are essential.\nSecondly, concrete incompleteness is a higher order phenomenon over logical\nincompleteness. This verifies that Hilbert's concrete and intuitive proof\ntheory provides us essential new information from non-concrete and\nnon-intuitive ideal proofs. We examine similarities between logical\nincompleteness and concrete incompleteness from two aspects: equivalences\nbetween logical incompleteness and concrete incompleteness, and the ubiquity of\nthe incompleteness phenomenon in both logical incompleteness and concrete\nincompleteness. We examine differences between logical incompleteness and\nconcrete incompleteness from five aspects: (1) the influence on Hilbert's\nprogram; (2) properties of independent sentences; (3) the intensionality\nproblem; (4) the relationship with ordinal analysis; (5) the limit of\nprovability.\n""]","[('incompleteness', 0.6439491510391235), ('completeness', 0.49630966782569885), ('undecidability', 0.49108561873435974), ('formal theory', 0.4696025550365448), ('formal systems', 0.4380451738834381), ('theorems', 0.426035076379776), ('provability', 0.41886967420578003), ('computably enumerable', 0.41485869884490967), ('undecidable', 0.39864376187324524), ('arithmetical', 0.3956137001514435)]" 378,378,78,378_fundamental groupoids_topological fundamental group_fundamental groupoid_fundamental groups,"['fundamental groupoids', 'topological fundamental group', 'fundamental groupoid', 'fundamental groups', 'fundamental group', 'fundamental group pi_1', 'universal covering space', 'topological fundamental', 'topological groups', 'topological group']","['Topological fundamental groupoid. III. Haar systems on the fundamental\n groupoid Let $X$ be a path connected, locally path connected and semilocally simply\nconnected space; let $\\tilde{X}$ be its universal cover. We discuss the\nexistence and description of a Haar system on the fundamental groupoid\n$\\Pi_1(X)$ of $X$. The existence of a Haar system on $\\Pi_1(X)$ is justified\nwhen $X$ is a second countable, locally compact and Hausdorff. We provide\nequivalent criteria for the existence of the Haar system on a locally compact\n(locally Hausdorff) fundamental groupoid in terms of certain measures on $X$\nand $\\tilde{X}$. $\\mathrm{C}^*(\\Pi_1(X))$ is described using a result of Muhly,\nRenault and Williams. Finally, two formulae for the Haar system on $\\Pi_1(X)$\nin terms of measures on $X$ or $\\tilde{X}$ are given.\n', 'Dense products in fundamental groupoids Infinitary operations, such as products indexed by countably infinite linear\norders, arise naturally in the context of fundamental groups and groupoids.\nDespite the fact that the usual binary operation of the fundamental group\ndetermines the operation of the fundamental groupoid, we show that, for a\nlocally path-connected metric space, the well-definedness of countable dense\nproducts in the fundamental group need not imply the well-definedness of\ncountable dense products in the fundamental groupoid. Additionally, we show the\nfundamental groupoid $\\Pi_1(X)$ has well-defined dense products if and only if\n$X$ admits a generalized universal covering space.\n', 'Topological Fundamental Groupoid. II. An action category of the\n fundamental groupoid For a path connected, locally path connected and semilocally simply connected\nspace $X$, let $\\Pi_1(X)$ denote its topologised fundamental groupoid as\nestablished in the first article of this series. Let $\\mathcal{E}$ be the\ncategory of $\\Pi_1(X)$-spaces in which the momentum maps are local\nhomeomorphisms. We show that this category is isomorphic to that of covering\nspaces of $X$. Using this, we give different characterisations for free or\nproper actions of the fundamental groupoid in $\\mathcal{E}$.\n']","[('fundamental groupoids', 0.6871073246002197), ('topological fundamental group', 0.683088481426239), ('fundamental groupoid', 0.6586177945137024), ('fundamental groups', 0.6471946239471436), ('fundamental group', 0.6341830492019653), ('fundamental group pi_1', 0.6341117024421692), ('universal covering space', 0.6134421825408936), ('topological fundamental', 0.5835886001586914), ('topological groups', 0.5685991644859314), ('topological group', 0.5418099761009216)]" 379,379,78,379_time fractional diffusion_fractional diffusion_order time fractional_fractional derivative,"['time fractional diffusion', 'fractional diffusion', 'order time fractional', 'fractional derivative', 'time fractional', 'fractional evolution equations', 'fractional order', 'fractional nonlocal', 'discrete fractional', 'tempered fractional']","['Sharp pointwise-in-time error estimate of L1 scheme for nonlinear\n subdiffusion equations An essential feature of the subdiffusion equations with the $\\alpha$-order\ntime fractional derivative is the weak singularity at the initial time. The\nweak regularity of the solution is usually characterized by a regularity\nparameter $\\sigma\\in (0,1)\\cup(1,2)$. Under this general regularity assumption,\nwe here obtain the pointwise-in-time error estimate of the widely used L1\nscheme for nonlinear subdiffusion equations. To the end, we present a refined\ndiscrete fractional-type Gr\\""onwall inequality and a rigorous analysis for the\ntruncation errors. Numerical experiments are provided to demonstrate the\neffectiveness of our theoretical analysis.\n', 'A discrete Gr\\""{o}nwall inequality with application to numerical schemes\n for subdiffusion problems We consider a class of numerical approximations to the Caputo fractional\nderivative. Our assumptions permit the use of nonuniform time steps, such as is\nappropriate for accurately resolving the behavior of a solution whose\nderivatives are singular at~$t=0$. The main result is a type of fractional\nGr\\""{o}nwall inequality and we illustrate its use by outlining some stability\nand convergence estimates of schemes for fractional reaction-subdiffusion\nproblems. This approach extends earlier work that used the familiar L1\napproximation to the Caputo fractional derivative, and will facilitate the\nanalysis of higher order and linearized fast schemes.\n', 'Numerical analysis of linear and nonlinear time-fractional subdiffusion\n equations In this paper, a new type of the discrete fractional Gr{\\""o}nwall inequality\nis developed, which is applied to analyze the stability and convergence of a\nGalerkin spectral method for a linear time-fractional subdiffusion equation.\nBased on the temporal-spatial error splitting argument technique, the discrete\nfractional Gr{\\""o}nwall inequality is also applied to prove the unconditional\nconvergence of a semi-implicit Galerkin spectral method for a nonlinear\ntime-fractional subdiffusion equation.\n']","[('time fractional diffusion', 0.6052443981170654), ('fractional diffusion', 0.6009534001350403), ('order time fractional', 0.5524219274520874), ('fractional derivative', 0.5036751627922058), ('time fractional', 0.4916575253009796), ('fractional evolution equations', 0.4912415146827698), ('fractional order', 0.48502296209335327), ('fractional nonlocal', 0.46050047874450684), ('discrete fractional', 0.4563896656036377), ('tempered fractional', 0.4498540461063385)]" 380,380,78,380_golay complementary sequences_complementary sequences_complementary pairs_complementary sets,"['golay complementary sequences', 'complementary sequences', 'complementary pairs', 'complementary sets', 'generalized boolean', 'golay complementary', 'zc sequences', 'boolean functions', 'sequence pairs', 'sequences constructed']","[""A Direct and Generalized Construction of Polyphase Complementary Set\n with Low PMEPR and High Code-Rate for OFDM System A major drawback of orthogonal frequency division multiplexing (OFDM) systems\nis their high peak-to-mean envelope power ratio (PMEPR). The PMEPR problem can\nbe solved by adopting large codebooks consisting of complementary sequences\nwith low PMEPR. In this paper, we present a new construction of polyphase\ncomplementary sets (CSs) using generalized Boolean functions (GBFs), which\ngeneralizes Schmidt's construction in 2007, Paterson's construction in 2000 and\nGolay complementary pairs (GCPs) given by Davis and Jedwab in 1999. Compared\nwith Schmidt's approach, our proposed CSs lead to lower PMEPR with higher\ncode-rate for sequences constructed from higher-order ($\\geq 3$) GBFs. We\nobtain polyphase complementary sequences with maximum PMEPR of $2^{k+1}$ and\n$2^{k+2}-2M$ where $k,M$ are non-negative integers that can be easily derived\nfrom the GBF associated with the CS.\n"", 'A Construction of 2-D Z-Complementary Array Code Sets with Flexible Even\n Row Lengths and Applications in Massive MIMO The need for two-dimensional (2-D) arrays with good 2-D correlation\nproperties and flexible parameters has been of great interest due to their\napplication in the field of wireless communications such as massive multiple\ninput multiple output (MIMO), phased array antenna, multi-carrier code division\nmultiple access (MC-CDMA), 2D-MC-CDMA, etc. In this paper, we propose a direct\nconstruction of a 2-D Z-complementary array code set (ZCACS) with flexible\nparameters. For this purpose, we first propose a construction of inter-group\ncomplementary (IGC) code sets using multivariable function and by using this\nconstruction 2-D Z-complementary array code (ZCAC) and 2-D ZCAC set (ZCACS) are\nprovided. In some special case, the proposed 2-D ZCAC reduces to a 2-D\nZ-complementary array pair (ZCAP), which is not reported till date. The\npeak-to-mean envelope power ratio (PMEPR) of row and column sequences of 2-D\nZCAC is shown to be better than the existing ones for use in MC-CDMA. 2-D Golay\ncomplementary array set (GCAS) and Golay complementary set (GCS) are derived\nfrom the proposed construction, which can be applied in omnidirectional\nprecoding (OP) based transmission through massive MIMO. The proposed\nconstruction can support a more flexible number of antennas for a uniform\nrectangular array (URA) to transmit space-time block coded (STBC) data, than\nthe existing constructions. The bit-error-rate (BER) simulation result also\nshows the performance benefits of derived 2-D GCAS and GCS compared to the\nexisting ones.\n', 'Two-Dimensional Golay Complementary Array Sets from Generalized Boolean\n Functions The one-dimensional (1-D) Golay complementary set (GCS) has many well-known\nproperties and has been widely employed in engineering. The concept of 1-D GCS\ncan be extended to the two-dimensional (2-D) Golay complementary array set\n(GCAS) where the 2-D aperiodic autocorrelation of constituent arrays sum to\nzero except for the 2-D zero shift. The 2-D GCAS includes the 2-D Golay\ncomplementary array pair (GCAP) as a special case when the set size is 2. In\nthis paper, 2-D generalized Boolean functions are introduced and novel\nconstructions of 2-D GCAPs, 2-D GCASs, and 2-D Golay complementary array mates\nbased on generalized Boolean functions are proposed. Explicit expressions of\n2-D Boolean functions for 2-D GCAPs and 2-D GCASs are given. Therefore, they\nare all direct constructions without the aid of other existing 1-D or 2-D\nsequences. Moreover, for the column sequences and row sequences of the\nconstructed 2-D GCAPs, their peak-to-average power ratio (PAPR) properties are\nalso investigated.\n']","[('golay complementary sequences', 0.6312750577926636), ('complementary sequences', 0.5379337668418884), ('complementary pairs', 0.517177402973175), ('complementary sets', 0.45214200019836426), ('generalized boolean', 0.43368053436279297), ('golay complementary', 0.41992977261543274), ('zc sequences', 0.3955727815628052), ('boolean functions', 0.37639838457107544), ('sequence pairs', 0.3581572473049164), ('sequences constructed', 0.356512188911438)]" 381,381,78,381_distributive lattices_distributive lattice_lattice poset_complete lattice,"['distributive lattices', 'distributive lattice', 'lattice poset', 'complete lattice', 'relation algebras', 'lattices', 'lattice', 'pseudocomplemented', 'finite distributive', 'semilattices']","['Algebras describing pseudocomplemented, relatively pseudocomplemented\n and sectionally pseudocomplemented posets In order to be able to use methods of Universal Algebra for investigating\nposets, we assign to every pseudocomplemented poset, to every relatively\npseudocomplemented poset and to every sectionally pseudocomplemented poset a\ncertain algebra (based on a commutative directoid or on a lambda-lattice) which\nsatisfies certain identities and implications. We show that the assigned\nalgebras fully characterize the given corresponding posets. It turns out that\nthe assigned algebras satisfy strong congruence properties which can be\ntransferred back to the posets. We also mention applications of such posets in\ncertain non-classical logics.\n', 'Filters and ideals in pseudocomplemented posets We study ideals and filters of posets and of pseudocomplemented posets and\nshow a version of the Separation Theorem, known for ideals and filters in\nlattices and semilattices, within this general setting. We extend the concept\nof a *-ideal already introduced by Rao for pseudocomplemented distributive\nlattices and by Talukder, Chakraborty and Begum for pseudocomplemented\nsemilattices to pseudocomplemented posets. We derive several important\nproperties of such ideals. Especially, we explain connections between prime\nfilters, ultrafilters, filters satisfying the *-condition and dense elements.\nFinally, we prove a Separation Theorem for *-ideals.\n', 'Properties and special filters of pseudocomplemented posets Investigating the structure of pseudocomplemented lattices started ninety\nyears ago with papers by V. Glivenko, G. Birkhoff and O. Frink and this\nstructure was essentially developed by G. Gr\\""atzer. In recent years, some\nspecial filters in pseudocomplemented and Stone lattices have been studied by\nM. Sambasiva Rao. However, in some applications, in particular in non-classical\nlogics with unsharp logical connectives, pseudocomplemented posets instead of\nlattices are used. This motivated us to develop an algebraic theory of\npseudocomplemented posets, i.e. we derive identities and inequalities holding\nin such posets and we use them in order to characterize the so-called Stone\nposets. Then we adopt several concepts of special filters and we investigate\ntheir properties in pseudocomplemented posets. Moreover, we show how properties\nof these filters influence algebraic properties of the underlying\npseudocomplemented posets.\n']","[('distributive lattices', 0.7121371030807495), ('distributive lattice', 0.6728543639183044), ('lattice poset', 0.6287254691123962), ('complete lattice', 0.5268056988716125), ('relation algebras', 0.5203328728675842), ('lattices', 0.5166617035865784), ('lattice', 0.47857001423835754), ('pseudocomplemented', 0.4715483784675598), ('finite distributive', 0.4435392916202545), ('semilattices', 0.44221121072769165)]" 382,382,78,382_operators graphs_graphs spectral_operator graph_quantum graphs,"['operators graphs', 'graphs spectral', 'operator graph', 'quantum graphs', 'schr odinger operators', 'quantum graph', 'compact metric graphs', 'odinger operators', 'schr odinger operator', 'spectral theory']","['Comparing the spectrum of Schr\\""odinger operators on quantum graphs We study Schr\\""odinger operators on compact finite metric graphs subject to\n$\\delta$-coupling and standard boundary conditions. We compare the $n$-th\neigenvalues of those self-adjoint realizations and derive an asymptotic result\nfor the mean value of deviations. By doing this, we generalize recent results\nfrom Rudnick et al. obtained for domains in $\\mathbb{R}^2$ to the setting of\nquantum graphs. This also leads to a generalization of related results\npreviously and independently obtained in [arXiv:2212.09143] and\n[arXiv:2212.12531] for metric graphs. In addition, based on our main result, we\nintroduce some notions of circumference for a (quantum) graph which might prove\nuseful in the future.\n', 'Surgery transformations and spectral estimates of $\\delta$ beam\n operators We introduce $\\delta$ type vertex conditions for beam operators, the fourth\nderivative operator, on metric graphs and study the effect of certain\ngeometrical alterations (graph surgery) of the graph on the spectra of beam\noperators on compact metric graphs. Results are obtained for a class of vertex\nconditions which can be seen as an analogue of {\\delta} vertex conditions for\nquantum graphs. There are a number of possible candidates of {\\delta} type\nconditions for beam operators. We develop surgery principles and record the\nmonotonicity properties of the spectrum, keeping in view the possibility that\nvertex conditions may change within the same class after certain graph\nalterations. We also demonstrate the applications of surgery principles by\nobtaining several lower and upper estimates on the eigenvalues.\n', 'The Krein-von Neumann extension for Schr\\""odinger operators on metric\n graphs The Krein-von Neumann extension is studied for Schr\\""odinger operators on\nmetric graphs. Among other things, its vertex conditions are expressed\nexplicitly, and its relation to other self-adjoint vertex conditions (e.g.\ncontinuity-Kirchhoff) is explored. A variational characterisation for its\npositive eigenvalues is obtained. Based on this, the behaviour of its\neigenvalues under perturbations of the metric graph is investigated, and\nso-called surgery principles are established. Moreover, isoperimetric\neigenvalue inequalities are obtained.\n']","[('operators graphs', 0.6146266460418701), ('graphs spectral', 0.6094761490821838), ('operator graph', 0.6016937494277954), ('quantum graphs', 0.5793662071228027), ('schr odinger operators', 0.5630861520767212), ('quantum graph', 0.5612211227416992), ('compact metric graphs', 0.5282479524612427), ('odinger operators', 0.5266996622085571), ('schr odinger operator', 0.5247525572776794), ('spectral theory', 0.506464421749115)]" 383,383,78,383_ricci solitons_invariant ricci_ricci tensor_metrics lie groups,"['ricci solitons', 'invariant ricci', 'ricci tensor', 'metrics lie groups', 'ricci curvature', 'ricci soliton', 'generalized ricci', 'lorentzian metrics', 'lie groups', 'generalized ricci flow']","['Canonical connections and algebraic Ricci solitons of three-dimensional\n Lorentzian Lie groups In this paper, we compute canonical connections and Kobayashi-Nomizu\nconnections and their curvature on three-dimensional Lorentzian Lie groups with\nsome product structure. We define algebraic Ricci solitons associated to\ncanonical connections and Kobayashi-Nomizu connections. We classify algebraic\nRicci solitons associated to canonical connections and Kobayashi-Nomizu\nconnections on three-dimensional Lorentzian Lie groups with some product\nstructure.\n', 'Left-invariant Ricci collineations associated to canonical connections\n on three-dimensional Lorentzian Lie groups In this paper, we classify Left-invariant Ricci collineations associated to\ncanonical connections and Kobayashi-Nomizu connections on three-dimensional\nLorentzian Lie groups.\n', 'Affine Ricci solitons of three-dimensional Lorentzian Lie groups In this paper, we classify affine Ricci solitons associated to canonical\nconnections and Kobayashi-Nomizu connections and perturbed canonical\nconnections and perturbed Kobayashi-Nomizu connections on three-dimensional\nLorentzian Lie groups with some product structure.\n']","[('ricci solitons', 0.6132519841194153), ('invariant ricci', 0.6004853844642639), ('ricci tensor', 0.5687137842178345), ('metrics lie groups', 0.5677045583724976), ('ricci curvature', 0.5654342770576477), ('ricci soliton', 0.5627171397209167), ('generalized ricci', 0.5623127818107605), ('lorentzian metrics', 0.5278225541114807), ('lie groups', 0.5142693519592285), ('generalized ricci flow', 0.5086314678192139)]" 384,384,78,384_automorphism group affine_automorphisms affine_algebraic groups_groups affine,"['automorphism group affine', 'automorphisms affine', 'algebraic groups', 'groups affine', 'affine algebraic variety', 'algebraic group', 'affine varieties', 'algebraic subgroups', 'algebraic varieties', 'algebraic subgroup']","['When is the automorphism group of an affine variety linear? Let $Aut_{alg}(X)$ be the subgroup of the group of regular automorphisms\n$Aut(X)$ of an affine algebraic variety $X$ generated by all connected\nalgebraic subgroups. We prove that if $dim X \\ge 2$ and if $Aut_{alg}(X)$ is\nrich enough, $Aut_{alg}(X)$ is not linear, i.e., it cannot be embedded into\n$GL_n(K)$, where $K$ is an algebraically closed field of characteristic zero.\nMoreover, $Aut(X)$ is isomorphic to an algebraic group as an abstract group\nonly if the connected component of $Aut(X)$ is either the algebraic torus or a\ndirect limit of commutative unipotent groups. Finally, we prove that for an\nuncountable $K$ the group of birational transformations of $X$ cannot be\nisomorphic to the group of automorphisms of an affine variety if $X$ is endowed\nwith a rational action of a positive-dimensional linear algebraic group.\n', 'Maximal commutative unipotent subgroups and a characterization of affine\n spherical varieties We describe maximal commutative unipotent subgroups of the automorphism group\n$\\mathrm{Aut}(X)$ of an irreducible affine variety $X$. Further we show that a\ngroup isomorphism $\\mathrm{Aut}(X) \\to \\mathrm{Aut}(Y)$ maps unipotent elements\nto unipotent elements, where $Y$ is irreducible and affine. Using this result,\nwe show that the automorphism group detects sphericity and the weight-monoid.\n As an application, we show that an affine toric variety different from an\nalgebraic torus is determined by its automorphism group among normal\nirreducible affine varieties and we show that a smooth affine spherical variety\ndifferent from an algebraic torus is determined by its automorphism group (up\nto an automorphism of the base field) among smooth irreducible affine\nvarieties.\n', 'When is the automorphism group of an affine variety nested? For an affine algebraic variety $X$, we study the subgroup\n$\\mathrm{Aut}_{\\text{alg}}(X)$ of the group of regular automorphisms\n$\\mathrm{Aut}(X)$ of $X$ generated by all the connected algebraic subgroups. We\nprove that $\\mathrm{Aut}_{\\text{alg}}(X)$ is nested, i.e., is a direct limit of\nalgebraic subgroups of $\\mathrm{Aut}(X)$, if and only if all the\n$\\mathbb{G}_a$-actions on $X$ commute. Moreover, we describe the structure of\nsuch a group $\\mathrm{Aut}_{\\text{alg}}(X)$.\n']","[('automorphism group affine', 0.6595730185508728), ('automorphisms affine', 0.6288237571716309), ('algebraic groups', 0.6234959363937378), ('groups affine', 0.5937581062316895), ('affine algebraic variety', 0.584550678730011), ('algebraic group', 0.5843175053596497), ('affine varieties', 0.5733441114425659), ('algebraic subgroups', 0.5713752508163452), ('algebraic varieties', 0.561937689781189), ('algebraic subgroup', 0.5507652163505554)]" 385,385,78,385_radiative transport_radiative transfer_radiation transport_thermal radiation,"['radiative transport', 'radiative transfer', 'radiation transport', 'thermal radiation', 'transfer equations', 'radiative', 'boltzmann transport', 'scattering', 'radiation', 'diffusion limit']","['Remarks on the Radiative Transfer Equations for Climatology Using theoretical and numerical arguments we discuss some of the commonly\naccepted approximations for the radiative transfer equations in climatology.\n', 'Numerical analysis of a spherical harmonic discontinuous Galerkin method\n for scaled radiative transfer equations with isotropic scattering In highly diffusion regimes when the mean free path $\\varepsilon$ tends to\nzero, the radiative transfer equation has an asymptotic behavior which is\ngoverned by a diffusion equation and the corresponding boundary condition.\nGenerally, a numerical scheme for solving this problem has the truncation error\ncontaining an $\\varepsilon^{-1}$ contribution, that leads to a nonuniform\nconvergence for small $\\varepsilon$. Such phenomenons require high resolutions\nof discretizations, which degrades the performance of the numerical scheme in\nthe diffusion limit. In this paper, we first provide a--priori estimates for\nthe scaled spherical harmonic ($P_N$) radiative transfer equation. Then we\npresent an error analysis for the spherical harmonic discontinuous Galerkin\n(DG) method of the scaled radiative transfer equation showing that, under some\nmild assumptions, its solutions converge uniformly in $\\varepsilon$ to the\nsolution of the scaled radiative transfer equation. We further present an\noptimal convergence result for the DG method with the upwind flux on Cartesian\ngrids. Error estimates of $\\left(1+\\mathcal{O}(\\varepsilon)\\right)h^{k+1}$\n(where $h$ is the maximum element length) are obtained when tensor product\npolynomials of degree at most $k$ are used.\n', 'A Variable Eddington Factor Model for Thermal Radiative Transfer with\n Closure based on Data-Driven Shape Function A new variable Eddington factor (VEF) model is presented for nonlinear\nproblems of thermal radiative transfer (TRT). The VEF model is a data-driven\none that acts on known (a-priori) radiation-diffusion solutions for material\ntemperatures in the TRT problem. A linear auxiliary problem is constructed for\nthe radiative transfer equation (RTE) with opacities and emission source\nevaluated at the known material temperatures. The solution to this RTE\napproximates the specific intensity distribution for the problem in all\nphase-space and time. It is applied as a shape function to define the Eddington\ntensor for the presented VEF model. The shape function computed via the\nauxiliary RTE problem will capture some degree of transport effects within the\nTRT problem. The VEF moment equations closed with this approximate Eddington\ntensor will thus carry with them these captured transport effects. In this\nstudy, the temperature data comes from multigroup $P_1$, $P_{1/3}$, and\nflux-limited diffusion radiative transfer (RT) models. The proposed VEF model\ncan be interpreted as a transport-corrected diffusion reduced-order model.\nNumerical results are presented on the Fleck-Cummings test problem which models\na supersonic wavefront of radiation. The presented VEF model is shown to\nreliably improve accuracy by 1-2 orders of magnitude compared to the considered\nradiation-diffusion model solutions to the TRT problem.\n']","[('radiative transport', 0.6808843016624451), ('radiative transfer', 0.6546933054924011), ('radiation transport', 0.5630890130996704), ('thermal radiation', 0.5059009194374084), ('transfer equations', 0.4679494798183441), ('radiative', 0.43669334053993225), ('boltzmann transport', 0.39475610852241516), ('scattering', 0.3470453917980194), ('radiation', 0.3468194305896759), ('diffusion limit', 0.3418880105018616)]" 386,386,77,386_elliptic optimal control_parabolic optimal control_parabolic optimal_elliptic optimal,"['elliptic optimal control', 'parabolic optimal control', 'parabolic optimal', 'elliptic optimal', 'distributed optimal control', 'optimal control problems', 'optimal control governed', 'neumann boundary control', 'finite element discretization', 'variational discretization']","['Robust finite element solvers for distributed hyperbolic optimal control\n problems We propose, analyze, and test new robust iterative solvers for systems of\nlinear algebraic equations arising from the space-time finite element\ndiscretization of reduced optimality systems defining the approximate solution\nof hyperbolic distributed, tracking-type optimal control problems with both the\nstandard $L^2$ and the more general energy regularizations. In contrast to the\nusual time-stepping approach, we discretize the optimality system by space-time\ncontinuous piecewise-linear finite element basis functions which are defined on\nfully unstructured simplicial meshes. If we aim at the asymptotically best\napproximation of the given desired state $y_d$ by the computed finite element\nstate $y_{\\varrho h}$, then the optimal choice of the regularization parameter\n$\\varrho$ is linked to the space-time finite element mesh-size $h$ by the\nrelations $\\varrho=h^4$ and $\\varrho=h^2$ for the $L^2$ and the energy\nregularization, respectively. For this setting, we can construct robust\n(parallel) iterative solvers for the reduced finite element optimality systems.\nThese results can be generalized to variable regularization parameters adapted\nto the local behavior of the mesh-size that can heavily change in the case of\nadaptive mesh refinements. The numerical results illustrate the theoretical\nfindings firmly.\n', 'Space-time finite element methods for distributed optimal control of the\n wave equation We consider space-time tracking type distributed optimal control problems for\nthe wave equation in the space-time domain $Q:= \\Omega \\times (0,T) \\subset\n{\\mathbb{R}}^{n+1}$, where the control is assumed to be in the energy space\n$[H_{0;,0}^{1,1}(Q)]^*$, rather than in $L^2(Q)$ which is more common. While\nthe latter ensures a unique state in the Sobolev space $H^{1,1}_{0;0,}(Q)$,\nthis does not define a solution isomorphism. Hence we use an appropriate state\nspace $X$ such that the wave operator becomes an isomorphism from $X$ onto\n$[H_{0;,0}^{1,1}(Q)]^*$. Using space-time finite element spaces of piecewise\nlinear continuous basis functions on completely unstructured but shape regular\nsimplicial meshes, we derive a priori estimates for the error\n$\\|\\widetilde{u}_{\\varrho h}-\\overline{u}\\|_{L^2(Q)}$ between the computed\nspace-time finite element solution $\\widetilde{u}_{\\varrho h}$ and the target\nfunction $\\overline{u}$ with respect to the regularization parameter $\\varrho$,\nand the space-time finite element mesh-size $h$, depending on the regularity of\nthe desired state $\\overline{u}$. These estimates lead to the optimal choice\n$\\varrho=h^2$ in order to define the regularization parameter $\\varrho$ for a\ngiven space-time finite element mesh size $h$, or to determine the required\nmesh size $h$ when $\\varrho$ is a given constant representing the costs of the\ncontrol. The theoretical results will be supported by numerical examples with\ntargets of different regularities, including discontinuous targets.\nFurthermore, an adaptive space-time finite element scheme is proposed and\nnumerically analyzed.\n', 'Robust space-time finite element error estimates for parabolic\n distributed optimal control problems with energy regularization We consider space-time tracking optimal control problems for linear\npara\\-bo\\-lic initial boundary value problems that are given in the space-time\ncylinder $Q = \\Omega \\times (0,T)$, and that are controlled by the right-hand\nside $z_\\varrho$ from the Bochner space $L^2(0,T;H^{-1}(\\Omega))$. So it is\nnatural to replace the usual $L^2(Q)$ norm regularization by the energy\nregularization in the $L^2(0,T;H^{-1}(\\Omega))$ norm. We derive a priori\nestimates for the error $\\|\\widetilde{u}_{\\varrho h} - \\bar{u}\\|_{L^2(Q)}$\nbetween the computed state $\\widetilde{u}_{\\varrho h}$ and the desired state\n$\\bar{u}$ in terms of the regularization parameter $\\varrho$ and the space-time\nfinite element mesh-size $h$, and depending on the regularity of the desired\nstate $\\bar{u}$. These estimates lead to the optimal choice $\\varrho = h^2$.\nThe approximate state $\\widetilde{u}_{\\varrho h}$ is computed by means of a\nspace-time finite element method using piecewise linear and continuous basis\nfunctions on completely unstructured simplicial meshes for $Q$. The theoretical\nresults are quantitatively illustrated by a series of numerical examples in two\nand three space dimensions.\n']","[('elliptic optimal control', 0.6193254590034485), ('parabolic optimal control', 0.5842732787132263), ('parabolic optimal', 0.5319536328315735), ('elliptic optimal', 0.5085748434066772), ('distributed optimal control', 0.49811848998069763), ('optimal control problems', 0.48735374212265015), ('optimal control governed', 0.47869381308555603), ('neumann boundary control', 0.477764368057251), ('finite element discretization', 0.4769255518913269), ('variational discretization', 0.4718341827392578)]" 387,387,77,387_potential scattering_scattering theory_scattering matrices_scattering states,"['potential scattering', 'scattering theory', 'scattering matrices', 'scattering states', 'scattering properties', 'scattering general', 'quantum scattering', 'limit scattering', 'scattering matrix', 'stationary scattering']","['Transfer matrix for long-range potentials We extend the notion of the transfer matrix of potential scattering to a\nlarge class of long-range potentials $v(x)$ and derive its basic properties. We\noutline a dynamical formulation of the time-independent scattering theory for\nthis class of potentials where we identify their transfer matrix with the\n$S$-matrix of a certain effective non-unitary two-level quantum system. For\nsufficiently large values of $|x|$, we express $v(x)$ as the sum of a\nshort-range potential and an exactly solvable long-range potential. Using this\nresult and the composition property of the transfer matrix, we outline an\napproximation scheme for solving the scattering problem for $v(x)$. To\ndemonstrate the effectiveness of this scheme, we construct an exactly solvable\nlong-range potential and compare the exact values of its reflection and\ntransmission coefficients with those we obtain using our approximation scheme.\n', ""Stationary scattering theory, the $N$-body long-range case Within the class of Derezi{\\'n}ski-Enss pair-potentials which includes\nCoulomb potentials and for which asymptotic completeness is known \\cite{De}, we\nshow that all entries of the $N$-body quantum scattering matrix have a\nwell-defined meaning at any given non-threshold energy. As a function of the\nenergy parameter the scattering matrix is weakly continuous. This result\ngeneralizes a similar one obtained previously by Yafaev for systems of\nparticles interacting by short-range potentials \\cite{Ya1}. As for Yafaev's\npaper we do not make any assumption on the decay of channel eigenstates. The\nmain part of the proof consists in establishing a number of Kato-smoothness\nbounds needed for justifying a new formula for the scattering matrix. Similarly\nwe construct and show strong continuity of channel wave matrices for all\nnon-threshold energies. Away from a set of measure zero we show that the\nscattering and channel wave matrices constitute a well-defined `scattering\ntheory', in particular at such energies the scattering matrix is unitary,\nstrongly continuous and characterized by asymptotics of minimum generalized\neigenfunctions.\n"", 'Long-range potential scattering: Converting long-range potential to\n short-range potential by tortoise coordinate Inspired by general relativity, we suggest an approach for long-range\npotential scattering. In scattering theory, there is a general theory for\nshort-range potential scattering, but there is no general theory for long-range\npotential scattering. This is because the scattering boundary conditions for\nall short-range potentials are the same, but for different long-range\npotentials are different. In this paper, by introducing tortoise coordinates,\nwe convert long-range potential scattering to short-range potential scattering.\nThis allows us to deal with long-range potential scattering as short-range\npotential scattering. An explicit expression of the scattering wave function\nfor long-range potential scattering is presented, in which the scattering wave\nfunction is represented by the tortoise coordinate and the scattering phase\nshift. We show that the long-range potential scattering wave function is just\nthe short-range potential scattering wave function with a replacement of a\ncommon coordinate by a tortoise coordinate. The approach applies not only to\nscattering but also applies to bound states. Furthermore, in terms of tortoise\ncoordinates, we suggest a classification scheme for potentials. We also discuss\nthe duality between tortoise coordinates.\n']","[('potential scattering', 0.6818814873695374), ('scattering theory', 0.6649898290634155), ('scattering matrices', 0.650175929069519), ('scattering states', 0.646491527557373), ('scattering properties', 0.6445941925048828), ('scattering general', 0.6360308527946472), ('quantum scattering', 0.629141092300415), ('limit scattering', 0.6284510493278503), ('scattering matrix', 0.621843695640564), ('stationary scattering', 0.619804322719574)]" 388,388,77,388_homology graph_magnitude homology_homology theory_path homology,"['homology graph', 'magnitude homology', 'homology theory', 'path homology', 'homology theories', 'homology', 'homology groups', 'homology simplicial', 'simplicial homology', 'homology classes']","['The reachability homology of a directed graph The last decade has seen the development of path homology and magnitude\nhomology -- two homology theories of directed graphs, each satisfying classic\nproperties such as Kunneth and Mayer-Vietoris theorems. Recent work of Asao has\nshown that magnitude homology and path homology are related, appearing in\ndifferent pages of a certain spectral sequence. Here we study the target of\nthat spectral sequence, which we call reachability homology. We prove that it\nsatisfies appropriate homotopy invariance, Kunneth, excision, and\nMayer-Vietoris theorems, these all being stronger than the corresponding\nproperties for either magnitude or path homology.\n', 'Eulerian magnitude homology: subgraph structure and random graphs In this paper we explore the connection between the ranks of the magnitude\nhomology groups of a graph and the structure of its subgraphs. To this end, we\nintroduce variants of magnitude homology called eulerian magnitude homology and\ndiscriminant magnitude homology. Leveraging the combinatorics of the\ndifferential in magnitude homology, we illustrate a close relationship between\nthe ranks of the eulerian magnitude homology groups on the first diagonal and\ncounts of subgraphs which fall in specific classes. We leverage these tools to\nstudy limiting behavior of the eulerian magnitude homology groups for\nErdos-Renyi random graphs and random geometric graphs, producing for both\nmodels a vanishing threshold for the eulerian magnitude homology groups on the\nfirst diagonal. This in turn provides a characterization of the generators for\nthe corresponding magnitude homology groups. Finally, we develop an explicit\nasymptotic estimate the expected rank of eulerian magnitude homology along the\nfirst diagonal for these random graph models.\n', ""Bigraded path homology and the magnitude-path spectral sequence Two important invariants of directed graphs, namely magnitude homology and\npath homology, have recently been shown to be intimately connected: there is a\n'magnitude-path spectral sequence' or 'MPSS' in which magnitude homology\nappears as the first page, and in which path homology appears as an axis of the\nsecond page. In this paper we study the homological and computational\nproperties of the spectral sequence, and in particular of the full second page,\nwhich we now call 'bigraded path homology'. We demonstrate that every page of\nthe MPSS deserves to be regarded as a homology theory in its own right,\nsatisfying excision and Kunneth theorems (along with a homotopy invariance\nproperty already established by Asao), and that magnitude homology and bigraded\npath homology also satisfy Mayer-Vietoris theorems. We construct a homotopy\ntheory of graphs (in the form of a cofibration category structure) in which\nweak equivalences are the maps inducing isomorphisms on bigraded path homology,\nstrictly refining an existing structure based on ordinary path homology. And we\nprovide complete computations of the MPSS for two important families of graphs\n- the directed and bi-directed cycles - which demonstrate the power of both the\nMPSS, and bigraded path homology in particular, to distinguish graphs that\nordinary path homology cannot.\n""]","[('homology graph', 0.7327029705047607), ('magnitude homology', 0.6395251154899597), ('homology theory', 0.6367390155792236), ('path homology', 0.6269773840904236), ('homology theories', 0.6217542886734009), ('homology', 0.6027653217315674), ('homology groups', 0.5957625508308411), ('homology simplicial', 0.5833982229232788), ('simplicial homology', 0.5789279937744141), ('homology classes', 0.5709219574928284)]" 389,389,77,389_inequalities polynomials_bernstein inequalities_extremal polynomials_bernstein type inequality,"['inequalities polynomials', 'bernstein inequalities', 'extremal polynomials', 'bernstein type inequality', 'polynomial approximation', 'bernstein inequality', 'orthonormal polynomials', 'chebyshev polynomials', 'asymptotic lower bound', 'orthogonal polynomials']","['A Note on Sharp Multivariate Bernstein- and Markov-Type Inequalities Let $V$ be a symmetric convex body in $\\R^m$.\n We prove sharp Bernstein-type inequalities for entire functions of\nexponential type with the spectrum in $V$ and discuss certain properties of the\nextremal functions. Markov-type inequalities with sharp constants\n for algebraic polynomials on $V$ and certain\n non-symmetric convex bodies are proved as well.\n', 'Sharp Constants of Approximation Theory. III. Certain Polynomial\n Inequalities of Different Metrics on Convex Sets Let $V\\subset\\R^m$ be a centrally symmetric convex body and let\n$V^*\\subset\\R^m$ be its polar. We prove limit relations between the sharp\nconstants in the multivariate Markov-Bernstein-Nikolskii type inequalities for\nalgebraic polynomials on $V^*$ and the corresponding constants for entire\nfunctions of exponential type with the spectrum in $V$.\n', 'On Properties of a Regular Simplex Inscribed into a Ball Let $B$ be a Euclidean ball in ${\\mathbb R}^n$ and let $C(B)$ be a space\nof~continuous functions $f:B\\to{\\mathbb R}$ with the uniform norm\n$\\|f\\|_{C(B)}:=\\max_{x\\in B}|f(x)|.$ By $\\Pi_1\\left({\\mathbb R}^n\\right)$ we\nmean a set of polynomials of degree $\\leq 1$, i.e., a set of linear functions\nupon ${\\mathbb R}^n$. The interpolation projector $P:C(B)\\to \\Pi_1({\\mathbb\nR}^n)$ with the nodes $x^{(j)}\\in B$ is defined by the equalities\n$Pf\\left(x^{(j)}\\right)= f\\left(x^{(j)}\\right)$, $j=1,$ $\\ldots,$ $ n+1$. The\nnorm of $P$ as an operator from $C(B)$ to $C(B)$ can be calculated by the\nformula $\\|P\\|_B=\\max_{x\\in B}\\sum |\\lambda_j(x)|.$ Here $\\lambda_j$ are the\nbasic Lagrange polynomials corresponding to the $n$-dimensional nondegenerate\nsimplex $S$ with the vertices $x^{(j)}$. Let $P^\\prime$ be a projector having\nthe nodes in the vertices \\linebreak of a regular simplex inscribed into the\nball. We describe the points $y\\in B$ with the property $\\|P^\\prime\\|_B=\\sum\n|\\lambda_j(y)|$. Also we formulate a geometric conjecture which implies that\n$\\|P^\\prime\\|_B$ is equal to the minimal norm of an interpolation projector\nwith nodes in $B$. We prove that this conjecture holds true at least for\n$n=1,2,3,4$.\n Keywords: regular simplex, ball, linear interpolation, projector, norm\n']","[('inequalities polynomials', 0.5399311184883118), ('bernstein inequalities', 0.500100314617157), ('extremal polynomials', 0.49802035093307495), ('bernstein type inequality', 0.4923955202102661), ('polynomial approximation', 0.4474357068538666), ('bernstein inequality', 0.441413015127182), ('orthonormal polynomials', 0.43575844168663025), ('chebyshev polynomials', 0.4055422246456146), ('asymptotic lower bound', 0.38733887672424316), ('orthogonal polynomials', 0.38680267333984375)]" 390,390,77,390_low rank approximation_low rank approximations_dynamical low rank_rank adaptive,"['low rank approximation', 'low rank approximations', 'dynamical low rank', 'rank adaptive', 'rank approximation', 'splitting integrator', 'rank approximations', 'equations low rank', 'integrators', 'low rank matrix']","['A rank-adaptive robust integrator for dynamical low-rank approximation A rank-adaptive integrator for the dynamical low-rank approximation of matrix\nand tensor differential equations is presented. The fixed-rank integrator\nrecently proposed by two of the authors is extended to allow for an adaptive\nchoice of the rank, using subspaces that are generated by the integrator\nitself. The integrator first updates the evolving bases and then does a\nGalerkin step in the subspace generated by both the new and old bases, which is\nfollowed by rank truncation to a given tolerance. It is shown that the adaptive\nlow-rank integrator retains the exactness, robustness and symmetry-preserving\nproperties of the previously proposed fixed-rank integrator. Beyond that, up to\nthe truncation tolerance, the rank-adaptive integrator preserves the norm when\nthe differential equation does, it preserves the energy for Schr\\""odinger\nequations and Hamiltonian systems, and it preserves the monotonic decrease of\nthe functional in gradient flows. Numerical experiments illustrate the\nbehaviour of the rank-adaptive integrator.\n', 'A parallel rank-adaptive integrator for dynamical low-rank approximation This work introduces a parallel and rank-adaptive matrix integrator for\ndynamical low-rank approximation. The method is related to the previously\nproposed rank-adaptive basis update & Galerkin (BUG) integrator but differs\nsignificantly in that all arising differential equations, both for the basis\nand the Galerkin coefficients, are solved in parallel. Moreover, this approach\neliminates the need for a potentially costly coefficient update with augmented\nbasis matrices. The integrator also incorporates a new step rejection strategy\nthat enhances the robustness of both the parallel integrator and the BUG\nintegrator. By construction, the parallel integrator inherits the robust error\nbound of the BUG and projector-splitting integrators. Comparisons of the\nparallel and BUG integrators are presented by a series of numerical experiments\nwhich demonstrate the efficiency of the proposed method, for problems from\nradiative transfer and radiation therapy.\n', 'Robust high-order low-rank BUG integrators based on explicit Runge-Kutta\n methods In this work, we propose high-order basis-update & Galerkin (BUG) integrators\nbased on explicit Runge-Kutta methods for large-scale matrix differential\nequations. These dynamical low-rank integrators are high-order extensions of\nthe BUG integrator and are constructed by performing a BUG step at each stage\nof the Runge-Kutta method. In this way, the resulting Runge-Kutta BUG\nintegrator is robust to the presence of small singular values and does not\ninvolve backward time-integration steps. We provide an error bound, which shows\nthat the Runge-Kutta BUG integrator retains the order of convergence of the\nassociated Runge-Kutta method until the error reaches a plateau corresponding\nto the low-rank truncation error and which vanishes as the rank becomes full.\nThis error bound is finally validated experimentally on three numerical test\ncases. The results demonstrate the high-order convergence of the Runge-Kutta\nBUG integrator and its superior accuracy compared to other dynamical low-rank\nintegrators proposed in the literature.\n']","[('low rank approximation', 0.49701786041259766), ('low rank approximations', 0.4949898421764374), ('dynamical low rank', 0.47361627221107483), ('rank adaptive', 0.4663763642311096), ('rank approximation', 0.46607378125190735), ('splitting integrator', 0.46116504073143005), ('rank approximations', 0.4597302973270416), ('equations low rank', 0.4318618178367615), ('integrators', 0.42969462275505066), ('low rank matrix', 0.42024171352386475)]" 391,391,77,391_tractability results_tractability_information complexity_linear functionals,"['tractability results', 'tractability', 'information complexity', 'linear functionals', 'functions finite dimensional', 'discretization provides', 'approximation functions', 'type discretization', 'continuous linear functionals', 'kernel hilbert spaces']","['On the power of standard information for tractability for\n $L_2$-approximation in the average case setting We study multivariate approximation in the average case setting with the\nerror measured in the weighted $L_2$ norm. We consider algorithms that use\nstandard information $\\Lambda^{\\rm std}$ consisting of function values or\ngeneral linear information $\\Lambda^{\\rm all}$ consisting of arbitrary\ncontinuous linear functionals. We investigate the equivalences of various\nnotions of algebraic and exponential tractability for $\\Lambda^{\\rm std}$ and\n$\\Lambda^{\\rm all}$ for the absolute error criterion, and show that the power\nof $\\Lambda^{\\rm std}$ is the same as that of $\\Lambda^{\\rm all}$ for all\nnotions of algebraic and exponential tractability without any condition.\nSpecifically, we solve Open Problems 116-118 and almost solve Open Problem 115\nas posed by E.Novak and H.Wo\\\'zniakowski in the book: Tractability of\nMultivariate Problems, Volume III: Standard Information for Operators, EMS\nTracts in Mathematics, Z\\""urich, 2012.\n', 'Tractability of non-homogeneous tensor product problems in the worst\n case setting We study multivariate linear tensor product problems with some special\nproperties in the worst case setting. We consider algorithms that use finitely\nmany continuous linear functionals. We use a unified method to investigate\ntractability of the above multivariate problems, and obtain necessary and\nsufficient conditions for strong polynomial tractability, polynomial\ntractability, quasi-polynomial tractability, uniformly weak tractability,\n$(s,t)$-weak tractability, and weak tractability. Our results can apply to\nmultivariate approximation problems with kernels corresponding to Euler\nkernels, Wiener kernels, Korobov kernels, Gaussian kernels, and analytic\nKorobov kernels.\n', 'Tractability of approximation in the weighted Korobov space in the\n worst-case setting -- a complete picture In this paper, we study tractability of $L_2$-approximation of one-periodic\nfunctions from weighted Korobov spaces in the worst-case setting. The\nconsidered weights are of product form. For the algorithms we allow information\nfrom the class $\\Lambda^{{\\rm all}}$ consisting of all continuous linear\nfunctionals and from the class $\\Lambda^{{\\rm std}}$, which only consists of\nfunction evaluations.\n We provide necessary and sufficient conditions on the weights of the function\nspace for quasi-polynomial tractability, uniform weak tractability, weak\ntractability and $(\\sigma,\\tau)$-weak tractability. Together with the already\nknown results for strong polynomial and polynomial tractability, our findings\nprovide a complete picture of the weight conditions for all current standard\nnotions of tractability.\n']","[('tractability results', 0.47732973098754883), ('tractability', 0.4533868134021759), ('information complexity', 0.44834470748901367), ('linear functionals', 0.4032503664493561), ('functions finite dimensional', 0.39063650369644165), ('discretization provides', 0.3811548054218292), ('approximation functions', 0.3762529492378235), ('type discretization', 0.36860665678977966), ('continuous linear functionals', 0.344745010137558), ('kernel hilbert spaces', 0.3444209396839142)]" 392,392,75,392_information bottleneck_information bottleneck ib_deep neural_variational information,"['information bottleneck', 'information bottleneck ib', 'deep neural', 'variational information', 'learned representation', 'bottleneck', 'information decomposition', 'bottleneck ib', 'representation learning', 'learned representations']","['Disentangled Information Bottleneck The information bottleneck (IB) method is a technique for extracting\ninformation that is relevant for predicting the target random variable from the\nsource random variable, which is typically implemented by optimizing the IB\nLagrangian that balances the compression and prediction terms. However, the IB\nLagrangian is hard to optimize, and multiple trials for tuning values of\nLagrangian multiplier are required. Moreover, we show that the prediction\nperformance strictly decreases as the compression gets stronger during\noptimizing the IB Lagrangian. In this paper, we implement the IB method from\nthe perspective of supervised disentangling. Specifically, we introduce\nDisentangled Information Bottleneck (DisenIB) that is consistent on compressing\nsource maximally without target prediction performance loss (maximum\ncompression). Theoretical and experimental results demonstrate that our method\nis consistent on maximum compression, and performs well in terms of\ngeneralization, robustness to adversarial attack, out-of-distribution\ndetection, and supervised disentangling.\n', 'Flexible Variational Information Bottleneck: Achieving Diverse\n Compression with a Single Training Information Bottleneck (IB) is a widely used framework that enables the\nextraction of information related to a target random variable from a source\nrandom variable. In the objective function, IB controls the trade-off between\ndata compression and predictiveness through the Lagrange multiplier $\\beta$.\nTraditionally, to find the trade-off to be learned, IB requires a search for\n$\\beta$ through multiple training cycles, which is computationally expensive.\nIn this study, we introduce Flexible Variational Information Bottleneck (FVIB),\nan innovative framework for classification task that can obtain optimal models\nfor all values of $\\beta$ with single, computationally efficient training. We\ntheoretically demonstrate that across all values of reasonable $\\beta$, FVIB\ncan simultaneously maximize an approximation of the objective function for\nVariational Information Bottleneck (VIB), the conventional IB method. Then we\nempirically show that FVIB can learn the VIB objective as effectively as VIB.\nFurthermore, in terms of calibration performance, FVIB outperforms other IB and\ncalibration methods by enabling continuous optimization of $\\beta$. Our codes\nare available at https://github.com/sotakudo/fvib.\n', ""Elastic Information Bottleneck Information bottleneck is an information-theoretic principle of\nrepresentation learning that aims to learn a maximally compressed\nrepresentation that preserves as much information about labels as possible.\nUnder this principle, two different methods have been proposed, i.e.,\ninformation bottleneck (IB) and deterministic information bottleneck (DIB), and\nhave gained significant progress in explaining the representation mechanisms of\ndeep learning algorithms. However, these theoretical and empirical successes\nare only valid with the assumption that training and test data are drawn from\nthe same distribution, which is clearly not satisfied in many real-world\napplications. In this paper, we study their generalization abilities within a\ntransfer learning scenario, where the target error could be decomposed into\nthree components, i.e., source empirical error, source generalization gap (SG),\nand representation discrepancy (RD). Comparing IB and DIB on these terms, we\nprove that DIB's SG bound is tighter than IB's while DIB's RD is larger than\nIB's. Therefore, it is difficult to tell which one is better. To balance the\ntrade-off between SG and the RD, we propose an elastic information bottleneck\n(EIB) to interpolate between the IB and DIB regularizers, which guarantees a\nPareto frontier within the IB framework. Additionally, simulations and real\ndata experiments show that EIB has the ability to achieve better domain\nadaptation results than IB and DIB, which validates the correctness of our\ntheories.\n""]","[('information bottleneck', 0.5808712840080261), ('information bottleneck ib', 0.5486969947814941), ('deep neural', 0.45689716935157776), ('variational information', 0.45300284028053284), ('learned representation', 0.4505176544189453), ('bottleneck', 0.4495852589607239), ('information decomposition', 0.446396142244339), ('bottleneck ib', 0.43348976969718933), ('representation learning', 0.41702166199684143), ('learned representations', 0.41116711497306824)]" 393,393,75,393_cahn hilliard equations_hilliard equations_cahn hilliard system_analysis cahn hilliard,"['cahn hilliard equations', 'hilliard equations', 'cahn hilliard system', 'analysis cahn hilliard', 'hilliard navier stokes', 'hilliard degenerate mobility', 'hilliard system', 'surface diffusion', 'cahn hilliard type', 'cahn hilliard degenerate']","['Abstract error analysis for Cahn--Hilliard type equations with dynamic\n boundary conditions This work addresses the problem of solving the Cahn-Hilliard equation\nnumerically. For that we introduce an abstract formulation for Cahn-Hilliard\ntype equations with dynamic boundary conditions, we conduct the spatial\nsemidiscretization via finite elements and prove error bounds based on the\ntechnique of energy estimates. The variational formulation for\nCahn-Hilliard/Cahn-Hilliard coupling, will apply to a larger abstract class of\nproblems and is similar to the usual weak formulation of parabolic problems. In\ncontrast to problems with non dynamic boundary conditions, the Hilbert spaces\n$L^2(\\Omega)$ and $H^1(\\Omega)$ are exchanged with the spaces\n$L^2(\\Omega)\\times L^2(\\Gamma)$ and $\\lbrace v\\in H^1(\\Omega): \\gamma v \\in\nH^1(\\Gamma)\\rbrace$, respectively. Because we are considering a fourth-order\ndifferential equation, which will be described by a system of two second-order\ndifferential equations, the variational formulation also consists of a system\nof two equations.\n', 'An efficient and convergent finite element scheme for Cahn--Hilliard\n equations with dynamic boundary conditions The Cahn--Hilliard equation is a widely used model that describes amongst\nothers phase separation processes of binary mixtures or two-phase flows. In the\nrecent years, different types of boundary conditions for the Cahn--Hilliard\nequation were proposed and analyzed. In this publication, we are concerned with\nthe numerical treatment of a recent model which introduces an additional\nCahn--Hilliard type equation on the boundary as closure for the Cahn--Hilliard\nequation in the domain [C. Liu, H. Wu, Arch. Ration. Mech. An., 2019]. By\nidentifying a mapping between the phase-field parameter and the chemical\npotential inside of the domain, we are able to postulate an efficient,\nunconditionally energy stable finite element scheme. Furthermore, we establish\nthe convergence of discrete solutions towards suitable weak solutions of the\noriginal model. This serves also as an additional pathway to establish\nexistence of weak solutions. Furthermore, we present simulations underlining\nthe practicality of the proposed scheme and investigate its experimental order\nof convergence.\n', 'A sturcture-preserving, upwind-SAV scheme for the degenerate\n Cahn--Hilliard equation with applications to simulating surface diffusion This paper establishes a structure-preserving numerical scheme for the\nCahn--Hilliard equation with degenerate mobility. First, by applying a finite\nvolume method with upwind numerical fluxes to the degenerate Cahn--Hilliard\nequation rewritten by the scalar auxiliary variable (SAV) approach, we\ncreatively obtain an unconditionally bound-preserving, energy-stable and\nfully-discrete scheme, which, for the first time, addresses the boundedness of\nthe classical SAV approach under $H^{-1}$-gradient flow. Then, a\ndimensional-splitting technique is introduced in high-dimensional cases, which\ngreatly reduces the computational complexity while preserves original\nstructural properties. Numerical experiments are presented to verify the\nbound-preserving and energy-stable properties of the proposed scheme. Finally,\nby applying the proposed structure-preserving scheme, we numerically\ndemonstrate that surface diffusion can be approximated by the Cahn--Hilliard\nequation with degenerate mobility and Flory--Huggins potential when the\nabsolute temperature is sufficiently low, which agrees well with the\ntheoretical result by using formal asymptotic analysis.wn theoretically by\nformal matched asymptotics.\n']","[('cahn hilliard equations', 0.7240265011787415), ('hilliard equations', 0.6889084577560425), ('cahn hilliard system', 0.6076458692550659), ('analysis cahn hilliard', 0.581264078617096), ('hilliard navier stokes', 0.5719852447509766), ('hilliard degenerate mobility', 0.568988025188446), ('hilliard system', 0.5462570786476135), ('surface diffusion', 0.4721023738384247), ('cahn hilliard type', 0.4572918713092804), ('cahn hilliard degenerate', 0.45558953285217285)]" 394,394,75,394_tournament_round robin_tournaments_teams,"['tournament', 'round robin', 'tournaments', 'teams', 'matches', 'competitions', 'first round', 'ranking', 'soccer', 'gambling']","['Increasing competitiveness by imbalanced groups: The example of the\n 48-team FIFA World Cup A match played in a sports tournament can be called stakeless if at least one\nteam is indifferent to its outcome because it already has qualified or has been\neliminated. Such a game threatens fairness since teams may not exert full\neffort without incentives. This paper suggests a novel classification for\nstakeless matches according to their expected outcome: they are more costly if\nthe indifferent team is more likely to win by playing honestly. Our approach is\nillustrated with the 2026 FIFA World Cup, the first edition of the competition\nwith 48 teams. We propose a novel format based on imbalanced groups, which\ndrastically reduces the probability of stakeless matches played by the\nstrongest teams according to Monte Carlo simulations. The new design also\nincreases the uncertainty of match outcomes and requires fewer matches.\nGoverning bodies in sports are encouraged to consider our innovative idea in\norder to enhance the competitiveness of their tournaments.\n', 'Best Strategy for Each Team in The Regular Season to Win Champion in The\n Knockout Tournament In J. Schwenk.(2018) [\'What is the Correct Way to Seed a Knockout\nTournament?\' Retrieved from The American Mathematical Monthly], Schwenk\nidentified a surprising weakness in the standard method of seeding a single\nelimination (or knockout) tournament. In particular, he showed that for a\ncertain probability model for the outcomes of games it can be the case that the\ntop seeded team would be less likely to win the tournament than the second\nseeded team. This raises the possibility that in certain situations it might be\nadvantageous for a team to intentionally lose a game in an attempt to get a\nmore optimal (though possibly lower) seed in the tournament. We examine this\nquestion in the context of a four team league which consists of a round robin\n""regular season"" followed by a single elimination tournament with seedings\ndetermined by the results from the regular season [4]. Using the same\nprobability model as Schwenk we show that there are situations where it is\nindeed optimal for a team to intentionally lose. Moreover, we show how a team\ncan make the decision as to whether or not it should intentionally lose. We did\ntwo detailed analysis. One is for the situation where other teams always try to\nwin every game. The other is for the situation where other teams are smart\nenough, namely they can also lose some games intentionally if necessary. The\nanalysis involves computations in both probability and (multi-player) game\ntheory.\n', 'Tournament schedules and incentives in a double round-robin tournament\n with four teams In a round-robin tournament, a team may lack the incentive to win if its\nfinal rank does not depend on the outcome of the matches still to be played.\nThis paper introduces a classification scheme to determine these weakly (where\none team is indifferent) or strongly (where both teams are indifferent)\nstakeless matches in a double round-robin contest with four teams. The\nprobability that such matches arise can serve as a novel fairness criterion to\ncompare and evaluate match schedules. Our approach is illustrated by the UEFA\nChampions League group stage. A simulation model is built to compare the 12\nvalid schedules for the group matches. Some schedules are shown to be dominated\nby other schedules. It is found that the strongest team should play at home in\nthe last round against one of the middle teams, depending on the preferences of\nthe tournament organiser. Choosing an optimal sequence of matches with respect\nto the proposed metric can help to avoid uninteresting matches.\n']","[('tournament', 0.5333236455917358), ('round robin', 0.5081331729888916), ('tournaments', 0.49522364139556885), ('teams', 0.47144073247909546), ('matches', 0.4601212441921234), ('competitions', 0.42588740587234497), ('first round', 0.39873409271240234), ('ranking', 0.3780086636543274), ('soccer', 0.3763379156589508), ('gambling', 0.3724209666252136)]" 395,395,75,395_exclusion processes_symmetric exclusion process_asymmetric exclusion_asymmetric simple exclusion,"['exclusion processes', 'symmetric exclusion process', 'asymmetric exclusion', 'asymmetric simple exclusion', 'exclusion process', 'simple exclusion process', 'zero range processes', 'exclusion process tasep', 'boundary dynamics', 'symmetric simple exclusion']","['Multi species asymmetric simple exclusion process with impurity\n activated flips We obtain an exact matrix product steady state for a class of multi species\nasymmetric simple exclusion process with impurities, under periodic boundary\ncondition. Alongside the usual hopping dynamics, an additional flip dynamics is\nactivated only in the presence of impurities. Although the microscopic dynamics\nrenders the system to be non-ergodic, exact analytical results for observables\nare obtained in steady states for a specific class of initial configurations.\nInteresting physical features including negative differential mobility and\ntransition of correlations from negative to positive with changing vacancy\ndensity, have been observed. We discuss plausible connections of this exactly\nsolvable model with multi lane asymmetric simple exclusion processes as well as\nenzymatic chemical reactions.\n', 'Weak reservoirs are superexponentially irrelevant for misanthrope\n processes We provide a short proof for the exponential equivalence between misanthrope\nprocesses in contact with weak reservoirs and those with impermeable\nboundaries. As a consequence, we can derive both the hydrodynamic limit and the\nlarge deviations of the totally asymmetric simple exclusion process (TASEP) in\ncontact with weak reservoirs. This extends a recent result which proved the\nhydrodynamic behaviour of a vanishing viscocity approximation of the TASEP in\ncontact with weak reservoirs. Further applications to a class of asymmetric\nexclusion processes with long jumps are discussed.\n', 'Coupling hydrodynamics of several Facilitated Exclusion Processes with\n closed boundaries In this paper, we prove the hydrodynamic limit for the ergodic dynamics of\nthe Facilitated Exclusion Process with closed boundaries in the symmetric,\nasymmetric and weakly asymmetric regimes. For this, we couple it with a Simple\nExclusion Process by constructing a mapping that transforms the facilitated\ndynamics into the simple one. As the hydrodynamic behaviour of the simple\nexclusion process with closed boundaries has been extensively studied, we can\ndeduce the corresponding hydrodynamics for the facilitated exclusion process.\n']","[('exclusion processes', 0.5918699502944946), ('symmetric exclusion process', 0.5777075886726379), ('asymmetric exclusion', 0.5339664220809937), ('asymmetric simple exclusion', 0.521884024143219), ('exclusion process', 0.5132913589477539), ('simple exclusion process', 0.5109306573867798), ('zero range processes', 0.46276918053627014), ('exclusion process tasep', 0.4546809196472168), ('boundary dynamics', 0.43443524837493896), ('symmetric simple exclusion', 0.4209282696247101)]" 396,396,75,396_switched systems_switching systems_linear switching_switched system,"['switched systems', 'switching systems', 'linear switching', 'switched system', 'switching system', 'lyapunov functions stability', 'based lyapunov', 'fast switching', 'hybrid dynamical systems', 'lyapunov technique']","['Stability of Reset and Impulsive Continuous-time Linear Switched Systems We study stability issue of reset and impulsive switched systems. We find\ntime constraints (dwell time and flee time) on switching signals which\nstabilize a given reset switched system. For a given collection of matrices, we\nfind an assignment of resets and time constraints on switching signals which\nguarantee stability of the reset switched system. Similar results are obtained\nfor impulsive switched systems as well. Two techniques, namely, analysis of\nflow of the system and the multiple Lyapunov function approach is used to\nobtain the results. The results are later generalized to obtain mode-dependent\ntime constraints for stability of these systems.\n', 'Converse Lyapunov Results for Stability of Switched Systems with Average\n Dwell-Time This article provides a characterization of stability for switched nonlinear\nsystems under average dwell-time constraints, in terms of necessary and\nsufficient conditions involving multiple Lyapunov functions. Earlier converse\nresults focus on switched systems with dwell-time constraints only, and the\nresulting inequalities depend on the flow of individual subsystems. With the\nhelp of a counterexample, we show that a lower bound that guarantees stability\nfor dwell-time switching signals may not necessarily imply stability for\nswitching signals with same lower bound on the average dwell-time. Based on\nthese two observations, we provide a converse result for the average dwell-time\nconstrained systems in terms of inequalities which do not depend on the flow of\nindividual subsystems and are easier to check. The particular case of linear\nswitched systems is studied as a corollary to our main result.\n', 'A Simple Loop Dwell Time Approach for Stability of Switched Systems We introduce a novel concept of simple loop dwell time and use it to give\nsufficient conditions for stability of a continuous-time linear switched system\nwhere switching between subsystems is governed by an underlying graph. We\npresent a slow-fast switching mechanism to ensure stability of the system. We\nalso consider switched systems with both stable and unstable subsystems, and\nobtain bounds on the dwell time in the stable subsystem and flee time from the\nunstable subsystem that guarantee the stability of the system.\n']","[('switched systems', 0.6064746975898743), ('switching systems', 0.5921393632888794), ('linear switching', 0.5803369283676147), ('switched system', 0.5739593505859375), ('switching system', 0.5484576225280762), ('lyapunov functions stability', 0.460043728351593), ('based lyapunov', 0.4305814206600189), ('fast switching', 0.4261157512664795), ('hybrid dynamical systems', 0.406753271818161), ('lyapunov technique', 0.40304896235466003)]" 397,397,75,397_cahn hilliard equations_hilliard equations_solutions cahn hilliard_cahn hilliard system,"['cahn hilliard equations', 'hilliard equations', 'solutions cahn hilliard', 'cahn hilliard system', 'coupled cahn hilliard', 'nonlocal cahn hilliard', 'cahn hilliard degenerate', 'stokes cahn hilliard', 'solutions nonlocal', 'convective cahn hilliard']","['Existence and local asymptotics for a system of cross-diffusion\n equations with nonlocal Cahn-Hilliard terms We study a nonlocal Cahn-Hilliard model for a multicomponent mixture with\ncross-diffusion effects and degenerate mobility. The nonlocality is described\nby means of a symmetric singular kernel. We define a notion of weak solution\nadapted to possible degeneracies and prove, as our first main result, its\nglobal-in-time existence. The proof relies on an application of the formal\ngradient flow structure of the system (to overcome the lack of a-priori\nestimates), combined with an extension of the boundedness-by-entropy method, in\nturn involving a careful analysis of an auxiliary variational problem. This\nallows to obtain solutions to an approximate, time-discrete system. Letting the\ntime step size go to zero, we recover the desired nonlocal weak solution where,\ndue to their low regularity, the Cahn-Hilliard terms require a special\ntreatment.\n Finally, we prove convergence of solutions for this class of nonlocal\nCahn-Hilliard equations to their local counterparts.\n', 'Degenerate nonlocal Cahn-Hilliard equations: well-posedness, regularity\n and local asymptotics Existence and uniqueness of solutions for nonlocal Cahn-Hilliard equations\nwith degenerate potential is shown. The nonlocality is described by means of a\nsymmetric singular kernel not falling within the framework of any previous\nexistence theory. A convection term is also taken into account. Building upon\nthis novel existence result, we prove convergence of solutions for this class\nof nonlocal Cahn-Hilliard equations to their local counterparts, as the\nnonlocal convolution kernels approximate a Dirac delta. Eventually, we show\nthat, under suitable assumptions on the data, the solutions to the nonlocal\nCahn-Hilliard equations exhibit further regularity, and the nonlocal-to-local\nconvergence is verified in a stronger topology.\n', 'Cahn-Hilliard Equations on Random Walk Spaces In this paper we study a nonlocal Cahn-Hilliard model (CHE) in the framework\nof random walk spaces, which includes as particular cases, the CHE on locally\nfinite weighted connected graphs, the CHE determined by finite Markov chains or\nthe Cahn-Hilliard Equations driven by convolution integrable kernels. We\nconsider different transitions for the phase and the chemical potential, and a\nlarge class of potentials including obstacle ones. We prove existence and\nuniqueness of solutions in $L^1$ of the Cahn-Hilliard Equation. We also show\nthat the Cahn-Hilliard equation is the gradient flow of the Ginzburg-Landau\nfree energy functional on an appropriate Hilbert space. We finally study the\nasymptotic behaviour of the solutions.\n']","[('cahn hilliard equations', 0.7212889194488525), ('hilliard equations', 0.6555029153823853), ('solutions cahn hilliard', 0.6183039546012878), ('cahn hilliard system', 0.5908727645874023), ('coupled cahn hilliard', 0.5872452259063721), ('nonlocal cahn hilliard', 0.5810753703117371), ('cahn hilliard degenerate', 0.5343356132507324), ('stokes cahn hilliard', 0.5329737663269043), ('solutions nonlocal', 0.52117919921875), ('convective cahn hilliard', 0.5197079181671143)]" 398,398,75,398_anisotropic surface energy_anisotropic surface_variational formulation_surface diffusion,"['anisotropic surface energy', 'anisotropic surface', 'variational formulation', 'surface diffusion', 'finite element methods', 'surface diffusion flow', 'surface finite element', 'surface energies', 'surface energy', 'anisotropic']","['A symmetrized parametric finite element method for anisotropic surface\n diffusion in 3D For the evolution of a closed surface under anisotropic surface diffusion\nwith a general anisotropic surface energy $\\gamma(\\boldsymbol{n})$ in three\ndimensions (3D), where $\\boldsymbol{n}$ is the unit outward normal vector, by\nintroducing a novel symmetric positive definite surface energy matrix\n$\\boldsymbol{Z}_k(\\boldsymbol{n})$ depending on a stabilizing function\n$k(\\boldsymbol{n})$ and the Cahn-Hoffman $\\boldsymbol{\\xi}$-vector, we present\na new symmetrized variational formulation for anisotropic surface diffusion\nwith weakly or strongly anisotropic surface energy, which preserves two\nimportant structures including volume conservation and energy dissipation. Then\nwe propose a structural-preserving parametric finite element method (SP-PFEM)\nto discretize the symmetrized variational problem, which preserves the volume\nin the discretized level. Under a relatively mild and simple condition on\n$\\gamma(\\boldsymbol{n})$, we show that SP-PFEM is unconditionally energy-stable\nfor almost all anisotropic surface energies $\\gamma(\\boldsymbol{n})$ arising in\npractical applications. Extensive numerical results are reported to demonstrate\nthe efficiency and accuracy as well as energy dissipation of the proposed\nSP-PFEM for solving anisotropic surface diffusion in 3D.\n', 'An energy-stable parametric finite element method for anisotropic\n surface diffusion We propose an energy-stable parametric finite element method (ES-PFEM) to\ndiscretize the motion of a closed curve under surface diffusion with an\nanisotropic surface energy $\\gamma(\\theta)$ -- anisotropic surface diffusion --\nin two dimensions, while $\\theta$ is the angle between the outward unit normal\nvector and the vertical axis. By introducing a positive definite surface energy\n(density) matrix $G(\\theta)$, we present a new and simple variational\nformulation for the anisotropic surface diffusion and prove that it satisfies\narea/mass conservation and energy dissipation. The variational problem is\ndiscretized in space by the parametric finite element method and area/mass\nconservation and energy dissipation are established for the\nsemi-discretization. Then the problem is further discretized in time by a\n(semi-implicit) backward Euler method so that only a linear system is to be\nsolved at each time step for the full-discretization and thus it is efficient.\nWe establish well-posedness of the full-discretization and identify some simple\nconditions on $\\gamma(\\theta)$ such that the full-discretization keeps energy\ndissipation and thus it is unconditionally energy-stable. Finally the ES-PFEM\nis applied to simulate solid-state dewetting of thin films with anisotropic\nsurface energies, i.e. the motion of an open curve under anisotropic surface\ndiffusion with proper boundary conditions at the two triple points moving along\nthe horizontal substrate. Numerical results are reported to demonstrate the\nefficiency and accuracy as well as energy dissipation of the proposed ES-PFEM.\n', 'A unified structure-preserving parametric finite element method for\n anisotropic surface diffusion We propose and analyze a unified structure-preserving parametric finite\nelement method (SP-PFEM) for the anisotropic surface diffusion of curves in two\ndimensions $(d=2)$ and surfaces in three dimensions $(d=3)$ with an arbitrary\nanisotropic surface energy density $\\gamma(\\boldsymbol{n})$, where\n$\\boldsymbol{n}\\in \\mathbb{S}^{d-1}$ represents the outward unit vector. By\nintroducing a novel unified surface energy matrix\n$\\boldsymbol{G}_k(\\boldsymbol{n})$ depending on $\\gamma(\\boldsymbol{n})$, the\nCahn--Hoffman $\\boldsymbol{\\xi}$-vector and a stabilizing function\n$k(\\boldsymbol{n}):\\ \\mathbb{S}^{d-1}\\to {\\mathbb R}$, we obtain a unified and\nconservative variational formulation for the anisotropic surface diffusion via\ndifferent surface differential operators including the surface gradient\noperator, the surface divergence operator and the surface Laplace--Beltrami\noperator. A SP-PFEM discretization is presented for the variational problem. In\norder to establish the unconditional energy stability of the proposed SP-PFEM\nunder a very mild condition on $\\gamma(\\boldsymbol{n})$, we propose a new\nframework via {\\sl local energy estimate} for proving energy\nstability/structure-preserving properties of the parametric finite element\nmethod for the anisotropic surface diffusion. This framework sheds light on how\nto prove unconditional energy stability of other numerical methods for\ngeometric partial differential equations. Extensive numerical results are\nreported to demonstrate the efficiency and accuracy as well as\nstructure-preserving properties of the proposed SP-PFEM for the anisotropic\nsurface diffusion with arbitrary anisotropic surface energy density\n$\\gamma(\\boldsymbol{n})$ arising from different applications.\n']","[('anisotropic surface energy', 0.5993136167526245), ('anisotropic surface', 0.5358702540397644), ('variational formulation', 0.5315506458282471), ('surface diffusion', 0.508649468421936), ('finite element methods', 0.49449944496154785), ('surface diffusion flow', 0.4888797104358673), ('surface finite element', 0.45603322982788086), ('surface energies', 0.44424769282341003), ('surface energy', 0.421956330537796), ('anisotropic', 0.3965432941913605)]" 399,399,74,399_stability couette flow_couette flow_near couette flow_steady navier stokes,"['stability couette flow', 'couette flow', 'near couette flow', 'steady navier stokes', 'navier boundary conditions', '2d navier stokes', 'navier stokes equations', 'dimensional navier stokes', 'navier stokes', 'linearized navier stokes']","['Transition threshold for the 3D Couette flow in a finite channel In this paper, we study nonlinear stability of the 3D plane Couette flow\n$(y,0,0)$ at high Reynolds number ${Re}$ in a finite channel $\\mathbb{T}\\times\n[-1,1]\\times \\mathbb{T}$. It is well known that the plane Couette flow is\nlinearly stable for any Reynolds number. However, it could become nonlinearly\nunstable and transition to turbulence for small but finite perturbations at\nhigh Reynolds number. This is so-called Sommerfeld paradox. One resolution of\nthis paradox is to study the transition threshold problem, which is concerned\nwith how much disturbance will lead to the instability of the flow and the\ndependence of disturbance on the Reynolds number. This work shows that if the\ninitial velocity $v_0$ satisfies $\\|v_0-(y,0,0)\\|_{H^2}\\le c_0{Re}^{-1}$ for\nsome $c_0>0$ independent of $Re$, then the solution of the 3D Navier-Stokes\nequations is global in time and does not transition away from the Couette flow\nin the $L^\\infty$ sense, and rapidly converges to a streak solution for $t\\gg\nRe^{\\frac 13}$ due to the mixing-enhanced dissipation effect. This result\nconfirms the transition threshold conjecture proposed by Trefethen et\nal.(Science, 261(1993), 578-584). To this end, we develop the resolvent\nestimate method to establish the space-time estimates for the full linearized\nNavier-Stokes system around the flow $(V(t,y,z), 0,0)$, where $V(t,y,z)$ is a\nsmall perturbation(but independent of $Re$) of the Couette flow $y$.\n', 'Stability threshold for 2D shear flows near Couette of the Navier-Stokes\n equation In this paper, we consider the stability threshold of the 2D shear flow\n$(U(y),0)^{\\top}$ of the Navier-Stokes equation at high Reynolds number $Re$.\nWhen the shear flow is near in Sobolev norm to the Couette flow $(y,0)^{\\top}$\nin some sense, we prove that if the initial data $u_0$ satisfies\n$\\|u_0-(U(y),0)^{\\top}\\|\\leq \\epsilon Re^{-1/3}$, then the solution of the 2D\nNavier-Stokes equation approaches to some shear flow which is also close to the\nCouette flow for $t\\gg Re^{1/3}$, as $t\\to\\infty$.\n', 'Stability threshold of the 2D Couette flow in Sobolev spaces We study the stability threshold of the 2D Couette flow in Sobolev spaces at\nhigh Reynolds number $Re$. We prove that if the initial vorticity $\\Omega_{in}$\nsatisfies $\\|\\Omega_{in}-(-1)\\|_{H^{\\sigma}}\\leq \\epsilon Re^{-1/3}$, then the\nsolution of the 2D Navier-Stokes equation approaches to some shear flow which\nis also close to Couette flow for time $t\\gg Re^{1/3}$ by a mixing-enhanced\ndissipation effect and then converges back to Couette flow when $t\\to +\\infty$.\n']","[('stability couette flow', 0.6498288512229919), ('couette flow', 0.5631622076034546), ('near couette flow', 0.5622454881668091), ('steady navier stokes', 0.5580193996429443), ('navier boundary conditions', 0.5225887298583984), ('2d navier stokes', 0.5204209089279175), ('navier stokes equations', 0.5132118463516235), ('dimensional navier stokes', 0.5084714889526367), ('navier stokes', 0.5060442090034485), ('linearized navier stokes', 0.5057677626609802)]" 400,400,74,400_tau tilting modules_tilting modules_tau tilting module_tilting module,"['tau tilting modules', 'tilting modules', 'tau tilting module', 'tilting module', 'tau tilting theory', 'tau tilting finite', 'support tau tilting', 'tilting theory', 'tau tilting', 'rigid modules']","['Tau-tilting modules over trivial extenstions We study (support) $\\tau$-tilting modules over the trivial extensions of\nfinite dimensional algebras. More precisely, we construct two classes of\n(support)$\\tau$-tilting modules in terms of the adjoint functors which extend\nand generalize the results on (support) $\\tau$-tilting modules over triangular\nmatrix rings given by Gao-Huang.\n', 'A construction of support $\\tau$-tilting modules over $\\tau$-tilting\n finite algebras The notion of (semi)bricks, regarded as a generalization of (semi)simple\nmodules, appeared in a paper of Ringel in 1976. In recent years, there has been\nseveral new developments motivated by links to {\\tau}-tilting theory studied by\nDemonet-Iyama-Jasso and Asai. In this paper, we will discuss how to glue\nsemibricks along a recollement with the intermediate extension functor similar\nto gluing simple modules by Beilinson-Bernstein-Deligne. As an application, we\ninvestigate the behavior of {\\tau}-tilting finite under recollements of module\ncategories of algebras. Moreover, we give some examples to show the\nconstruction of support {\\tau}-tilting modules over {\\tau}-tilting finite\nalgebras by gluing semibricks via recollements.\n', 'Normal subgroups and support $\\tau$-tilting modules Let $\\tilde{G}$ be a finite group, $G$ a normal subgroup of $\\tilde{G}$ and\n$k$ an algebraically closed field of characteristic $p>0$. The first main\nresult in this paper is to show that support $\\tau$-tilting\n$k\\tilde{G}$-modules satisfying some properties are support $\\tau$-tilting\nmodules as $kG$-modules too. As the second main result, we give equivalent\nconditions for support $\\tau$-tilting $k\\tilde{G}$-modules to satisfy the above\nproperties, and show that the set of the support $\\tau$-tilting\n$k\\tilde{G}$-modules with the properties is isomorphic to the set of\n$\\tilde{G}$-invariant support $\\tau$-tilting $kG$-modules as partially ordered\nsets. As an application, we show that the set of $\\tilde{G}$-invariant support\n$\\tau$-tilting $kG$-modules is isomorphic to the set of support $\\tau$-tilting\n$k\\tilde{G}$-modules in the case that the index $G$ in $\\tilde{G}$ is a\n$p$-power. As a further application, we give a feature of vertices of\nindecomposable $\\tau$-rigid $k\\tilde{G}$-modules. Finally, we give the block\nversions of the above results.\n']","[('tau tilting modules', 0.7767847776412964), ('tilting modules', 0.7334574460983276), ('tau tilting module', 0.7268770933151245), ('tilting module', 0.6666305661201477), ('tau tilting theory', 0.63116055727005), ('tau tilting finite', 0.5985439419746399), ('support tau tilting', 0.5802391171455383), ('tilting theory', 0.5486263632774353), ('tau tilting', 0.542215883731842), ('rigid modules', 0.5203795433044434)]" 401,401,74,401_variational problems_minimization energy functional_existence minimizers_nonlocal perimeter,"['variational problems', 'minimization energy functional', 'existence minimizers', 'nonlocal perimeter', 'minimizers', 'energy minimisers', 'constrained minimizers', 'minimization energy', 'perimeter functional', 'nonlocal potentials']","[""Existence and nonexistence of minimizers for classical capillarity\n problems in presence of nonlocal repulsion and gravity We investigate, under a volume constraint and among sets contained in a\nEuclidean half-space, the minimization problem of an energy functional given by\nthe sum of a capillarity perimeter, a nonlocal interaction term and a\ngravitational potential energy. The capillarity perimeter assigns a constant\nweight to the portion of the boundary touching the boundary of the half-space.\nThe nonlocal term is represented by a double integral of a positive kernel $g$,\nwhile the gravitational term is represented by the integral of a positive\npotential $G$.\n We first establish existence of volume-constrained minimizers in the small\nmass regime, together with several qualitative properties of minimizers. The\nexistence result holds for rather general choices of kernels in the nonlocal\ninteraction term, including attractive-repulsive ones. When the nonlocal kernel\n$g(x)=1/|x|^\\beta$ with $\\beta \\in (0,2]$, we also obtain nonexistence of\nvolume constrained minimizers in the large mass regime. Finally, we prove a\ngeneralized existence result of minimizers holding for all masses and general\nnonlocal interaction terms, meaning that the infimum of the problem is realized\nby a finite disjoint union of sets thought located at ``infinite distance'' one\nfrom the other.\n These results stem from an application of quantitative isoperimetric\ninequalities for the capillarity problem in a half-space.\n"", ""Large mass minimizers for isoperimetric problems with integrable\n nonlocal potentials This paper is concerned with volume-constrained minimization problems derived\nfrom Gamow's liquid drop model for the atomic nucleus, involving the\ncompetition of a perimeter term and repulsive nonlocal potentials. We consider\na large class of potentials, given by general radial nonnegative kernels which\nare integrable on $\\mathbb{R}^n$, such as Bessel potentials, and study the\nbehavior of the problem for large masses (i.e., volumes). Contrarily to the\nsmall mass case, where the nonlocal term becomes negligible compared to the\nperimeter, here the nonlocal term explodes compared to it. However, using the\nintegrability of those kernels, we rewrite the problem as the minimization of\nthe difference between the classical perimeter and a nonlocal perimeter, which\nconverges to a multiple of the classical perimeter as the mass goes to\ninfinity. Renormalizing to a fixed volume, we show that, if the first moment of\nthe kernels is smaller than an explicit threshold, the problem admits\nminimizers of arbitrarily large mass, which contrasts with the usual case of\nRiesz potentials. In addition, we prove that, any sequence of minimizers\nconverges to the ball as the mass goes to infinity. Finally, we study the\nstability of the ball, and show that our threshold on the first moment of the\nkernels is sharp in the sense that large balls go from stable to unstable. A\ndirect consequence of the instability of large balls above this threshold is\nthat there exist nontrivial compactly supported kernels for which the problems\nadmit minimizers which are not balls, that is, symmetry breaking occurs.\n"", 'Isoperimetry and stability properties of balls with respect to nonlocal\n energies We obtain a sharp quantitative isoperimetric inequality for nonlocal\n$s$-perimeters, uniform with respect to $s$ bounded away from $0$. This allows\nus to address local and global minimality properties of balls with respect to\nthe volume-constrained minimization of a free energy consisting of a nonlocal\n$s$-perimeter plus a non-local repulsive interaction term. In the particular\ncase $s =1$ the $s$-perimeter coincides with the classical perimeter, and our\nresults improve the ones of Kn\\""upfer and Muratov concerning minimality of\nballs of small volume in isoperimetric problems with a competition between\nperimeter and a nonlocal potential term. More precisely, their result is\nextended to its maximal range of validity concerning the type of nonlocal\npotentials considered, and is also generalized to the case where local\nperimeters are replaced by their nonlocal counterparts.\n']","[('variational problems', 0.5880261659622192), ('minimization energy functional', 0.5835803151130676), ('existence minimizers', 0.5725557208061218), ('nonlocal perimeter', 0.5622467994689941), ('minimizers', 0.5569162368774414), ('energy minimisers', 0.5508268475532532), ('constrained minimizers', 0.5385622978210449), ('minimization energy', 0.5324543714523315), ('perimeter functional', 0.528986930847168), ('nonlocal potentials', 0.511475145816803)]" 402,402,74,402_density functional theory_density functional_functional theory_distributional potentials,"['density functional theory', 'density functional', 'functional theory', 'distributional potentials', 'theory dft', 'densities', 'classical density', 'ground state density', 'state density', 'electron density']","['A rigorous formulation of Density Functional Theory for spinless\n electrons in one dimension In this paper, we present a completely rigorous formulation of Kohn-Sham\ndensity functional theory for spinless electrons living in one dimensional\nspace. More precisely, we consider Schr\\""odinger operators of the form\n$H_N(v,w) = -\\Delta + \\sum_{i\\neq j}^N w(x_i,x_j) + \\sum_{j=1}^N v(x_i)$ acting\non $\\wedge^N \\mathrm{L}^2([0,1])$, where the external and interaction\npotentials $v$ and $w$ belong to a suitable class of distributions. In this\nsetting, we obtain a complete characterization of the set of pure-state\n$v$-representable densities on the interval. Then, we prove a Hohenberg-Kohn\ntheorem that applies to the class of distributional potentials studied here.\nLastly, we establish the differentiability of the exchange-correlation\nfunctional and therefore the existence of a unique exchange-correlation\npotential. We then combine these results to provide a rigorous formulation of\nthe Kohn-Sham scheme. In particular, these results show that the Kohn-Sham\nscheme is rigorously exact in this setting.\n', 'Dissociation limit in Kohn-Sham density functional theory We consider the dissociation limit for molecules of the type $X_2$ in the\nKohn-Sham density functional theory setting, where $X$ can be any element with\n$N$ electrons. We prove that when the two atoms in the system are torn\ninfinitely far apart, the energy of the system convergences to $\\min\n\\limits_{\\alpha \\in [0,N]} \\big( I^{X}_{\\alpha} + I^{X}_{2N-\\alpha} \\big)$,\nwhere $I^{X}_{\\alpha}$ denotes the energy of the atom with $\\alpha$ electrons\nsurrounding it. Depending on the ""strength"" of the exchange this minimum might\nnot be equal to the symmetric splitting $2I^{X}_{N}$. We show numerically that\nfor the $H_2$-molecule with Dirac exchange this gives the expected result of\ntwice the energy of a H-atom $2 I^{H}_1$.\n', 'Mathematical Elements of Density Functional Theory We review some of the basic mathematical results about density functional\ntheory.\n']","[('density functional theory', 0.797637939453125), ('density functional', 0.6754052639007568), ('functional theory', 0.5078844428062439), ('distributional potentials', 0.4866584539413452), ('theory dft', 0.4854942560195923), ('densities', 0.4564504027366638), ('classical density', 0.4513125717639923), ('ground state density', 0.44981709122657776), ('state density', 0.42366838455200195), ('electron density', 0.41507768630981445)]" 403,403,74,403_riemannian optimization_optimization riemannian manifolds_optimization riemannian_riemannian gradient descent,"['riemannian optimization', 'optimization riemannian manifolds', 'optimization riemannian', 'riemannian gradient descent', 'optimization manifolds', 'manifold optimization', 'algorithms riemannian', 'conjugate gradient methods', 'optimization stiefel manifold', 'riemannian conjugate gradient']","['Sufficient Descent Riemannian Conjugate Gradient Method This paper considers sufficient descent Riemannian conjugate gradient methods\nwith line search algorithms. We propose two kinds of sufficient descent\nnonlinear conjugate gradient methods and prove these methods satisfy the\nsufficient descent condition even on Riemannian manifolds. One is the hybrid\nmethod combining the Fletcher-Reeves-type method with the\nPolak-Ribiere-Polyak-type method, and the other is the Hager-Zhang-type method,\nboth of which are generalizations of those used in Euclidean space. Also, we\ngeneralize two kinds of line search algorithms that are widely used in\nEuclidean space. In addition, we numerically compare our generalized methods by\nsolving several Riemannian optimization problems. The results show that the\nperformance of the proposed hybrid method greatly depends regardless of the\ntype of line search used. Meanwhile, the Hager-Zhang-type method has the fast\nconvergence property regardless of the type of line search used.\n', 'Negative curvature obstructs acceleration for strongly geodesically\n convex optimization, even with exact first-order oracles Hamilton and Moitra (2021) showed that, in certain regimes, it is not\npossible to accelerate Riemannian gradient descent in the hyperbolic plane if\nwe restrict ourselves to algorithms which make queries in a (large) bounded\ndomain and which receive gradients and function values corrupted by a (small)\namount of noise. We show that acceleration remains unachievable for any\ndeterministic algorithm which receives exact gradient and function-value\ninformation (unbounded queries, no noise). Our results hold for the classes of\nstrongly and nonstrongly geodesically convex functions, and for a large class\nof Hadamard manifolds including hyperbolic spaces and the symmetric space\n$\\mathrm{SL}(n) / \\mathrm{SO}(n)$ of positive definite $n \\times n$ matrices of\ndeterminant one. This cements a surprising gap between the complexity of convex\noptimization and geodesically convex optimization: for hyperbolic spaces,\nRiemannian gradient descent is optimal on the class of smooth and and strongly\ngeodesically convex functions, in the regime where the condition number scales\nwith the radius of the optimization domain. The key idea for proving the lower\nbound consists of perturbing the hard functions of Hamilton and Moitra (2021)\nwith sums of bump functions chosen by a resisting oracle.\n', 'Riemannian conjugate gradient methods: General framework and specific\n algorithms with convergence analyses This paper proposes a novel general framework of Riemannian conjugate\ngradient methods, that is, conjugate gradient methods on Riemannian manifolds.\nThe conjugate gradient methods are important first-order optimization\nalgorithms both in Euclidean spaces and on Riemannian manifolds. While various\ntypes of conjugate gradient methods are studied in Euclidean spaces, there have\nbeen fewer studies on those on Riemannian manifolds. In each iteration of the\nRiemannian conjugate gradient methods, the previous search direction must be\ntransported to the current tangent space so that it can be added to the\nnegative gradient of the objective function at the current point. There are\nseveral approaches to transport a tangent vector to another tangent space.\nTherefore, there are more variants of the Riemannian conjugate gradient methods\nthan the Euclidean case. In order to investigate them in more detail, the\nproposed framework unifies the existing Riemannian conjugate gradient methods\nsuch as ones utilizing a vector transport or inverse retraction and also\ndevelops other methods that have not been covered in previous studies.\nFurthermore, sufficient conditions for the convergence of a class of algorithms\nin the proposed framework are clarified. Moreover, the global convergence\nproperties of several specific types of algorithms are extensively analyzed.\nThe analyses provide the theoretical results for some algorithms in a more\ngeneral setting than the existing studies and completely new developments for\nthe other algorithms. Numerical experiments are performed to confirm the\nvalidity of the theoretical results. The results also compare the performances\nof several specific algorithms in the proposed framework.\n']","[('riemannian optimization', 0.7590447664260864), ('optimization riemannian manifolds', 0.752141535282135), ('optimization riemannian', 0.7429322004318237), ('riemannian gradient descent', 0.7220861911773682), ('optimization manifolds', 0.6775408387184143), ('manifold optimization', 0.6748816967010498), ('algorithms riemannian', 0.6631847620010376), ('conjugate gradient methods', 0.6542012095451355), ('optimization stiefel manifold', 0.6167433261871338), ('riemannian conjugate gradient', 0.602773904800415)]" 404,404,74,404_toric varieties_complete toric varieties_projective toric varieties_projective toric variety,"['toric varieties', 'complete toric varieties', 'projective toric varieties', 'projective toric variety', 'complete toric variety', 'toric variety', 'projective toric', 'affine toric varieties', 'conjecture toric', 'affine toric']","['F-blowups and essential divisors for toric varieties We investigate the relation between essential divisors and F-blowups, in\nparticular, address the problem whether all essential divisors appear on the\n$e$-th F-blowup for large enough $e$. Focusing on the case of normal affine\ntoric varieties, we establish a simple sufficient condition for a divisor over\nthe given toric variety to appear on the normalized limit F-blowup as a prime\ndivisor. As a corollary, we show that if a normal toric variety has a crepant\nresolution, then the above problem has a positive answer, provided that we use\nthe notion of essential divisors in the sense of Bouvier and\nGonzalez-Sprinberg. We also provide an example of toric threefold singularities\nfor which a non-essential divisor appears on an F-blowup.\n', 'Stable rationality of hypersurfaces of mock toric variety I We introduce a mock toric variety, a generalization of a toric variety. For a\nnon-toric example, Del-Pezzo surfaces are mock toric varieties. These new\nvarieties inherit some properties of mock toric varieties. In application, we\ngive sufficient conditions for the concrete construction of a strictly toroidal\nmodel of a hypersurface in a mock toric variety.\n', 'Irrational toric varieties and secondary polytopes The space of torus translations and degenerations of a projective toric\nvariety forms a toric variety associated to the secondary fan of the integer\npoints in the polytope corresponding to the toric variety. This is used to\nidentify a moduli space of real degenerations with the secondary polytope. A\nconfiguration A of real vectors gives an irrational projective toric variety in\na simplex. We identify a space of translations and degenerations of the\nirrational projective toric variety with the secondary polytope of A. For this,\nwe develop a theory of irrational toric varieties associated to arbitrary fans.\nWhen the fan is rational, the irrational toric variety is the nonnegative part\nof the corresponding classical toric variety. When the fan is the normal fan of\na polytope, the irrational toric variety is homeomorphic to that polytope.\n']","[('toric varieties', 0.8165759444236755), ('complete toric varieties', 0.8117119073867798), ('projective toric varieties', 0.8092436790466309), ('projective toric variety', 0.7966701984405518), ('complete toric variety', 0.7950587272644043), ('toric variety', 0.7754994034767151), ('projective toric', 0.7658342719078064), ('affine toric varieties', 0.7562578916549683), ('conjecture toric', 0.7323623299598694), ('affine toric', 0.6806918382644653)]" 405,405,74,405_entropy solutions scalar_solutions scalar conservation_scalar conservation laws_solutions conservation laws,"['entropy solutions scalar', 'solutions scalar conservation', 'scalar conservation laws', 'solutions conservation laws', 'nonlocal conservation laws', 'scalar conservation law', 'hyperbolic conservation laws', 'entropy solutions', 'entropy weak', 'convex entropy']","['Minimal Entropy Conditions for Scalar Conservation Laws with General\n Convex Fluxes We are concerned with the minimal entropy conditions for one-dimensional\nscalar conservation laws with general convex flux functions. For such scalar\nconservation laws, we prove that a single entropy-entropy flux pair\n$(\\eta(u),q(u))$ with $\\eta(u)$ of strict convexity is sufficient to single out\nan entropy solution from a broad class of weak solutions in $L^\\infty_{\\rm\nloc}$ that satisfy the inequality: $\\eta(u)_t+q(u)_x\\leq \\mu$ in the\ndistributional sense for some non-negative Radon measure $\\mu$. Furthermore, we\nextend this result to the class of weak solutions in $L^p_{\\rm loc}$, based on\nthe asymptotic behavior of the flux function $f(u)$ and the entropy function\n$\\eta(u)$ at infinity. The proofs are based on the equivalence between the\nentropy solutions of one-dimensional scalar conservation laws and the viscosity\nsolutions of the corresponding Hamilton-Jacobi equations, as well as the\nbilinear form and commutator estimates as employed similarly in the theory of\ncompensated compactness.\n', 'Higher regularity for entropy solutions of conservation laws with\n geometrically constrained discontinuous flux For the Burgers equation, the entropy solution becomes instantly BV with only\n$L^\\infty$ initial data. For conservation laws with genuinely nonlinear\ndiscontinuous flux, it is well known that the BV regularity of entropy\nsolutions is lost. Recently, this regularity has been proved to be fractional\nwith s = 1/2. Moreover, for less nonlinear flux the solution has still a\nfractional regularity 0 < s \\leq 1/2. The resulting general rule is the\nregularity of entropy solutions for a discontinuous flux is less than for a\nsmooth flux. In this paper, an optimal geometric condition on the discontinuous\nflux is used to recover the same regularity as for the smooth flux with the\nsame kind of nonlinearity.\n', ""$L^1$-Contraction Property of Entropy Solutions for Scalar Conservation\n Laws with Minimal Regularity Assumptions on the Flux This paper is concerned with entropy solutions of scalar conservation laws of\nthe form $\\partial_{t}u+\\diver f=0$ in $\\mathbb{R}^d\\times(0,\\infty)$. The flux\n$f=f(x,u)$ depends explicitly on the spatial variable $x$. Using an extension\nof Kruzkov's method, we establish the $L^1$-contraction property of entropy\nsolutions under minimal regularity assumptions on the flux.\n""]","[('entropy solutions scalar', 0.6057782769203186), ('solutions scalar conservation', 0.5651147961616516), ('scalar conservation laws', 0.5630073547363281), ('solutions conservation laws', 0.5546779632568359), ('nonlocal conservation laws', 0.5538472533226013), ('scalar conservation law', 0.5523650050163269), ('hyperbolic conservation laws', 0.5506081581115723), ('entropy solutions', 0.5188858509063721), ('entropy weak', 0.5180320143699646), ('convex entropy', 0.5056545734405518)]" 406,406,74,406_distributionally robust optimization_portfolio optimization_optimal portfolio_portfolio optimization problems,"['distributionally robust optimization', 'portfolio optimization', 'optimal portfolio', 'portfolio optimization problems', 'robust optimization', 'portfolio selection', 'constrained portfolio', 'portfolio allocation', 'portfolio management', 'distributionally robust']","['Robust portfolio optimization for recommender systems considering\n uncertainty of estimated statistics This paper is concerned with portfolio optimization models for creating\nhigh-quality lists of recommended items to balance the accuracy and diversity\nof recommendations. However, the statistics (i.e., expectation and covariance\nof ratings) required for mean--variance portfolio optimization are subject to\ninevitable estimation errors. To remedy this situation, we focus on robust\noptimization techniques that derive reliable solutions to uncertain\noptimization problems. Specifically, we propose a robust portfolio optimization\nmodel that copes with the uncertainty of estimated statistics based on the\ncardinality-based uncertainty sets. This robust portfolio optimization model\ncan be reduced to a mixed-integer linear optimization problem, which can be\nsolved exactly using mathematical optimization solvers. Experimental results\nusing two publicly available rating datasets demonstrate that our method can\nimprove not only the recommendation accuracy but also the diversity of\nrecommendations compared with conventional mean--variance portfolio\noptimization models. Notably, our method has the potential to improve the\nrecommendation quality of various rating prediction algorithms.\n', 'Wasserstein-Kelly Portfolios: A Robust Data-Driven Solution to Optimize\n Portfolio Growth We introduce a robust variant of the Kelly portfolio optimization model,\ncalled the Wasserstein-Kelly portfolio optimization. Our model, taking a\nWasserstein distributionally robust optimization (DRO) formulation, addresses\nthe fundamental issue of estimation error in Kelly portfolio optimization by\ndefining a ``ball"" of distributions close to the empirical return distribution\nusing the Wasserstein metric and seeking a robust log-optimal portfolio against\nthe worst-case distribution from the Wasserstein ball. Enhancing the Kelly\nportfolio using Wasserstein DRO is a natural step to take, given many\nsuccessful applications of the latter in areas such as machine learning for\ngenerating robust data-driven solutions. However, naive application of\nWasserstein DRO to the growth-optimal portfolio problem can lead to several\nissues, which we resolve through careful modelling. Our proposed model is both\npractically motivated and efficiently solvable as a convex program. Using\nempirical financial data, our numerical study demonstrates that the\nWasserstein-Kelly portfolio can outperform the Kelly portfolio in out-of-sample\ntesting across multiple performance metrics and exhibits greater stability.\n', 'Portfolio Optimization with Entropic Value-at-Risk The entropic value-at-risk (EVaR) is a new coherent risk measure, which is an\nupper bound for both the value-at-risk (VaR) and conditional value-at-risk\n(CVaR). As important properties, the EVaR is strongly monotone over its domain\nand strictly monotone over a broad sub-domain including all continuous\ndistributions, while well-known monotone risk measures, such as VaR and CVaR\nlack these properties. A key feature for a risk measure, besides its financial\nproperties, is its applicability in large-scale sample-based portfolio\noptimization. If the negative return of an investment portfolio is a\ndifferentiable convex function, the portfolio optimization with the EVaR\nresults in a differentiable convex program whose number of variables and\nconstraints is independent of the sample size, which is not the case for the\nVaR and CVaR. This enables us to design an efficient algorithm using\ndifferentiable convex optimization. Our extensive numerical study shows the\nhigh efficiency of the algorithm in large scales, compared to the existing\nconvex optimization software packages. The computational efficiency of the EVaR\nportfolio optimization approach is also compared with that of CVaR-based\nportfolio optimization. This comparison shows that the EVaR approach generally\nperforms similarly, and it outperforms as the sample size increases. Moreover,\nthe comparison of the portfolios obtained for a real case by the EVaR and CVaR\napproaches shows that the EVaR approach can find portfolios with better\nexpectations and VaR values at high confidence levels.\n']","[('distributionally robust optimization', 0.6322900056838989), ('portfolio optimization', 0.6057041883468628), ('optimal portfolio', 0.5760486721992493), ('portfolio optimization problems', 0.5576682686805725), ('robust optimization', 0.5346884727478027), ('portfolio selection', 0.5269837379455566), ('constrained portfolio', 0.5003700852394104), ('portfolio allocation', 0.49566376209259033), ('portfolio management', 0.4715350568294525), ('distributionally robust', 0.47129860520362854)]" 407,407,73,407_holomorphic line bundles_holomorphic line bundle_bergman kernels_holomorphic sections,"['holomorphic line bundles', 'holomorphic line bundle', 'bergman kernels', 'holomorphic sections', 'holomorphic vector bundle', 'hermitian holomorphic', 'hermitian line bundle', 'bergman kernel', 'holomorphic section', 'bundles hermitian']","['Equidistribution for Random Polynomials and Systems of Random Holomorphic Sections This article addresses an equidistribution problem concerning the zeros of systems of random holomorphic sections of positive line bundles on compact K\\""{a}hler manifolds and random polynomials on $\\mathbb{C}^{m}$ in the setting of the weighted pluripotential theory. For random polynomials, we consider non-orthonormal bases and prove an equidistribution result which is more general than the ones acquired before for non-discrete probability measures. More precisely, our result demonstrates that the equidistribution holds true even when the random coefficients in the basis representation are not independent and identically distributed (i.i.d.), and moreover, they are not constrained to any particular probability distribution. For random holomorphic sections, by extending the concept of a sequence of asymptotically Bernstein-Markov measures introduced by Bayraktar, Bloom and Levenberg in their recent paper to the setting of holomorphic line bundles over compact Kahler manifolds, we derive a global equidistribution, variance estimate and expected distribution theorems related to the zeros of systems of random holomorphic sections for large tensor powers of a fixed holomorphic line bundle for any codimension k, generalizing a previous result of Bayraktar in his 2016 paper and giving also a positive answer to a question posed in the same paper, asking whether the equidistribution is true for non-projective manifolds. For both random holomorphic polynomials on $\\mathbb{C}^{m}$ and systems of random holomorphic sections, the variance estimation method detailed in another paper of the author with Bojnik is significant.', 'Equidistribution for weakly holomorphic sections of line bundles on\n algebraic curves We prove the convergence of the normalized Fubini-Study measures and the\nlogarithms of the Bergman kernels of various Bergman spaces of holomorphic and\nweakly holomorphic sections associated to a singular Hermitian holomorphic line\nbundle on an algebraic curve. Using this, we study the asymptotic distribution\nof the zeros of random sequences of sections in these spaces.\n', 'Universality results for zeros of random holomorphic sections In this work we prove an universality result regarding the equidistribution\nof zeros of random holomorphic sections associated to a sequence of singular\nHermitian holomorphic line bundles on a compact K\\""ahler complex space $X$.\nNamely, under mild moment assumptions, we show that the asymptotic distribution\nof zeros of random holomorphic sections is independent of the choice of the\nprobability measure on the space of holomorphic sections. In the case when $X$\nis a compact K\\""ahler manifold, we also prove an off-diagonal exponential decay\nestimate for the Bergman kernels of a sequence of positive line bundles on $X$.\n']","[('holomorphic line bundles', 0.5950692892074585), ('holomorphic line bundle', 0.5661104321479797), ('bergman kernels', 0.545159101486206), ('holomorphic sections', 0.5367096662521362), ('holomorphic vector bundle', 0.5216360688209534), ('hermitian holomorphic', 0.5086067318916321), ('hermitian line bundle', 0.4966665506362915), ('bergman kernel', 0.4950961470603943), ('holomorphic section', 0.4890747666358948), ('bundles hermitian', 0.4831976592540741)]" 408,408,73,408_skein module_skein theory_skein relations_skein,"['skein module', 'skein theory', 'skein relations', 'skein', 'algebras quantum', 'kauffman bracket', 'frobenius map', 'invariant knots', 'quantum tori', 'frobenius']","['Skeins on tori We analyze the $G$-skein theory invariants of the 3-torus $T^3$ and the\ntwo-torus $T^2$, for the groups $G = GL_N, SL_N$ and for generic quantum\nparameter. We obtain formulas for the dimension of the skein module of $T^3$,\nand we describe the algebraic structure of the skein category of $T^2$ --\nnamely of the $n$-point relative skein algebras.\n The case $n=N$ (the Schur-Weyl case) is special in our analysis. We construct\nan isomorphism between the $N$-point relative skein algebra and the double\naffine Hecke algebra at specialized parameters. As a consequence, we prove that\nall tangles in the relative $N$-point skein algebra are in fact equivalent to\nlinear combinations of braids, modulo skein relations. More generally for $n$\nan integer multiple of $N$, we construct a surjective homomorphism from an\nappropriate DAHA to the $n$-point relative skein algebra.\n In the case $G=SL_2$ corresponding to the Kauffman bracket we give proofs\ndirectly using skein relations. Our analysis of skein categories in higher rank\nhinges instead on the combinatorics of multisegment representations when\nrestricting from DAHA to AHA and nonvanishing properties of parabolic sign\nidempotents upon them.\n', 'Center of the stated skein algebra The stated skein algebra is a generalization of the Kauffman bracket skein\nalgebra introduced in the study of quantum trace maps. When the quantum\nparameter is a root of unity, the stated skein algebra has a big center and is\nfinitely generated as a module over the center. We give the center a simple\ndescription and calculate the dimension over center of the stated skein\nalgebra.\n', 'Faithfullness of geometric action of skein algebras We show that the action of the Kauffman bracket skein algebra of a surface\n$\\Sigma$ on the skein module of the handlebody bounded by $\\Sigma$ is faithful\nif and only if the quantum parameter is not a root of 1.\n']","[('skein module', 0.6613759994506836), ('skein theory', 0.6544811725616455), ('skein relations', 0.6378319263458252), ('skein', 0.5716791749000549), ('algebras quantum', 0.4162183701992035), ('kauffman bracket', 0.38531988859176636), ('frobenius map', 0.36766135692596436), ('invariant knots', 0.3395243287086487), ('quantum tori', 0.3220579922199249), ('frobenius', 0.29347389936447144)]" 409,409,73,409_association schemes_association scheme_schemes obtained_class association scheme,"['association schemes', 'association scheme', 'schemes obtained', 'class association scheme', 'terwilliger algebra', 'schemes', 'schemes determine', 'schemes class', 'scheme mathcal', 'association']","['On Terwilliger $\\mathbb{F}$-algebras of factorial association schemes The Terwilliger algebras of association schemes over an arbitrary field\n$\\mathbb{F}$ were called the Terwilliger $\\mathbb{F}$-algebras of association\nschemes in [8]. In this paper, we study the Terwilliger $\\mathbb{F}$-algebras\nof factorial association schemes. We determine the $\\mathbb{F}$-dimensions, the\ncenters, the semisimplicity, the Jacobson radicals, and the algebraic\nstructures of the Terwilliger $\\mathbb{F}$-algebras of factorial association\nschemes.\n', ""Bivariate $Q$-polynomial structures for the nonbinary Johnson scheme and\n the association scheme obtained from attenuated spaces The study of $P$-polynomial association schemes (distance-regular graphs) and\n$Q$-polynomial association schemes, and in particular $P$- and $Q$-polynomial\nassociation schemes, has been a central theme not only in the theory of\nassociation schemes but also in the whole study of algebraic combinatorics in\ngeneral. Leonard's theorem (1982) says that the spherical functions (or the\ncharacter tables) of $P$- and $Q$-polynomial association schemes are described\nby Askey-Wilson orthogonal polynomials or their relatives. These polynomials\nare one-variable orthogonal polynomials. It seems that the new attempt to\ndefine and study higher rank $P$- and $Q$-polynomial association schemes had\nbeen hoped for, but had gotten only limited success. The first very successful\nattempt was initiated recently by Bernard-Cramp\\'{e}-d'Andecy-Vinet-Zaimi\n[arXiv:2212.10824], and then followed by Bannai-Kurihara-Zhao-Zhu\n[arXiv:2305.00707]. The general theory and some explicit examples of families\nof higher rank (multivariate) $P$- and/or $Q$-polynomial association schemes\nhave been obtained there. The main purpose of the present paper is to prove\nthat some important families of association schemes are shown to be bivariate\n$Q$-polynomial. Namely, we show that all the nonbinary Johnson association\nschemes and all the attenuated space association schemes are bivariate\n$Q$-polynomial. It should be noted that the parameter restrictions needed in\nthe previous papers are completely lifted in this paper. Our proofs are done by\nexplicitly calculating the Krein parameters of these association schemes. At\nthe end, we mention some speculations and indications of what we can expect in\nthe future study.\n"", ""A note on modular Terwilliger algebras of association schemes Let $p$ denote a prime number. In this note, we focus on the modular\nTerwilliger algebras of association schemes defined in [3]. We define the\nprimary module of a modular Terwilliger algebra of an association scheme and\ndetermine all its composition factors up to isomorphism. We then characterize\nthe $p'$-valenced association schemes by some properties of their modular\nTerwilliger algebras. The corollaries about the modular Terwilliger algebras of\nassociation schemes are given.\n""]","[('association schemes', 0.6842932105064392), ('association scheme', 0.6309466361999512), ('schemes obtained', 0.5762040019035339), ('class association scheme', 0.5710912346839905), ('terwilliger algebra', 0.5448213815689087), ('schemes', 0.5442129373550415), ('schemes determine', 0.475030779838562), ('schemes class', 0.46161332726478577), ('scheme mathcal', 0.4303923547267914), ('association', 0.4272582530975342)]" 410,410,72,410_pair correlations_pair correlation_low discrepancy sequences_poissonian,"['pair correlations', 'pair correlation', 'low discrepancy sequences', 'poissonian', 'correlation functions', 'sequences small', 'statistical correlation', 'correlations', 'discrepancy sequences', 'sequences']","['P-adic Poissonian Pair Correlations via the Monna Map Although the existence of sequences in the p-adic integers with Poissonian\npair correlations has already been shown, no explicit examples had been found\nso far. In this note we discuss how to transfer real sequences with Poissonian\npair correlations to the p-adic setting by making use of the Monna map.\n', 'On Inhomogeneous Poissonian Pair Correlations We study the notion of inhomogeneous Poissonian pair correlations, proving several properties that show similarities and differences to its homogeneous counterpart. In particular, we show that sequences with inhomogeneous Poissonian pair correlations need not be uniformly distributed, contrary to what was till recently believed.', 'Sequences with almost Poissonian Pair Correlations Although a generic uniformly distributed sequence has Poissonian pair\ncorrelations, only one explicit example has been found up to now. Additionally,\nit is even known that many classes of uniformly distributed sequences, like van\nder Corput sequences, Kronecker sequences and LS sequences, do not have\nPoissonian pair correlations. In this paper, we show that van der Corput\nsequences and the Kronecker sequence for the golden mean are as close to having\nPoissonian pair correlations as possible: they both have $\\alpha$-pair\ncorrelations for all $0 < \\alpha < 1$ but not for $\\alpha = 1$ which\ncorresponds to Poissonian pair correlations.\n']","[('pair correlations', 0.4912514090538025), ('pair correlation', 0.46936506032943726), ('low discrepancy sequences', 0.44649606943130493), ('poissonian', 0.4061199426651001), ('correlation functions', 0.40167373418807983), ('sequences small', 0.3858182728290558), ('statistical correlation', 0.3820165693759918), ('correlations', 0.3760518729686737), ('discrepancy sequences', 0.3757084012031555), ('sequences', 0.3549329340457916)]" 411,411,72,411_optimal pricing_dynamic pricing_pricing problems_assortment,"['optimal pricing', 'dynamic pricing', 'pricing problems', 'assortment', 'discrete choice models', 'demand models', 'choice models', 'pricing', 'revenue management', 'retail']","['Revenue Management Under the Markov Chain Choice Model with Joint Price\n and Assortment Decisions Finding the optimal product prices and product assortment are two fundamental\nproblems in revenue management. Usually, a seller needs to jointly determine\nthe prices and assortment while managing a network of resources with limited\ncapacity. However, there is not yet a tractable method to efficiently solve\nsuch a problem. Existing papers studying static joint optimization of price and\nassortment cannot incorporate resource constraints. Then we study the revenue\nmanagement problem with resource constraints and price bounds, where the prices\nand the product assortments need to be jointly determined over time. We showed\nthat under the Markov chain (MC) choice model (which subsumes the multinomial\nlogit (MNL) model), we could reformulate the choice-based joint optimization\nproblem as a tractable convex conic optimization problem. We also proved that\nan optimal solution with a constant price vector exists even with constraints\non resources. In addition, a solution with both constant assortment and price\nvector can be optimal when there is no resource constraint.\n', 'PASTA: Pessimistic Assortment Optimization We consider a class of assortment optimization problems in an offline\ndata-driven setting. A firm does not know the underlying customer choice model\nbut has access to an offline dataset consisting of the historically offered\nassortment set, customer choice, and revenue. The objective is to use the\noffline dataset to find an optimal assortment. Due to the combinatorial nature\nof assortment optimization, the problem of insufficient data coverage is likely\nto occur in the offline dataset. Therefore, designing a provably efficient\noffline learning algorithm becomes a significant challenge. To this end, we\npropose an algorithm referred to as Pessimistic ASsortment opTimizAtion (PASTA\nfor short) designed based on the principle of pessimism, that can correctly\nidentify the optimal assortment by only requiring the offline data to cover the\noptimal assortment under general settings. In particular, we establish a regret\nbound for the offline assortment optimization problem under the celebrated\nmultinomial logit model. We also propose an efficient computational procedure\nto solve our pessimistic assortment optimization problem. Numerical studies\ndemonstrate the superiority of the proposed method over the existing baseline\nmethod.\n', ""A Model of Competitive Assortment Planning Algorithm With a novel search algorithm or assortment planning or assortment\noptimization algorithm that takes into account a Bayesian approach to\ninformation updating and two-stage assortment optimization techniques, the\ncurrent research provides a novel concept of competitiveness in the digital\nmarketplace. Via the search algorithm, there is competition between the\nplatform, vendors, and private brands of the platform. The current paper\nsuggests a model and discusses how competition and collusion arise in the\ndigital marketplace through assortment planning or assortment optimization\nalgorithm. Furthermore, it suggests a model of an assortment algorithm free\nfrom collusion between the platform and the large vendors. The paper's major\nconclusions are that collusive assortment may raise a product's purchase\nlikelihood but fail to maximize expected revenue. The proposed assortment\nplanning, on the other hand, maintains competitiveness while maximizing\nexpected revenue.\n""]","[('optimal pricing', 0.5974754095077515), ('dynamic pricing', 0.5037583708763123), ('pricing problems', 0.4973328113555908), ('assortment', 0.49214664101600647), ('discrete choice models', 0.4899616539478302), ('demand models', 0.46093741059303284), ('choice models', 0.45782703161239624), ('pricing', 0.45367565751075745), ('revenue management', 0.4310216009616852), ('retail', 0.40351253747940063)]" 412,412,72,412_distinct distances_maximum number points_distinct distance_distances points,"['distinct distances', 'maximum number points', 'distinct distance', 'distances points', 'finite points', 'distinct triangles', 'point sets', 'point configurations', 'optimal point', 'integer distance']","[""Distinct Angles in General Position The Erd\\H{o}s distinct distance problem is a ubiquitous problem in discrete\ngeometry. Somewhat less well known is Erd\\H{o}s' distinct angle problem, the\nproblem of finding the minimum number of distinct angles between $n$\nnon-collinear points in the plane. Recent work has introduced bounds on a wide\narray of variants of this problem, inspired by similar variants in the distance\nsetting.\n In this short note, we improve the best known upper bound for the minimum\nnumber of distinct angles formed by $n$ points in general position from\n$O(n^{\\log_2(7)})$ to $O(n^2)$. Before this work, similar bounds relied on\nprojections onto a generic plane from higher dimensional space. In this paper,\nwe employ the geometric properties of a logarithmic spiral, sidestepping the\nneed for a projection.\n We also apply this configuration to reduce the upper bound on the largest\ninteger such that any set of $n$ points in general position has a subset of\nthat size with all distinct angles. This bound is decreased from\n$O(n^{\\log_2(7)/3})$ to $O(n^{1/2})$.\n"", 'Distinct Angles and Angle Chains in Three Dimensions In 1946, Erd\\H{o}s posed the distinct distance problem, which seeks to find\nthe minimum number of distinct distances between pairs of points selected from\nany configuration of $n$ points in the plane. The problem has since been\nexplored along with many variants, including ones that extend it into higher\ndimensions. Less studied but no less intriguing is Erd\\H{o}s\' distinct angle\nproblem, which seeks to find point configurations in the plane that minimize\nthe number of distinct angles. In their recent paper ""Distinct Angles in\nGeneral Position,"" Fleischmann, Konyagin, Miller, Palsson, Pesikoff, and Wolf\nuse a logarithmic spiral to establish an upper bound of $O(n^2)$ on the minimum\nnumber of distinct angles in the plane in general position, which prohibits\nthree points on any line or four on any circle.\n We consider the question of distinct angles in three dimensions and provide\nbounds on the minimum number of distinct angles in general position in this\nsetting. We focus on pinned variants of the question, and we examine explicit\nconstructions of point configurations in $\\mathbb{R}^3$ which use\nself-similarity to minimize the number of distinct angles. Furthermore, we\nstudy a variant of the distinct angles question regarding distinct angle chains\nand provide bounds on the minimum number of distinct chains in $\\mathbb{R}^2$\nand $\\mathbb{R}^3$.\n', ""Distinct Angle Problems and Variants The Erd\\H{o}s distinct distance problem is a ubiquitous problem in discrete\ngeometry. Less well known is Erd\\H{o}s' distinct angle problem, the problem of\nfinding the minimum number of distinct angles between $n$ non-collinear points\nin the plane. The standard problem is already well understood. However, it\nadmits many of the same variants as the distinct distance problem, many of\nwhich are unstudied.\n We provide upper and lower bounds on a broad class of distinct angle\nproblems. We show that the number of distinct angles formed by $n$ points in\ngeneral position is $O(n^{\\log_2(7)})$, providing the first non-trivial bound\nfor this quantity. We introduce a new class of asymptotically optimal point\nconfigurations with no four cocircular points. Then, we analyze the sensitivity\nof asymptotically optimal point sets to perturbation, yielding a much broader\nclass of asymptotically optimal configurations. In higher dimensions we show\nthat a variant of Lenz's construction admits fewer distinct angles than the\noptimal configurations in two dimensions.\n We also show that the minimum size of a maximal subset of $n$ points in\ngeneral position admitting only unique angles is $\\Omega(n^{1/5})$ and\n$O(n^{\\log_2(7)/3})$. We also provide bounds on the partite variants of the\nstandard distinct angle problem.\n""]","[('distinct distances', 0.5189416408538818), ('maximum number points', 0.484149694442749), ('distinct distance', 0.460813969373703), ('distances points', 0.4577624797821045), ('finite points', 0.4488392472267151), ('distinct triangles', 0.4467434585094452), ('point sets', 0.4337937831878662), ('point configurations', 0.4289490878582001), ('optimal point', 0.42679134011268616), ('integer distance', 0.42033135890960693)]" 413,413,72,413_sparse identification nonlinear_identification nonlinear dynamics_sparse identification_identification nonlinear,"['sparse identification nonlinear', 'identification nonlinear dynamics', 'sparse identification', 'identification nonlinear', 'sparse regression', 'nonlinear dynamics sindy', 'sparse optimization', 'dynamics sindy', 'systems sparse', 'kalman smoothing']","['EKF-SINDy: Empowering the extended Kalman filter with sparse\n identification of nonlinear dynamics Measured data from a dynamical system can be assimilated into a predictive\nmodel by means of Kalman filters. Nonlinear extensions of the Kalman filter,\nsuch as the Extended Kalman Filter (EKF), are required to enable the joint\nestimation of (possibly nonlinear) system dynamics and of input parameters. To\nconstruct the evolution model used in the prediction phase of the EKF, we\npropose to rely on the Sparse Identification of Nonlinear Dynamics (SINDy).\nSINDy enables to identify the evolution model directly from preliminary\nacquired data, thus avoiding possible bias due to wrong assumptions and\nincorrect modelling of the system dynamics. Moreover, the numerical integration\nof a SINDy model leads to great computational savings compared to alternate\nstrategies based on, e.g., finite elements. Last, SINDy allows an immediate\ndefinition of the Jacobian matrices required by the EKF to identify system\ndynamics and properties, a derivation that is usually extremely involved with\nphysical models. As a result, combining the EKF with SINDy provides a\ndata-driven computationally efficient, easy-to-apply approach for the\nidentification of nonlinear systems, capable of robust operation even outside\nthe range of training of SINDy. To demonstrate the potential of the approach,\nwe address the identification of a linear non-autonomous system consisting of a\nshear building model excited by real seismograms, and the identification of a\npartially observed nonlinear system. The challenge arising from the use of\nSINDy when the system state is not entirely accessible has been relieved by\nmeans of time-delay embedding. The great accuracy and the small uncertainty\nassociated with the state identification, where the state has been augmented to\ninclude system properties, underscores the great potential of the proposed\nstrategy, paving the way for the setting of predictive digital twins in\ndifferent fields.\n', 'Sparsifying Priors for Bayesian Uncertainty Quantification in Model\n Discovery We propose a probabilistic model discovery method for identifying ordinary\ndifferential equations (ODEs) governing the dynamics of observed multivariate\ndata. Our method is based on the sparse identification of nonlinear dynamics\n(SINDy) framework, in which target ODE models are expressed as a sparse linear\ncombinations of pre-specified candidate functions. Promoting parsimony through\nsparsity in SINDy leads to interpretable models that generalize to unknown\ndata. Instead of targeting point estimates of the SINDy (linear combination)\ncoefficients, in this work we estimate these coefficients via sparse Bayesian\ninference. The resulting method, uncertainty quantification SINDy (UQ-SINDy),\nquantifies not only the uncertainty in the values of the SINDy coefficients due\nto observation errors and limited data, but also the probability of inclusion\nof each candidate function in the linear combination. UQ-SINDy promotes\nrobustness against observation noise and limited data, interpretability (in\nterms of model selection and inclusion probabilities), and generalization\ncapacity for out-of-sample forecast. Sparse inference for UQ-SINDy employs\nMarkov Chain Monte Carlo, and we explore two sparsifying priors: the\nspike-and-slab prior, and the regularized horseshoe prior. We apply UQ-SINDy to\nsynthetic nonlinear data sets from a Lotka-Volterra model and a nonlinear\noscillator, and to a real-world data set of lynx and hare populations. We find\nthat UQ-SINDy is able to discover accurate and meaningful models even in the\npresence of noise and limited data samples.\n', 'Ensemble-SINDy: Robust sparse model discovery in the low-data,\n high-noise limit, with active learning and control Sparse model identification enables the discovery of nonlinear dynamical\nsystems purely from data; however, this approach is sensitive to noise,\nespecially in the low-data limit. In this work, we leverage the statistical\napproach of bootstrap aggregating (bagging) to robustify the sparse\nidentification of nonlinear dynamics (SINDy) algorithm. First, an ensemble of\nSINDy models is identified from subsets of limited and noisy data. The\naggregate model statistics are then used to produce inclusion probabilities of\nthe candidate functions, which enables uncertainty quantification and\nprobabilistic forecasts. We apply this ensemble-SINDy (E-SINDy) algorithm to\nseveral synthetic and real-world data sets and demonstrate substantial\nimprovements to the accuracy and robustness of model discovery from extremely\nnoisy and limited data. For example, E-SINDy uncovers partial differential\nequations models from data with more than twice as much measurement noise as\nhas been previously reported. Similarly, E-SINDy learns the Lotka Volterra\ndynamics from remarkably limited data of yearly lynx and hare pelts collected\nfrom 1900-1920. E-SINDy is computationally efficient, with similar scaling as\nstandard SINDy. Finally, we show that ensemble statistics from E-SINDy can be\nexploited for active learning and improved model predictive control.\n']","[('sparse identification nonlinear', 0.6653997898101807), ('identification nonlinear dynamics', 0.6219236850738525), ('sparse identification', 0.5790945291519165), ('identification nonlinear', 0.5744889974594116), ('sparse regression', 0.5140687823295593), ('nonlinear dynamics sindy', 0.4886881411075592), ('sparse optimization', 0.4735393226146698), ('dynamics sindy', 0.45282962918281555), ('systems sparse', 0.44591793417930603), ('kalman smoothing', 0.40779945254325867)]" 414,414,72,414_rota baxter algebras_rota baxter algebra_algebras rota baxter_rota baxter operators,"['rota baxter algebras', 'rota baxter algebra', 'algebras rota baxter', 'rota baxter operators', 'rota baxter operator', 'baxter algebras', 'relative rota baxter', 'baxter algebra', 'lie algebras', 'baxter operators']","['Lie n-algebras and cohomologies of relative Rota-Baxter operators on\n n-Lie algebras Based on the differential graded Lie algebra controlling deformations of an\n$n$-Lie algebra with a representation (called an n-LieRep pair), we construct a\nLie n-algebra, whose Maurer-Cartan elements characterize relative Rota-Baxter\noperators on n-LieRep pairs. The notion of an n-pre-Lie algebra is introduced,\nwhich is the underlying algebraic structure of the relative Rota-Baxter\noperator. We give the cohomology of relative Rota-Baxter operators and study\ninfinitesimal deformations and extensions of order m deformations to order m+1\ndeformations of relative Rota-Baxter operators through the cohomology groups of\nrelative Rota-Baxter operators. Moreover, we build the relation between the\ncohomology groups of relative Rota-Baxter operators on n-LieRep pairs and those\non (n+1)-LieRep pairs by certain linear functions.\n', 'Lie theory and cohomology of relative Rota-Baxter operators In this paper, we establish a local Lie theory for relative Rota-Baxter\noperators of weight $1$. First we recall the category of relative Rota-Baxter\noperators of weight $1$ on Lie algebras and construct a cohomology theory for\nthem. We use the second cohomology group to study infinitesimal deformations of\nrelative Rota-Baxter operators and modified $r$-matrices. Then we introduce a\ncohomology theory of relative Rota-Baxter operators on a Lie group. We\nconstruct the differentiation functor from the category of relative Rota-Baxter\noperators on Lie groups to that on Lie algebras, and extend it to the\ncohomology level by proving the Van Est theorem between the two cohomology\ntheories. We integrate a relative Rota-Baxter operator of weight 1 on a Lie\nalgebra to a local relative Rota-Baxter operator on the corresponding Lie\ngroup, and show that the local integration and differentiation are adjoint to\neach other. Finally, we give two applications of our integration of Rota-Baxter\noperators: one is to give an explicit formula for the factorization problem,\nand the other is to provide an integration for matched pairs.\n', 'Representations and cohomologies of relative Rota-Baxter Lie algebras\n and applications In this paper, first we give the notion of a representation of a relative\nRota-Baxter Lie algebra and introduce the cohomologies of a relative\nRota-Baxter Lie algebra with coefficients in a representation. Then we classify\nabelian extensions of relative Rota-Baxter Lie algebras using the second\ncohomology group, and classify skeletal relative Rota-Baxter Lie 2-algebras\nusing the third cohomology group as applications. At last, using the\nestablished general framework of representations and cohomologies of relative\nRota-Baxter Lie algebras, we give the notion of representations of Rota-Baxter\nLie algebras, which is consistent with representations of Rota-Baxter\nassociative algebras in the literature, and introduce the cohomologies of\nRota-Baxter Lie algebras with coefficients in a representation. Applications\nare also given to classify abelian extensions of Rota-Baxter Lie algebras and\nskeletal Rota-Baxter Lie 2-algebras.\n']","[('rota baxter algebras', 0.8021764159202576), ('rota baxter algebra', 0.7702881693840027), ('algebras rota baxter', 0.7196706533432007), ('rota baxter operators', 0.7171759605407715), ('rota baxter operator', 0.6800022721290588), ('baxter algebras', 0.6700299382209778), ('relative rota baxter', 0.6263338327407837), ('baxter algebra', 0.624234676361084), ('lie algebras', 0.58626788854599), ('baxter operators', 0.5841808915138245)]" 415,415,72,415_parking functions_parking_number cars_combinatorial,"['parking functions', 'parking', 'number cars', 'combinatorial', 'park', 'characterization permutation', 'functions length', 'permutation invariant', 'functions introduced', 'buses']","['Vacillating parking functions For any integers $1\\leq k\\leq n$, we introduce a new family of parking\nfunctions called $k$-vacillating parking functions of length $n$. The parking\nrule for $k$-vacillating parking functions allows a car with preference $p$ to\npark in the first available spot in encounters among the parking spots numbered\n$p$, $p-k$, and $p+k$ (in that order and if those spots exists). In this way,\n$k$-vacillating parking functions are a modification of Naples parking\nfunctions, which allow for backwards movement of a car, and of $\\ell$-interval\nparking functions, which allow a car to park in its preference or up to $\\ell$\nspots in front of its preference. Among our results, we establish a\ncombinatorial interpretation for the numerator of the $n$th convergent of the\ncontinued fraction of $\\sqrt{2}$, as the number of non-decreasing\n$1$-vacillating parking functions of length~$n$. Our main result gives a\nproduct formula for the enumeration of $k$-vacillating parking functions of\nlength $n$ based on the number of $1$-vacillating parking functions of smaller\nlength. We conclude with some directions for further research.\n', 'Connecting $k$-Naples parking functions and obstructed parking functions\n via involutions Parking functions were classically defined for $n$ cars attempting to park on\na one-way street with $n$ parking spots, where cars only drive forward.\nSubsequently, parking functions have been generalized in various ways,\nincluding allowing cars the option of driving backward. The set $PF_{n,k}$ of\n$k$-Naples parking functions have cars who can drive backward a maximum of $k$\nsteps before driving forward. A recursive formula for $|PF_{n,k}|$ has been\nobtained, though deriving a closed formula for $|PF_{n,k}|$ appears difficult.\nIn addition, an important subset $B_{n,k}$ of $PF_{n,k}$, called the contained\n$k$-Naples parking functions, has been shown, with a non-bijective proof, to\nhave the same cardinality as that of the set $PF_n$ of classical parking\nfunctions, independent of $k$.\n In this paper, we study $k$-Naples parking functions in the more general\ncontext of $m$ cars and $n$ parking spots, for any $m \\leq n$. We use various\nparking function involutions to establish a bijection between the contained\n$k$-Naples parking functions and the classical parking functions, from which it\ncan be deduced that the two sets have the same number of ties. Then we extend\nthis bijection to inject the set of $k$-Naples parking functions into a certain\nset of obstructed parking functions, providing an upper bound for the\ncardinality of the former set.\n', 'Metered Parking Functions We introduce a generalization of parking functions called $t$-metered\n$(m,n)$-parking functions, in which one of $m$ cars parks among $n$ spots per\nhour then leaves after $t$ hours. We characterize and enumerate these sequences\nfor $t=1$, $t=m-2$, and $t=n-1$, and provide data for other cases. We\ncharacterize the $1$-metered parking functions by decomposing them into\nsections based on which cars are unlucky, and enumerate them using a Lucas\nsequence recursion. Additionally, we establish a new combinatorial\ninterpretation of the numerator of the continued fraction $n-1/(n-1/\\cdots)$\n($n$ times) as the number of $1$-metered $(n,n)$-parking functions. We\nintroduce the $(m,n)$-parking function shuffle in order to count\n$(m-2)$-metered $(m,n)$-parking functions, which also yields an expression for\nthe number of $(m,n)$-parking functions with any given first entry. As a\nspecial case, we find that the number of $(m-2)$-metered $(m, m-1)$-parking\nfunctions is equal to the sum of the first entries of classical parking\nfunction of length $m-1$. We enumerate the $(n-1)$-metered $(m,n)$-parking\nfunctions in terms of the number of classical parking functions of length $n$\nwith certain parking outcomes, which we show are periodic sequences with period\n$n$. We conclude with an array of open problems.\n']","[('parking functions', 0.6706756353378296), ('parking', 0.5539387464523315), ('number cars', 0.4135991930961609), ('combinatorial', 0.41086676716804504), ('park', 0.3859894871711731), ('characterization permutation', 0.37441471219062805), ('functions length', 0.3533335030078888), ('permutation invariant', 0.3143352270126343), ('functions introduced', 0.3137834370136261), ('buses', 0.31041181087493896)]" 416,416,72,416_simply connected manifolds_connected manifolds_surfaces manifolds_spheres manifolds,"['simply connected manifolds', 'connected manifolds', 'surfaces manifolds', 'spheres manifolds', 'simply connected manifold', 'manifolds', 'topological manifold', 'homotopy spheres', 'connected manifold', 'surfaces manifold']","[""Direct and indirect constructions of locally flat surfaces in\n 4-manifolds There are two main approaches to building locally flat embedded surfaces in\n4-manifolds: direct methods which geometrically manipulate a given map of a\nsurface, and more indirect methods using surgery theory. Both methods rely on\nFreedman--Quinn's disc embedding theorem. These are the lecture notes for a\nminicourse giving an introduction to both methods, by sketching the proofs of\nthe following results: every primitive second homology class in a closed,\nsimply connected 4-manifold is represented by a locally flat torus\n(Lee--Wilczy\\'{n}ski); and every Alexander polynomial one knot in $S^3$ is\ntopologically slice (Freedman--Quinn).\n"", 'Topologically isotopic and smoothly inequivalent 2-spheres in simply\n connected 4-manifolds whose complement has a prescribed fundamental group We describe a procedure to construct infinite sets of pairwise smoothly\ninequivalent 2-spheres in simply connected 4-manifolds, which are topologically\nisotopic and whose complement has a prescribed fundamental group that satisfies\nsome conditions. This class of groups include finite cyclic groups and the\nbinary icosahedral group. These are the first known examples of knotting\nphenomena in 4-manifolds with such properties. Examples of locally flat\nembedded 2-spheres in non-smoothable 4-manifolds are also given.\n', ""Pseudo-isotopies of simply connected 4-manifolds Perron and Quinn gave independent proofs in 1986 that every topological\npseudo-isotopy of a simply-connected, compact topological 4-manifold is\nisotopic to the identity. Another result of Quinn is that every smooth\npseudo-isotopy of a simply-connected, compact, smooth 4-manifold is smoothly\nstably isotopic to the identity. From this he deduced that\n$\\pi_4(\\operatorname{TOP}(4)/\\operatorname{O}(4)) =0$. A replacement criterion\nis used at a key juncture in Quinn's proofs, but the justification given for it\nis incorrect. We provide different arguments that bypass the replacement\ncriterion, thus completing Quinn's proofs of both the topological and the\nstable smooth pseudo-isotopy theorems. We discuss the replacement criterion and\nstate it as an open problem.\n""]","[('simply connected manifolds', 0.6222572922706604), ('connected manifolds', 0.6051391959190369), ('surfaces manifolds', 0.5907193422317505), ('spheres manifolds', 0.5811100602149963), ('simply connected manifold', 0.5725117325782776), ('manifolds', 0.5688417553901672), ('topological manifold', 0.5635130405426025), ('homotopy spheres', 0.5578122735023499), ('connected manifold', 0.5542427897453308), ('surfaces manifold', 0.5416324138641357)]" 417,417,72,417_dislocations_dislocation_brittle materials_elasticity,"['dislocations', 'dislocation', 'brittle materials', 'elasticity', 'elastic energy', 'threshold dynamics', 'grain boundaries', 'grain boundary', 'dynamics', 'strain gradient']","[""A New Formulation of Coupling and Sliding Motions of Grain Boundaries\n Based on Dislocation Structure A continuum model of the two dimensional low angle grain boundary motion and\nthe dislocation structure evolution on the grain boundaries has been developed\nin Ref. [48]. The model is based on the motion and reaction of the constituent\ndislocations of the grain boundaries. The long-range elastic interaction\nbetween dislocations is included in the continuum model, and it maintains a\nstable dislocation structure described by the Frank's formula for grain\nboundaries. In this paper, we develop a new continuum model for the coupling\nand sliding motions of grain boundaries that avoids the time-consuming\ncalculation of the long-range elastic interaction. In this model, the\nlong-range elastic interaction is replaced by a constraint of the Frank's\nformula. The constrained evolution problem in our new continuum model is\nfurther solved by using the projection method. Effects of the coupling and\nsliding motions in our new continuum model and relationship with the classical\nmotion by curvature model are discussed. The continuum model is validated by\ncomparisons with discrete dislocation dynamics model and the early continuum\nmodel [48] in which the long-range dislocation interaction is explicitly\ncalculated.\n"", 'Discrete Dislocations Dynamics with annihilation as the limit of the\n Peierls-Nabarro model in one dimension Plasticity of metals is the emergent phenomenon of many crystal defects\n(dislocations) which interact and move on microscopic time and length scales.\nTwo of the commonly used models to describe such dislocation dynamics are the\nPeierls-Nabarro model and the so-called discrete dislocation dynamics model.\n However, the consistency between these two models is known only for a few\nnumber of dislocations or up to the first time at which two dislocations\ncollide. In this paper we resolve these restrictions, and establish the\nconsistency for any number of dislocations and without any restriction on their\ninitial position or orientation.\n In more detail, the evolutive Peierls-Nabarro model which we consider\ndescribes the evolution of a phase-field function $v_\\e(t,x)$ which represents\nthe atom deformation in a crystal. The model is a reaction-diffusion equation\nof Allen-Cahn type with the half Laplacian. The small parameter $\\ep$ is the\nratio between the atomic distance and the typical distance between phase\ntransitions in $v_\\e$. The position of a phase transition determines the\nposition of a dislocation, and the sign of the transition (up or down)\ndetermines the orientation.\n The goal of this paper is to derive the asymptotic behavior of the function\n$v_\\e$ as $\\ep\\to0$ up to arbitrary end time $T$; in particular beyond\ncollisions. We prove that $v_\\e$ converges to a piecewise constant function\n$v$, whose jump points in the spatial variable satisfy the ODE system which\nrepresents discrete dislocation dynamics with annihilation. Our proof method is\nto explicitly construct and patch together several sub- and supersolutions of\n$v_\\e$, and to show that they converge to the same limit $v$.\n', 'From the Peierls-Nabarro model to the equation of motion of the\n dislocation continuum We consider a semi-linear integro-differential equation in dimension one\nassociated to the half Laplacian %This model describes the evolution of phase\ntransitions associated to dislocations. whose solution represents the atom\ndislocation in a crystal. The equation comprises the evolutive version of the\nclassical Peierls-Nabarro model. We show that for a large number of\ndislocations, the solution, properly rescaled, converges to the solution of a\nwell known equation called by Head \\cite{H} ""the equation of motion of the\ndislocation continuum"". The limit equation is a model for the macroscopic\ncrystal plasticity with density of dislocations. In particular, we recover the\nso called Orowan\'s law which states that dislocations move at a velocity\nproportional to the effective stress.\n']","[('dislocations', 0.5610136389732361), ('dislocation', 0.5431692600250244), ('brittle materials', 0.3465258777141571), ('elasticity', 0.3296327590942383), ('elastic energy', 0.3262615501880646), ('threshold dynamics', 0.3251006007194519), ('grain boundaries', 0.31719139218330383), ('grain boundary', 0.3108021914958954), ('dynamics', 0.2997433543205261), ('strain gradient', 0.287410706281662)]" 418,418,72,418_compression distributed_communication compression_gradient compression_distributed optimization,"['compression distributed', 'communication compression', 'gradient compression', 'distributed optimization', 'efficient distributed learning', 'compressed communication', 'distributed training', 'bidirectional compression', 'distributed learning', 'distributed stochastic gradient']","['EF21: A New, Simpler, Theoretically Better, and Practically Faster Error\n Feedback Error feedback (EF), also known as error compensation, is an immensely\npopular convergence stabilization mechanism in the context of distributed\ntraining of supervised machine learning models enhanced by the use of\ncontractive communication compression mechanisms, such as Top-$k$. First\nproposed by Seide et al (2014) as a heuristic, EF resisted any theoretical\nunderstanding until recently [Stich et al., 2018, Alistarh et al., 2018].\nHowever, all existing analyses either i) apply to the single node setting only,\nii) rely on very strong and often unreasonable assumptions, such global\nboundedness of the gradients, or iterate-dependent assumptions that cannot be\nchecked a-priori and may not hold in practice, or iii) circumvent these issues\nvia the introduction of additional unbiased compressors, which increase the\ncommunication cost. In this work we fix all these deficiencies by proposing and\nanalyzing a new EF mechanism, which we call EF21, which consistently and\nsubstantially outperforms EF in practice. Our theoretical analysis relies on\nstandard assumptions only, works in the distributed heterogeneous data setting,\nand leads to better and more meaningful rates. In particular, we prove that\nEF21 enjoys a fast $O(1/T)$ convergence rate for smooth nonconvex problems,\nbeating the previous bound of $O(1/T^{2/3})$, which was shown a bounded\ngradients assumption. We further improve this to a fast linear rate for PL\nfunctions, which is the first linear convergence result for an EF-type method\nnot relying on unbiased compressors. Since EF has a large number of\napplications where it reigns supreme, we believe that our 2021 variant, EF21,\ncan a large impact on the practice of communication efficient distributed\nlearning.\n', ""EF-BV: A Unified Theory of Error Feedback and Variance Reduction\n Mechanisms for Biased and Unbiased Compression in Distributed Optimization In distributed or federated optimization and learning, communication between\nthe different computing units is often the bottleneck and gradient compression\nis widely used to reduce the number of bits sent within each communication\nround of iterative methods. There are two classes of compression operators and\nseparate algorithms making use of them. In the case of unbiased random\ncompressors with bounded variance (e.g., rand-k), the DIANA algorithm of\nMishchenko et al. (2019), which implements a variance reduction technique for\nhandling the variance introduced by compression, is the current state of the\nart. In the case of biased and contractive compressors (e.g., top-k), the EF21\nalgorithm of Richt\\'arik et al. (2021), which instead implements an\nerror-feedback mechanism, is the current state of the art. These two classes of\ncompression schemes and algorithms are distinct, with different analyses and\nproof techniques. In this paper, we unify them into a single framework and\npropose a new algorithm, recovering DIANA and EF21 as particular cases. Our\ngeneral approach works with a new, larger class of compressors, which has two\nparameters, the bias and the variance, and includes unbiased and biased\ncompressors as particular cases. This allows us to inherit the best of the two\nworlds: like EF21 and unlike DIANA, biased compressors, like top-k, whose good\nperformance in practice is recognized, can be used. And like DIANA and unlike\nEF21, independent randomness at the compressors allows to mitigate the effects\nof compression, with the convergence rate improving when the number of parallel\nworkers is large. This is the first time that an algorithm with all these\nfeatures is proposed. We prove its linear convergence under certain conditions.\nOur approach takes a step towards better understanding of two so-far distinct\nworlds of communication-efficient distributed learning.\n"", ""Error Compensated Distributed SGD Can Be Accelerated Gradient compression is a recent and increasingly popular technique for\nreducing the communication cost in distributed training of large-scale machine\nlearning models. In this work we focus on developing efficient distributed\nmethods that can work for any compressor satisfying a certain contraction\nproperty, which includes both unbiased (after appropriate scaling) and biased\ncompressors such as RandK and TopK. Applied naively, gradient compression\nintroduces errors that either slow down convergence or lead to divergence. A\npopular technique designed to tackle this issue is error compensation/error\nfeedback. Due to the difficulties associated with analyzing biased compressors,\nit is not known whether gradient compression with error compensation can be\ncombined with Nesterov's acceleration. In this work, we show for the first time\nthat error compensated gradient compression methods can be accelerated. In\nparticular, we propose and study the error compensated loopless Katyusha\nmethod, and establish an accelerated linear convergence rate under standard\nassumptions. We show through numerical experiments that the proposed method\nconverges with substantially fewer communication rounds than previous error\ncompensated algorithms.\n""]","[('compression distributed', 0.6065275073051453), ('communication compression', 0.6006171107292175), ('gradient compression', 0.5904747247695923), ('distributed optimization', 0.5803897976875305), ('efficient distributed learning', 0.5754527449607849), ('compressed communication', 0.561447262763977), ('distributed training', 0.556502640247345), ('bidirectional compression', 0.550220251083374), ('distributed learning', 0.5312035083770752), ('distributed stochastic gradient', 0.5283000469207764)]" 419,419,71,419_optimal controller_optimal regret_regret optimal_regret minimization,"['optimal controller', 'optimal regret', 'regret optimal', 'regret minimization', 'adaptive regret', 'robust regret', 'regret adaptive', 'dynamic regret', 'control linear time', 'estimation control']","['Regret-optimal measurement-feedback control We consider measurement-feedback control in linear dynamical systems from the\nperspective of regret minimization. Unlike most prior work in this area, we\nfocus on the problem of designing an online controller which competes with the\noptimal dynamic sequence of control actions selected in hindsight, instead of\nthe best controller in some specific class of controllers. This formulation of\nregret is attractive when the environment changes over time and no single\ncontroller achieves good performance over the entire time horizon. We show that\nin the measurement-feedback setting, unlike in the full-information setting,\nthere is no single offline controller which outperforms every other offline\ncontroller on every disturbance, and propose a new $H_2$-optimal offline\ncontroller as a benchmark for the online controller to compete against. We show\nthat the corresponding regret-optimal online controller can be found via a\nnovel reduction to the classical Nehari problem from robust control and present\na tight data-dependent bound on its regret.\n', 'Regret-Optimal LQR Control We consider the infinite-horizon LQR control problem. Motivated by\ncompetitive analysis in online learning, as a criterion for controller design\nwe introduce the dynamic regret, defined as the difference between the LQR cost\nof a causal controller (that has only access to past disturbances) and the LQR\ncost of the \\emph{unique} clairvoyant one (that has also access to future\ndisturbances) that is known to dominate all other controllers. The regret\nitself is a function of the disturbances, and we propose to find a causal\ncontroller that minimizes the worst-case regret over all bounded energy\ndisturbances. The resulting controller has the interpretation of guaranteeing\nthe smallest regret compared to the best non-causal controller that can see the\nfuture. We derive explicit formulas for the optimal regret and for the\nregret-optimal controller for the state-space setting. These explicit solutions\nare obtained by showing that the regret-optimal control problem can be reduced\nto a Nehari extension problem that can be solved explicitly. The regret-optimal\ncontroller is shown to be linear and can be expressed as the sum of the\nclassical $H_2$ state-feedback law and an $n$-th order controller ($n$ is the\nstate dimension), and its construction simply requires a solution to the\nstandard LQR Riccati equation and two Lyapunov equations. Simulations over a\nrange of plants demonstrate that the regret-optimal controller interpolates\nnicely between the $H_2$ and the $H_\\infty$ optimal controllers, and generally\nhas $H_2$ and $H_\\infty$ costs that are simultaneously close to their optimal\nvalues. The regret-optimal controller thus presents itself as a viable option\nfor control systems design.\n', 'Regret-optimal control in dynamic environments We consider control in linear time-varying dynamical systems from the\nperspective of regret minimization. Unlike most prior work in this area, we\nfocus on the problem of designing an online controller which minimizes regret\nagainst the best dynamic sequence of control actions selected in hindsight\n(dynamic regret), instead of the best fixed controller in some specific class\nof controllers (static regret). This formulation is attractive when the\nenvironment changes over time and no single controller achieves good\nperformance over the entire time horizon. We derive the state-space structure\nof the regret-optimal controller via a novel reduction to $H_{\\infty}$ control\nand present a tight data-dependent bound on its regret in terms of the energy\nof the disturbance. Our results easily extend to the model-predictive setting\nwhere the controller can anticipate future disturbances and to settings where\nthe controller only affects the system dynamics after a fixed delay. We present\nnumerical experiments which show that our regret-optimal controller\ninterpolates between the performance of the $H_2$-optimal and\n$H_{\\infty}$-optimal controllers across stochastic and adversarial\nenvironments.\n']","[('optimal controller', 0.6203005313873291), ('optimal regret', 0.604501485824585), ('regret optimal', 0.593945324420929), ('regret minimization', 0.5903175473213196), ('adaptive regret', 0.5822970271110535), ('robust regret', 0.5797488689422607), ('regret adaptive', 0.5696468353271484), ('dynamic regret', 0.5550806522369385), ('control linear time', 0.5237324237823486), ('estimation control', 0.5076760649681091)]" 420,420,71,420_arbitrary precision_precision algorithms_mixed precision algorithms_rounding error analysis,"['arbitrary precision', 'precision algorithms', 'mixed precision algorithms', 'rounding error analysis', 'precision floating point', 'precision arithmetic', 'floating point numbers', 'floating point arithmetic', 'mixed precision', 'probabilistic error bounds']","[""On Stochastic Rounding with Few Random Bits Large-scale numerical computations make increasing use of low-precision (LP)\nfloating point formats and mixed precision arithmetic, which can be enhanced by\nthe technique of stochastic rounding (SR), that is, rounding an intermediate\nhigh-precision value up or down randomly as a function of the value's distance\nto the two rounding candidates. Stochastic rounding requires, in addition to\nthe high-precision input value, a source of random bits. As the provision of\nhigh-quality random bits is an additional computational cost, it is of interest\nto require as few bits as possible while maintaining the desirable properties\nof SR in a given computation, or computational domain. This paper examines a\nnumber of possible implementations of few-bit stochastic rounding (FBSR), and\nshows how several natural implementations can introduce sometimes significant\nbias into the rounding process, which are not present in the case of\ninfinite-bit, infinite-precision examinations of these implementations. The\npaper explores the impact of these biases in machine learning examples, and\nhence opens another class of configuration parameters of which practitioners\nshould be aware when developing or adopting low-precision floating point. Code\nis available at\nhttp://github.com/graphcore-research/arith25-stochastic-rounding.\n"", 'Numerical Fuzz: A Type System for Rounding Error Analysis Algorithms operating on real numbers are implemented as floating-point\ncomputations in practice, but floating-point operations introduce roundoff\nerrors that can degrade the accuracy of the result. We propose $\\Lambda_{num}$,\na functional programming language with a type system that can express\nquantitative bounds on roundoff error. Our type system combines a sensitivity\nanalysis, enforced through a linear typing discipline, with a novel graded\nmonad to track the accumulation of roundoff errors. We prove that our type\nsystem is sound by relating the denotational semantics of our language to the\nexact and floating-point operational semantics. To demonstrate our system, we\ninstantiate $\\Lambda_{num}$ with error metrics proposed in the numerical\nanalysis literature and we show how to incorporate rounding operations that\nfaithfully model aspects of the IEEE 754 floating-point standard. To show that\n$\\Lambda_{num}$ can be a useful tool for automated error analysis, we develop a\nprototype implementation for $\\Lambda_{num}$ that infers error bounds that are\ncompetitive with existing tools, while often running significantly faster.\nFinally, we consider semantic extensions of our graded monad to bound error\nunder more complex rounding behaviors, such as non-deterministic and randomized\nrounding.\n', ""Probabilistic Error Analysis For Sequential Summation of Real Floating\n Point Numbers We derive two probabilistic bounds for the relative forward error in the\nfloating point summation of $n$ real numbers, by representing the roundoffs as\nindependent, zero-mean, bounded random variables. The first probabilistic bound\nis based on Azuma's concentration inequality, and the second on the\nAzuma-Hoeffding Martingale. Our numerical experiments illustrate that the\nprobabilistic bounds, with a stringent failure probability of $10^{-16}$, can\nbe 1-2 orders of magnitude tighter than deterministic bounds. We performed the\nnumerical experiments in Julia by summing up to $n=10^7$ single precision\n(binary32) floating point numbers, and up to $n=10^4$ half precision (binary16)\nfloating point numbers. We simulated exact computation with double precision\n(binary64). The bounds tend to be tighter when all summands have the same sign.\n""]","[('arbitrary precision', 0.6567695140838623), ('precision algorithms', 0.6379656791687012), ('mixed precision algorithms', 0.6303492784500122), ('rounding error analysis', 0.6251690983772278), ('precision floating point', 0.621599018573761), ('precision arithmetic', 0.5878729224205017), ('floating point numbers', 0.5838916897773743), ('floating point arithmetic', 0.5751509666442871), ('mixed precision', 0.5403457880020142), ('probabilistic error bounds', 0.5361748337745667)]" 421,421,71,421_abelian lie groups_abelian lie group_abelian lie algebra_abelian lie,"['abelian lie groups', 'abelian lie group', 'abelian lie algebra', 'abelian lie', 'almost abelian lie', 'lie groups', 'structures lie groups', 'solvable lie groups', 'compact lie groups', 'lie algebras']","['Harmonic almost complex structures on almost abelian Lie groups and\n solvmanifolds An almost abelian Lie group is a solvable Lie group with a codimension-one\nnormal abelian subgroup. We characterize almost Hermitian structures on almost\nabelian Lie groups where the almost complex structure is harmonic with respect\nto the Hermitian metric. Also, we adapt the Gray-Hervella classification of\nalmost Hermitian structures to the family of almost abelian Lie groups. We\nprovide several examples of harmonic almost complex structures in different\nGray-Hervella classes on some associated compact almost abelian solvmanifolds.\n', 'Balanced Hermitian structures on almost abelian Lie algebras We study balanced Hermitian structures on almost abelian Lie algebras, i.e.\non Lie algebras with a codimension-one abelian ideal. In particular, we\nclassify six-dimensional almost abelian Lie algebras which carry a balanced\nstructure. It has been conjectured by A. Fino and L. Vezzoni that a compact\ncomplex manifold admitting both a balanced metric and a SKT metric necessarily\nhas a K\\""ahler metric: we prove this conjecture for compact almost abelian\nsolvmanifolds with left-invariant complex structures. Moreover, we investigate\nthe behaviour of the flow of balanced metrics introduced by L. Bedulli and L.\nVezzoni and of the anomaly flow by D. H. Phong, S. Picard and X. Zhang on\nalmost abelian Lie groups. In particular, we show that the anomaly flow\npreserves the balanced condition and that locally conformally K\\""ahler metrics\nare fixed points.\n', 'Generalized K\\""ahler almost abelian Lie groups We study left-invariant generalized K\\""ahler structures on almost abelian Lie\ngroups, i.e., on solvable Lie groups with a codimension-one abelian normal\nsubgroup. In particular, we classify six-dimensional almost abelian Lie groups\nwhich admit a left-invariant complex structure and establish which of those\nhave a left-invariant Hermitian structure whose fundamental 2-form is $\\partial\n\\bar \\partial$-closed. We obtain a classification of six-dimensional\ngeneralized K\\""ahler almost abelian Lie groups and determine the 6-dimensional\ncompact almost abelian solvmanifolds admitting an invariant generalized\nK\\""ahler structure. Moreover, we prove some results in relation to the\nexistence of holomorphic Poisson structures and to the pluriclosed flow.\n']","[('abelian lie groups', 0.7529777884483337), ('abelian lie group', 0.7300997376441956), ('abelian lie algebra', 0.7291752099990845), ('abelian lie', 0.6729624271392822), ('almost abelian lie', 0.6698938012123108), ('lie groups', 0.6172395944595337), ('structures lie groups', 0.6051972508430481), ('solvable lie groups', 0.5894522070884705), ('compact lie groups', 0.5880084037780762), ('lie algebras', 0.5661044716835022)]" 422,422,71,422_discontinuous galerkin methods_galerkin methods_based discontinuous galerkin_discontinuous galerkin,"['discontinuous galerkin methods', 'galerkin methods', 'based discontinuous galerkin', 'discontinuous galerkin', 'finite difference methods', 'discontinuous galerkin dg', 'hybridizable discontinuous galerkin', 'discontinuous galerkin time', 'finite volume methods', 'galerkin']","['An energy-based summation-by-parts finite difference method for the wave\n equation in second order form We develop a new finite difference method for the wave equation in second\norder form. The finite difference operators satisfy a summation-by-parts (SBP)\nproperty. With boundary conditions and material interface conditions imposed\nweakly by the simultaneous-approximation-term (SAT) method, we derive energy\nestimates for the semi-discretization. In addition, error estimates are derived\nby the normal mode analysis. The proposed method is termed as energy-based\nbecause of its similarity with the energy-based discontinuous Galerkin method.\nWhen imposing the Dirichlet boundary condition and material interface\nconditions, the traditional SBP-SAT discretization uses a penalty term with a\nmesh-dependent parameter, which is not needed in our method. Furthermore,\nnumerical dissipation can be added to the discretization through the boundary\nand interface conditions. We present numerical experiments that verify\nconvergence and robustness of the proposed method.\n', 'Upwind summation by parts finite difference methods for large scale\n elastic wave simulations in 3D complex geometries High-order accurate summation-by-parts (SBP) finite difference (FD) methods\nconstitute efficient numerical methods for simulating large-scale hyperbolic\nwave propagation problems. Traditional SBP FD operators that approximate\nfirst-order spatial derivatives with central-difference stencils often have\nspurious unresolved numerical wave-modes in their computed solutions. Recently\nderived high order accurate upwind SBP operators based upwind FD stencils have\nthe potential to suppress these poisonous spurious wave-modes on marginally\nresolved computational grids. In this paper, we demonstrate that not all high\norder upwind SBP FD operators are applicable. Numerical dispersion relation\nanalysis shows that odd-order upwind SBP FD operators also support spurious\nunresolved high-frequencies on marginally resolved meshes. Meanwhile,\neven-order upwind SBP FD operators (of order 2, 4, 6) do not support spurious\nunresolved high frequency wave modes and also have better numerical dispersion\nproperties. We discretise the three space dimensional (3D) elastic wave\nequation on boundary-conforming curvilinear meshes. Using the energy method we\nprove that the semi-discrete approximation is stable and energy-conserving. We\nderive a priori error estimate and prove the convergence of the numerical\nerror. Numerical experiments for the 3D elastic wave equation in complex\ngeometries corroborate the theoretical analysis. Numerical simulations of the\n3D elastic wave equation in heterogeneous media with complex non-planar free\nsurface topography are given, including numerical simulations of community\ndeveloped seismological benchmark problems. Computational results show that\neven-order upwind SBP FD operators are more efficient, robust and less prone to\nnumerical dispersion errors on marginally resolved meshes when compared to the\nodd-order upwind and traditional SBP FD operators.\n', 'A finite difference - discontinuous Galerkin method for the wave\n equation in second order form We develop a hybrid spatial discretization for the wave equation in second\norder form, based on high-order accurate finite difference methods and\ndiscontinuous Galerkin methods. The hybridization combines computational\nefficiency of finite difference methods on Cartesian grids and geometrical\nflexibility of discontinuous Galerkin methods on unstructured meshes. The two\nspatial discretizations are coupled by a penalty technique at the interface\nsuch that the overall semidiscretization satisfies a discrete energy estimate\nto ensure stability. In addition, optimal convergence is obtained in the sense\nthat when combining a fourth order finite difference method with a\ndiscontinuous Galerkin method using third order local polynomials, the overall\nconvergence rate is fourth order. Furthermore, we use a novel approach to\nderive an error estimate for the semidiscretization by combining the energy\nmethod and the normal mode analysis for a corresponding one dimensional model\nproblem. The stability and accuracy analysis are verified in numerical\nexperiments.\n']","[('discontinuous galerkin methods', 0.7233380079269409), ('galerkin methods', 0.6489315032958984), ('based discontinuous galerkin', 0.6344971656799316), ('discontinuous galerkin', 0.5778234601020813), ('finite difference methods', 0.5723057389259338), ('discontinuous galerkin dg', 0.5508369207382202), ('hybridizable discontinuous galerkin', 0.5465832352638245), ('discontinuous galerkin time', 0.5062845349311829), ('finite volume methods', 0.4712658226490021), ('galerkin', 0.4619188606739044)]" 423,423,71,423_stable phase retrieval_phase retrieval via_retrieval phase retrieval_phase retrieval,"['stable phase retrieval', 'phase retrieval via', 'retrieval phase retrieval', 'phase retrieval', 'phase retrieval problems', 'phase retrieval phase', 'retrieval phase', 'dimensional phase', 'one dimensional phase', 'dual frames']","['Classifying weak phase retrieval We will give several surprising equivalences and consequences of weak phase\nretrieval. These results give a complete understanding of the difference\nbetween weak phase retrieval and phase retrieval. We also answer two\nlongstanding open problems on weak phase retrieval: (1) We show that the\nfamilies of weak phase retrievable frames $\\{x_{i}\\}_{i=1}^{m}$ in\n$\\mathbb{R}^n$ are not dense in the family of $m$-element sets of vectors in\n$\\mathbb{R}^n$ for all $m\\ge 2n-2$; (2) We show that any frame\n$\\{x_i\\}_{i=1}^{2n-2}$ containing one or more canonical basis vectors in\n$\\mathbb{R}^n$ cannot do weak phase retrieval. We provide numerous examples to\nshow that the obtained results are best possible.\n', 'Characterization of (weak) phase retrieval dual frames Recovering a signal up to a unimodular constant from the magnitudes of linear\nmeasurements has been popular and well studied in recent years. However,\nnumerous unsolved problems regarding phase retrieval still exist. Given a phase\nretrieval frame, may the family of phase retrieval dual frames be classified?\nAnd is such a family dense in the set of dual frames? Can we present the\nequivalent conditions for a family of vectors to do weak phase retrieval in\ncomplex Hilbert space case? What is the connection between phase, weak phase\nand norm retrieval? In this context, we aim to deal with these open problems\nconcerning phase retrieval dual frames, weak phase retrieval frames, and\nspecially investigate equivalent conditions for identifying these features. We\nprovide some characterizations of alternate dual frames of a phase retrieval\nframe which yield phase retrieval in finite dimensional Hilbert spaces.\nMoreover, for some classes of frames, we show that the family of phase\nretrieval dual frames is open and dense in the set of dual frames.\n Then, we study weak phase retrieval problem. Among other things, we obtain\nsome equivalent conditions on a family of vectors to do phase retrieval in\nterms of weak phase retrieval.\n', 'A note on (weak) phase and norm retrievable Real Hilbert space frames\n and projections \\begin{abstract} In this manuscript, we answer a list of longstanding open\nproblems on weak phase retrieval including: (1) A complete classification of\nthe vectors $\\{x_i\\}_{i=1}^2$ in $\\RR^3$ that do weak phase retrieval; (2) We\nshow that frames doing weak phase retrieval in $\\RR^n$ must span $\\RR^n$; (3)\nWe give an example of a set of vectors doing phase retrieval but their\northogonal complement hyperplanes fail weak phase retrieval; (4) We give a\nclassification of weak phase retrievable frames - which makes clear the\ndifference between phase retrieval and weak phase retrieval; (5) We classify\nwhen weak phase retrievable frames also do norm retrieval. We then introduce\nthe notion of weak phase retrieval by projections and develop their basic\nproperties. We then look at phase (norm) retrieval by projections. We end with\nsome open problems.\n We provide numerous examples to show that our results are best possible.\n\\end{abstract}\n']","[('stable phase retrieval', 0.707198441028595), ('phase retrieval via', 0.6783788204193115), ('retrieval phase retrieval', 0.6639207005500793), ('phase retrieval', 0.6579474806785583), ('phase retrieval problems', 0.6133785247802734), ('phase retrieval phase', 0.5945379137992859), ('retrieval phase', 0.5222489237785339), ('dimensional phase', 0.4465582072734833), ('one dimensional phase', 0.421712189912796), ('dual frames', 0.3726435601711273)]" 424,424,71,424_fourier restriction estimates_restriction estimates_restriction estimate_fourier restriction theory,"['fourier restriction estimates', 'restriction estimates', 'restriction estimate', 'fourier restriction theory', 'estimates hyperbolic', 'fourier restriction', 'bilinear restriction', 'paraboloids', 'restriction extension', 'decoupling estimates']","['On decoupling and restriction estimates In this short note, we prove that the restriction conjecture for the\n(hyperbolic) paraboloid in $\\mathbb{R}^d$ implies the $l^p$-decoupling theorem\nfor the (hyperbolic) paraboloid in $\\mathbb{R}^{2d-1}$. In particular, this\ngives a simple proof of the $l^p$ decoupling theorem for the (hyperbolic)\nparaboloid in $\\mathbb{R}^3$.\n', 'An endpoint estimate of the bilinear paraboloid restriction operator In Fourier restriction problems, a cone and a paraboloid are model surfaces.\nThe sharp bilinear cone restriction estimate was first shown by Wolff, and\nlater the endpoint was obtained by Tao. For a paraboloid, the sharp $L^2$\nbilinear restriction estimate was obtained by Tao, but the endpoint was\nremained open. In this paper we prove the endpoint $L^2$ bilinear restriction\nestimate for a paraboloid.\n', 'Restriction and decoupling estimates for the hyperbolic paraboloid in $\\mathbb{R}^3$ We prove bilinear $\\ell^2$-decoupling and refined bilinear decoupling inequalities for the truncated hyperbolic paraboloid in $\\mathbb{R}^3$. As an application, we prove the associated restriction estimate in the range $p>22/7$, matching an earlier result for the elliptic paraboloid.']","[('fourier restriction estimates', 0.5777525901794434), ('restriction estimates', 0.5252439379692078), ('restriction estimate', 0.49860477447509766), ('fourier restriction theory', 0.4933471083641052), ('estimates hyperbolic', 0.47609299421310425), ('fourier restriction', 0.45049962401390076), ('bilinear restriction', 0.4213803708553314), ('paraboloids', 0.37997663021087646), ('restriction extension', 0.3775838315486908), ('decoupling estimates', 0.3767317533493042)]" 425,425,71,425_entropy information_shannon entropy_entropy shannon_generalized entropy,"['entropy information', 'shannon entropy', 'entropy shannon', 'generalized entropy', 'entropy measures', 'entropy measure', 'information theoretic', 'entropy relative entropy', 'conditional entropy', 'relative entropy']","['Introduction to Logical Entropy and its Relationship to Shannon Entropy We live in the information age. Claude Shannon, as the father of the\ninformation age, gave us a theory of communications that quantified an ""amount\nof information,"" but, as he pointed out, ""no concept of information itself was\ndefined."" Logical entropy provides that definition. Logical entropy is the\nnatural measure of the notion of information based on distinctions,\ndifferences, distinguishability, and diversity. It is the (normalized)\nquantitative measure of the distinctions of a partition on a set--just as the\nBoole-Laplace logical probability is the normalized quantitative measure of the\nelements of a subset of a set. And partitions and subsets are mathematically\ndual concepts--so the logic of partitions is dual in that sense to the usual\nBoolean logic of subsets, and hence the name ""logical entropy."" The logical\nentropy of a partition has a simple interpretation as the probability that a\ndistinction or dit (elements in different blocks) is obtained in two\nindependent draws from the underlying set. The Shannon entropy is shown to also\nbe based on this notion of information-as-distinctions; it is the average\nminimum number of binary partitions (bits) that need to be joined to make all\nthe same distinctions of the given partition. Hence all the concepts of simple,\njoint, conditional, and mutual logical entropy can be transformed into the\ncorresponding concepts of Shannon entropy by a uniform non-linear dit-bit\ntransform. And finally logical entropy linearizes naturally to the\ncorresponding quantum concept. The quantum logical entropy of an observable\napplied to a state is the probability that two different eigenvalues are\nobtained in two independent projective measurements of that observable on that\nstate.\n Keywords: logical entropy, Shannon entropy, partitions, MaxEntropy, quantum\nlogical entropy, von Neumann entropy\n', ""Information Decomposition Diagrams Applied beyond Shannon Entropy: A\n Generalization of Hu's Theorem In information theory, one major goal is to find useful functions that\nsummarize the amount of information contained in the interaction of several\nrandom variables. Specifically, one can ask how the classical Shannon entropy,\nmutual information, and higher interaction information relate to each other.\nThis is answered by Hu's theorem, which is widely known in the form of\ninformation diagrams: it relates shapes in a Venn diagram to information\nfunctions, thus establishing a bridge from set theory to information theory. In\nthis work, we view random variables together with the joint operation as a\nmonoid that acts by conditioning on information functions, and entropy as a\nfunction satisfying the chain rule of information. This abstract viewpoint\nallows to prove a generalization of Hu's theorem. It applies to Shannon and\nTsallis entropy, (Tsallis) Kullback-Leibler Divergence, cross-entropy,\nKolmogorov complexity, submodular information functions, and the generalization\nerror in machine learning. Our result implies for Chaitin's Kolmogorov\ncomplexity that the interaction complexities of all degrees are in expectation\nclose to Shannon interaction information. For well-behaved probability\ndistributions on increasing sequence lengths, this shows that the per-bit\nexpected interaction complexity and information asymptotically coincide, thus\nshowing a strong bridge between algorithmic and classical information theory.\n"", ""Learn your entropy from informative data: an axiom ensuring the\n consistent identification of generalized entropies Shannon entropy, a cornerstone of information theory, statistical physics and\ninference methods, is uniquely identified by the Shannon-Khinchin or\nShore-Johnson axioms. Generalizations of Shannon entropy, motivated by the\nstudy of non-extensive or non-ergodic systems, relax some of these axioms and\nlead to entropy families indexed by certain `entropic' parameters. In general,\nthe selection of these parameters requires pre-knowledge of the system or\nencounters inconsistencies. Here we introduce a simple axiom for any entropy\nfamily: namely, that no entropic parameter can be inferred from a completely\nuninformative (uniform) probability distribution. When applied to the\nUffink-Jizba-Korbel and Hanel-Thurner entropies, the axiom selects only R\\'enyi\nentropy as viable. It also extends consistency with the Maximum Likelihood\nprinciple, which can then be generalized to estimate the entropic parameter\npurely from data, as we confirm numerically. Remarkably, in a generalized\nmaximum-entropy framework the axiom implies that the maximized log-likelihood\nalways equals minus Shannon entropy, even if the inferred probability\ndistribution maximizes a generalized entropy and not Shannon's, solving a\nseries of problems encountered in previous approaches.\n""]","[('entropy information', 0.794343888759613), ('shannon entropy', 0.7100279927253723), ('entropy shannon', 0.7048062086105347), ('generalized entropy', 0.695746898651123), ('entropy measures', 0.6811944246292114), ('entropy measure', 0.6766042709350586), ('information theoretic', 0.6656215786933899), ('entropy relative entropy', 0.6447096467018127), ('conditional entropy', 0.6339763402938843), ('relative entropy', 0.6302649974822998)]" 426,426,70,426_fuzzy numbers_fuzzy theory_fuzzy sets_triangular fuzzy numbers,"['fuzzy numbers', 'fuzzy theory', 'fuzzy sets', 'triangular fuzzy numbers', 'fuzzy inference', 'based fuzzy', 'type fuzzy', 'fuzzy measures', 'intuitionistic fuzzy', 'fuzzy']","['Properties of f correlated fuzzy numbers This paper presents some concepts of the theory of interactive fuzzy numbers,\nand mainly, a class of interactive fuzzy numbers, called $f$-correlated fuzzy\nnumbers. We start from the foundations of general fuzzy mathematics and go\nthrough operations and the notion of interactivity for fuzzy numbers. The main\nresult is that $f$-correlation preserve the shape of certains fuzzy numbers.\nMore specificaly, if two fuzzy numbers are $f$ correlated, and one is a LR-type\nfuzzy number, the other is also a LR-type fuzzy number. This paper also\npresents some operations with the $f$-correlated fuzzy numbers wich are\ninteresting to applications like biomathematics.\n', 'Fuzzy Calculus with Noval Approach Using Fuzzy Functions This article deals with the complexity involved in fuzzy derivatives when\nboth input and output are from nonempty, convex, and compact fuzzy space.\nConsider a fuzzy valued mapping, and for fuzzy differentiation of fuzzy valued\nfunction, we propose Modified Hukuhara derivative. To evaluate this derivative,\nwe need to take the parametric form of, input and the mapping which is involved\nin it. Our definition gives a more realistic explanation of fuzzy derivatives,\nunder this derivative, we also develop fuzzy Taylor series along with its\nconvergence. Lastly, we solve a fully fuzzy differential equation with initial\ncondition using Fuzzy Taylor series.\n', 'A study on fuzzy plane and its application on fuzzy plane fitting In this paper, I obtain an $S$-type fuzzy point when two fuzzy numbers for\ntwo independent variables and a corresponding fuzzy number for the dependent\nvariable are given. A comprehensive study on a conceptualization of a fuzzy\nplane as a collection of fuzzy numbers, or fuzzy points is proposed. A\nperpendicular fuzzy distance from a fuzzy point to a fuzzy plane is also\nrevisited. An application of the proposed fuzzy plane is made to fit a fuzzy\nplane to the available data sets of imprecise locations in $\\mathbb{R}^3$.\nMoreover, a degree of fuzzily fitted fuzzy plane to the given data sets of\nfuzzy points is defined. All the fuzzy geometric construction and\ncharacteristics of fuzzy planes are explored with the help of same and inverse\npoints ideas. All the study is supported by numerical examples and illustrated\nby fuzzy geometrical figures. This study provides a framework for developing a\nfuzzy plane-fitting model that will benefit the fields of curve detecting and\nfitting, image processing for industrial and scientific applications, signal\nprocessing, and problems of shape recognition.\n']","[('fuzzy numbers', 0.756867527961731), ('fuzzy theory', 0.7021488547325134), ('fuzzy sets', 0.6816055178642273), ('triangular fuzzy numbers', 0.6587856411933899), ('fuzzy inference', 0.6461561918258667), ('based fuzzy', 0.6455037593841553), ('type fuzzy', 0.6314517855644226), ('fuzzy measures', 0.6264473795890808), ('intuitionistic fuzzy', 0.6138861775398254), ('fuzzy', 0.5884905457496643)]" 427,427,70,427_general relativity_gravity theories_theories gravity_einstein gravity,"['general relativity', 'gravity theories', 'theories gravity', 'einstein gravity', 'theory gravity', 'teleparallel gravity', 'flat spacetime', 'gravity models', 'modified gravity', 'gravitational field']","['Is spacetime curved? Assessing the underdetermination of general\n relativity and teleparallel gravity Realism about general relativity (GR) seems to imply realism about spacetime\ncurvature. The existence of the teleparallel equivalent of general relativity\n(TEGR) calls this into question, for (a) TEGR is set in a torsionful but flat\nspacetime, and (b) TEGR is empirically equivalent to GR. Knox (2011) claims\nthat there is no genuine underdetermination between GR and TEGR; we call this\nverdict into question by isolating and addressing her individual arguments. In\naddition, we anticipate and evaluate two further worries for realism about the\ntorsionful spacetimes of TEGR, which we call the ""problem of\noperationalisability"" and the ""problem of visualisability"".\n', ""Wald's entropy in Coincident General Relativity The equivalence principle and its universality enables the geometrical\nformulation of gravity. In the standard formulation of General Relativity \\'a\nla Einstein, the gravitational interaction is geometrized in terms of the\nspacetime curvature. However, if we embrace the geometrical character of\ngravity, two alternative, though equivalent, formulations of General Relativity\nemerge in flat spacetimes, in which gravity is fully ascribed either to torsion\nor to non-metricity. The latter allows a much simpler formulation of General\nRelativity oblivious to the affine spacetime structure, the Coincident General\nRelativity. The entropy of a black hole can be computed using the Euclidean\npath integral approach, which strongly relies on the addition of boundary or\nregulating terms in the standard formulation of General Relativity. A more\nfundamental derivation can be performed using Wald's formula, in which the\nentropy is directly related to Noether charges and is applicable to general\ntheories with diffeomorphism invariance. In this work we extend Wald's Noether\ncharge method for calculating black hole entropy to spacetimes endowed with\nnon-metricity. Using this method, we show that Coincident General Relativity\nwith an improved action principle gives the same entropy as the well-known\nentropy in standard General Relativity. Furthermore the first law of black hole\nthermodynamics holds and an explicit expression for the energy appearing in the\nfirst law is obtained.\n"", ""A Unified Approach to Geometric Modifications of Gravity This thesis studies modified theories of gravity from a geometric viewpoint.\nWe review the motivations for considering alternatives to General Relativity\nand cover the mathematical foundations of gravitational theories in Riemannian\nand non-Riemannian geometries. Then, starting from the decomposition of the\nEinstein-Hilbert action into bulk and boundary terms, we construct new\nmodifications of General Relativity. These modifications break diffeomorphism\ninvariance or local Lorentz invariance, allowing one to bypass Lovelock's\ntheorem while remaining second-order and without introducing additional fields.\nIn the metric-affine framework, we introduce a new Einstein-Cartan-type theory\nwith propagating torsion. Important comparisons are made with the modified\nteleparallel theories, and we construct a unified framework encompassing all\nthese theories. The equivalence between theories that break fundamental\nsymmetries in the Riemannian setting and non-Riemannian theories of gravity is\nexplored in detail. This leads to a dual interpretation of teleparallel\ngravity, one in terms of geometric quantities and the other in terms of\nnon-covariant objects. We then study the cosmological applications of these\nmodified theories, making use of dynamical systems techniques. One key result\nis that the modified Einstein-Cartan theories can drive inflation in the early\nuniverse, replacing the initial cosmological singularity of General Relativity.\nTo conclude, we discuss the viability of these modifications and possible\nfuture directions, examining their significance and relevance to the broader\nfield of gravitational physics.\n""]","[('general relativity', 0.6620340347290039), ('gravity theories', 0.6008008718490601), ('theories gravity', 0.5941246747970581), ('einstein gravity', 0.5847780704498291), ('theory gravity', 0.5606460571289062), ('teleparallel gravity', 0.5460583567619324), ('flat spacetime', 0.5382315516471863), ('gravity models', 0.5365902781486511), ('modified gravity', 0.5162702798843384), ('gravitational field', 0.5132985711097717)]" 428,428,70,428_stochastic quantization_stochastic pdes_quantum field theory_parabolic stochastic,"['stochastic quantization', 'stochastic pdes', 'quantum field theory', 'parabolic stochastic', 'singular stochastic', 'quantum fields', 'singular stochastic partial', 'quantum field', 'quantization', 'stochastic partial differential']","['A stochastic PDE approach to large N problems in quantum field theory: a\n survey In this survey we review some recent rigorous results on large N problems in\nquantum field theory, stochastic quantization and singular stochastic PDEs, and\ntheir mean field limit problems. In particular we discuss the O(N) linear sigma\nmodel on two and three dimensional torus. The stochastic quantization procedure\nleads to a coupled system of N interacting $\\Phi^4$ equations. In d = 2, we\nshow uniform in N bounds for the dynamics and convergence to a mean-field\nsingular SPDE. For large enough mass or small enough coupling, the invariant\nmeasures (i.e. the O(N) linear sigma model) converge to the massive Gaussian\nfree field, the unique invariant measure of the mean-field dynamics, in a\nWasserstein distance. We also obtain tightness for certain O(N) invariant\nobservables as random fields in suitable Besov spaces as $N\\to \\infty$, along\nwith exact descriptions of the limiting correlations. In d = 3, the estimates\nbecome more involved since the equation is more singular. We discuss in this\ncase how to prove convergence to the massive Gaussian free field. The proofs of\nthese results build on the recent progress of singular SPDE theory and combine\nmany new techniques such as uniform in N estimates and dynamical mean field\ntheory. These are based on joint papers with Scott Smith, Rongchan Zhu and\nXiangchan Zhu.\n', ""Stochastic quantization associated with the $\\exp(\\Phi)_2$-quantum field\n model driven by space-time white noise on the torus We consider a quantum field model with exponential interactions on the\ntwo-dimensional torus, which is called the $\\exp (\\Phi)_{2}$-quantum field\nmodel or H{\\o}egh-Krohn's model. In the present paper, we study the stochastic\nquantization of this model by singular stochastic partial differential\nequations, which is recently developed. By the method, we construct a unique\ntime-global solution and the invariant probability measure of the corresponding\nstochastic quantization equation, and identify with an infinite-dimensional\ndiffusion process, which has been constructed by the Dirichlet form approach.\n"", 'A simple construction of the sine-Gordon model via stochastic\n quantization We present a simple PDE construction of the sine-Gordon measure below the\nfirst threshold ($\\be^2 < 4\\pi$), in both the finite and infinite volume\nsettings, by studying the corresponding parabolic sine-Gordon model. We also\nestablish pathwise global well-posedness of the hyperbolic sine-Gordon model in\nfinite volume for $\\be^2 < 2\\pi$.\n']","[('stochastic quantization', 0.6170191168785095), ('stochastic pdes', 0.5428388714790344), ('quantum field theory', 0.5200030207633972), ('parabolic stochastic', 0.5044676065444946), ('singular stochastic', 0.4915240705013275), ('quantum fields', 0.48142120242118835), ('singular stochastic partial', 0.4711681306362152), ('quantum field', 0.461696982383728), ('quantization', 0.45796826481819153), ('stochastic partial differential', 0.4522290527820587)]" 429,429,70,429_hochschild cohomology_hochschild cohomology groups_first hochschild cohomology_hochschild homology,"['hochschild cohomology', 'hochschild cohomology groups', 'first hochschild cohomology', 'hochschild homology', 'gerstenhaber algebra structure', 'cohomology coefficients', 'cohomology twisted', 'cohomology symmetric', 'classical cohomology', 'gerstenhaber algebra']","['On the first relative Hochschild cohomology and contracted fundamental\n group In this paper we investigate the Lie algebra structure of the first relative\nHochschild cohomology and its relation with the relative notion of fundamental\ngroup. Let $A,B$ be finite-dimensional basic $k$-algebras over an algebraically\nclosed field of characteristic zero, such that $Q_B$ is a subquiver of $Q_A$.\nWe show that if the complement of $Q_A$ by the arrows of $Q_B$ is a simple\ndirected graph, then the first relative Hochschild cohomology\n$\\text{HH}^1(A|B)$ is a solvable Lie algebra. We also compute the Lie algebra\nstructure of the first relative Hochschild cohomology for radical square zero\nalgebras and for dual extension algebras of directed monomial algebras.\nFinally, we introduce the notion of fundamental group for a pair of an algebra\n$A$ and a subalgebra $B$ and we construct the relative version of the map from\nthe dual fundamental group into the first Hochschild cohomology.\n', 'Hochschild cohomology of twisted tensor products For a tensor product of algebras twisted by a bicharacter, we completely\ndescribe its Hochschild cohomology, as a Gerstenhaber algebra, in terms of the\nHochschild cohomology of its component parts. This description generalizes a\nresult of Bergh and Oppermann. It allows us to significantly simplify various\ncalculations in the literature, and to compute Hochschild cohomology for a\nnumber of new examples.\n', 'Traces, Schubert calculus, and Hochschild cohomology of category\n $\\mathcal{O}$ We discuss how the Hochschild cohomology of a dg category can be computed as\nthe trace of its Serre functor. Applying this approach to the principal block\nof the Bernstein--Gelfand--Gelfand category $\\mathcal{O}$, we obtain its\nHochschild cohomology as the compactly supported cohomology of an associated\nspace. Equivalently, writing $\\mathcal{O}$ as modules over the endomorphism\nalgebra $A$ of a minimal projective generator, this is the Hochschild\ncohomology of $A$. In particular our computation gives the Euler characteristic\nof the Hochschild cohomology of $\\mathcal{O}$ in type A.\n']","[('hochschild cohomology', 0.7434208989143372), ('hochschild cohomology groups', 0.7255613207817078), ('first hochschild cohomology', 0.7159214019775391), ('hochschild homology', 0.6983351707458496), ('gerstenhaber algebra structure', 0.6206328272819519), ('cohomology coefficients', 0.5811200141906738), ('cohomology twisted', 0.5673642754554749), ('cohomology symmetric', 0.565127432346344), ('classical cohomology', 0.5603671073913574), ('gerstenhaber algebra', 0.5598496198654175)]" 430,430,70,430_convergence fourier series_convergence fourier_convergence summability_approximations fourier,"['convergence fourier series', 'convergence fourier', 'convergence summability', 'approximations fourier', 'fourier series', 'summability methods', 'summability', 'almost everywhere convergence', 'integrable functions', 'everywhere convergence']","['Lebesgue and Vilenkin-Lebesgue points and a. e. Convergence of N\\""orlund\n means with respect to Vilenkin systems of integrable functions In this paper we derive converge of N\\""orlund means of Vilenkin-Fourier\nseries with monotone coefficients of integrable functions in Lebesgue and\nVilinkin-Lebesgue points. Moreover, we discuss pointwise and norm convergence\nin $L_p$ norms of such N\\""orlund means.\n', 'Convergence and Strong Summability of the Two-dimensional\n Vilenkin-Fourier Series In this paper we investigate convergence and strong summability of the\ntwo-dimensional Vilenkin-Fourier series in the martingale Hardy spaces.\n', 'On the almost everywhere and norm convergences of N\\""orlund means with\n respect to Vilenkin systems Unlike the classical theory of Fourier series which deals with decomposition\nof a function into sinusoidal waves the Vilenkin (Walsh) functions are\nrectangular waves. The development of the theory of Vilenkin-Fourier series has\nbeen strongly influenced by the classical theory of trigonometric series but\nthere are a lot of differences also. The aim of my master thesis is to discuss,\ndevelop and apply the newest developments of this fascinating theory connected\nto modern harmonic analysis. In particular, we investigate N\\""orlund means but\nonly in the case when their coefficients are monotone and prove convergence in\nLebesgue and Vilenkin-Lebesgue points. Since almost everywhere points are\nLebesgue and Vilenkin-Lebesgue points for any integrable functions we obtain\nalmost everywhere convergence of such summability methods.\n']","[('convergence fourier series', 0.556429386138916), ('convergence fourier', 0.5309114456176758), ('convergence summability', 0.5266607999801636), ('approximations fourier', 0.49333474040031433), ('fourier series', 0.45677655935287476), ('summability methods', 0.44128987193107605), ('summability', 0.4384327530860901), ('almost everywhere convergence', 0.42663079500198364), ('integrable functions', 0.42606398463249207), ('everywhere convergence', 0.4040256142616272)]" 431,431,70,431_symplectic manifolds_symplectic manifold_symplectic geometry_canonical symplectic,"['symplectic manifolds', 'symplectic manifold', 'symplectic geometry', 'canonical symplectic', 'symplectic reduction', 'symplectic structure', 'symplectic actions', 'reduction symplectic', 'actions symplectic', 'structure symplectic']","[""From Symplectic to Poisson. A Study of Reduction and a Proposal Towards\n Implosion The imploded cross-section of a symplectic manifold is a stratified space\nallowing for an abelianization of its symplectic reduction. After recalling\nsymplectic and Poisson reduction and reviewing the basics of symplectic\nimplosion, we prove a cross-section theorem for Poisson manifolds, generalizing\nthe Guillemin-Sternberg theorem for symplectic manifolds, which constitutes a\nfirst step towards Poisson implosion. On our way, we find and fix a mistake in\nthe proof of Guillemin-Sternberg's theorem, and we identify Poisson\ntransversals as the right analogue to symplectic submanifolds in this context.\n"", ""Stacky Hamiltonian actions and symplectic reduction We introduce the notion of a Hamiltonian action of an \\'etale Lie group stack\non an \\'etale symplectic stack and establish versions of the Kirwan convexity\ntheorem, the Meyer-Marsden-Weinstein symplectic reduction theorem, and the\nDuistermaat-Heckman theorem in this context.\n"", 'Stratification of the transverse momentum map Given a Hamiltonian action of a proper symplectic groupoid (for instance, a\nHamiltonian action of a compact Lie group), we show that the transverse\nmomentum map admits a natural constant rank stratification. To this end, we\nconstruct a refinement of the canonical stratification associated to the Lie\ngroupoid action (the orbit type stratification, in the case of a Hamiltonian\nLie group action) that seems not to have appeared before, even in the\nliterature on Hamiltonian Lie group actions. This refinement turns out to be\ncompatible with the Poisson geometry of the Hamiltonian action: it is a Poisson\nstratification of the orbit space, each stratum of which is a regular Poisson\nmanifold that admits a natural proper symplectic groupoid integrating it. The\nmain tools in our proofs (which we believe could be of independent interest)\nare a version of the Marle-Guillemin-Sternberg normal form theorem for\nHamiltonian actions of proper symplectic groupoids and a notion of equivalence\nbetween Hamiltonian actions of symplectic groupoids, closely related to Morita\nequivalence between symplectic groupoids.\n']","[('symplectic manifolds', 0.7501591444015503), ('symplectic manifold', 0.7317120432853699), ('symplectic geometry', 0.7174208164215088), ('canonical symplectic', 0.7080197930335999), ('symplectic reduction', 0.7020606398582458), ('symplectic structure', 0.6955626010894775), ('symplectic actions', 0.6895765066146851), ('reduction symplectic', 0.6851004362106323), ('actions symplectic', 0.6746052503585815), ('structure symplectic', 0.6636552810668945)]" 432,432,70,432_fusion systems_theory fusion_fusion_representations fusion,"['fusion systems', 'theory fusion', 'fusion', 'representations fusion', 'systems groups', 'systems prime', 'sylow subgroups', 'class groups', 'centralizers', 'systems maximal']","['Fusion systems with some sporadic J-components Aschbacher\'s program for the classification of simple fusion systems of ""odd""\ntype at the prime 2 has two main stages: the classification of 2-fusion systems\nof subintrinsic component type and the classification of 2-fusion systems of\nJ-component type. We make a contribution to the latter stage by classifying\n2-fusion systems with a J-component isomorphic to the 2-fusion systems of\nseveral sporadic groups under the assumption that the centralizer of such a\ncomponent is cyclic.\n', 'Proving a conjecture for fusion systems on a class of groups We prove the conjecture that exotic and block-exotic fusion systems coincide\nholds for all fusion systems on exceptional $p$-groups of maximal nilpotency\nclass, where $p \\geq 5$. This is done by considering a family of exotic fusion\nsystems discovered by Parker and Stroth. Together with a previous result by the\nauthor, which we also generalise in this paper, and a result by Grazian and\nParker this implies the conjecture for fusion systems on such groups.\nConsidering small primes, there are no exotic fusion systems on $2$-groups of\nmaximal class and for $p = 3$, we prove block-exoticity of two exotic fusion\nsystems described by Diaz--Ruiz--Viruel.\n', 'Fusion systems on a Sylow $p$-subgroup of $SU_4(p)$ We determine, for $p$ odd, all saturated fusion systems on a Sylow\n$p$-subgroup $S$ of the unitary group $SU_4(p)$ and we prove that they are all\nrealizable by finite groups. In particular, we prove that $S$ does not support\nany exotic fusion systems.\n']","[('fusion systems', 0.6558826565742493), ('theory fusion', 0.6090428233146667), ('fusion', 0.5724871754646301), ('representations fusion', 0.4946197271347046), ('systems groups', 0.4513149559497833), ('systems prime', 0.3853203356266022), ('sylow subgroups', 0.3782992660999298), ('class groups', 0.37717458605766296), ('centralizers', 0.3716740310192108), ('systems maximal', 0.36099159717559814)]" 433,433,70,433_terahertz thz communications_terahertz communications_terahertz thz communication_thz communications,"['terahertz thz communications', 'terahertz communications', 'terahertz thz communication', 'thz communications', 'terahertz thz band', 'thz systems', 'thz communication', 'hybrid beamforming architecture', 'terahertz thz', 'hybrid beamforming']","['Terahertz Near-Field Communications and Sensing This article focuses on the near-field effect in terahertz (THz)\ncommunications and sensing systems. By equipping with extremely large-scale\nantenna arrays (ELAAs), the near-field region in THz systems can be possibly\nextended to hundreds of meters in proximity to THz transceivers, which\nnecessitates the consideration of near-field effect in the THz band both for\nthe communications and sensing. We first review the main characteristics of the\nnear-field region in the THz bands. The signal propagation in the near-field\nregion is characterized by spherical waves rather than planar waves in the\nfar-field region. This distinction introduces a new distance dimension to the\ncommunication and sensing channels, which brings new opportunities and\nchallenges for both THz communications and sensing. More particularly, 1) For\nTHz communications, the near-field effect enables a new mechanism for\nbeamforming, namely, beamfocusing, in the focusing region. Furthermore, in THz\nmultiple-input and multiple-output (MIMO) systems, the near-field effect can be\nexploited to combat the multiplexing gain degradation caused by the sparse THz\nchannels. To address the near-field beam split effect caused by the\nconventional frequency-independent hybrid beamforming architecture in THz\nwideband communications, we propose a pair of wideband beamforming optimization\napproaches by a new hybrid beamforming architecture based on true-time-delayers\n(TTDs). 2) For THz sensing, joint angle and distance sensing can be achieved in\nthe near-field region. Additionally, the near-field beam split becomes a\nbeneficial effect for enhancing the sensing performance by focusing on multiple\npossible target locations rather than a drawback encountered in communications.\nFinally, several topics for future research are discussed.\n', 'Hybrid Beamforming for Terahertz Wireless Communications: Challenges,\n Architectures, and Open Problems Terahertz (THz) communications are regarded as a pillar technology for the\nsixth generation (6G) wireless systems, by offering multi-ten-GHz bandwidth. To\novercome the short transmission distance and huge propagation loss,\nultra-massive (UM) MIMO systems that employ sub-millimeter wavelength antennas\narray are proposed to enable an enticingly high array gain. In the UM-MIMO\nsystems, hybrid beamforming stands out for its great potential in promisingly\nhigh data rate and reduced power consumption. In this paper, challenges and\nfeatures of the THz hybrid beamforming design are investigated, in light of the\ndistinctive THz peculiarities. Specifically, we demonstrate that the spatial\ndegree-of-freedom (SDoF) is less than 5, which is caused by the extreme\nsparsity of the THz channel. The blockage problem caused by the huge reflection\nand scattering losses, as high as 15 dB or over, is studied. Moreover, we\nanalyze the challenges led by the array containing 1024 or more antennas,\nincluding the requirement for intelligent subarray architecture, strict energy\nefficiency, and propagation characterization based on spherical-wave\npropagation mechanisms. Owning up to hundreds of GHz bandwidth, beam squint\neffect could cause over 5~dB array gain loss, when the fractional bandwidth\nexceeds 10%. Inspired by these facts, three novel THz-specific hybrid\nbeamforming architectures are presented, including widely-spaced\nmulti-subarray, dynamic array-of-subarrays, and true-time-delay-based\narchitectures. We also demonstrate the potential data rate, power consumption,\nand array gain capabilities for THz communications. As a roadmap of THz hybrid\nbeamforming design, multiple open problems and potential research directions\nare elaborated.\n', 'Beamforming Technologies for Ultra-Massive MIMO in Terahertz\n Communications Terahertz (THz) communications with a frequency band $0.1-10$ THz are\nenvisioned as a promising solution to future high-speed wireless communication.\nAlthough with tens of gigahertz available bandwidth, THz signals suffer from\nsevere free-spreading loss and molecular-absorption loss, which limit the\nwireless transmission distance. To compensate for the propagation loss, the\nultra-massive multiple-input-multiple-output (UM-MIMO) can be applied to\ngenerate a high-gain directional beam by beamforming technologies. In this\npaper, a review of beamforming technologies for THz UM-MIMO systems is\nprovided. Specifically, we first present the system model of THz UM-MIMO and\nidentify its channel parameters and architecture types. Then, we illustrate the\nbasic principles of beamforming via UM-MIMO and discuss the far-field and\nnear-field assumptions in THz UM-MIMO. Moreover, an important beamforming\nstrategy in THz band, i.e., beam training, is introduced wherein the beam\ntraining protocol and codebook design approaches are summarized. The\nintelligent-reflecting-surface (IRS)-assisted joint beamforming and multi-user\nbeamforming in THz UM-MIMO systems are studied, respectively. The\nspatial-wideband effect and frequency-wideband effect in the THz beamforming\nare analyzed and the corresponding solutions are provided. Further, we present\nthe corresponding fabrication techniques and illuminate the emerging\napplications benefiting from THz beamforming. Open challenges and future\nresearch directions on THz UM-MIMO systems are finally highlighted.\n']","[('terahertz thz communications', 0.6684570908546448), ('terahertz communications', 0.6599503755569458), ('terahertz thz communication', 0.6105765104293823), ('thz communications', 0.5866559743881226), ('terahertz thz band', 0.5182515382766724), ('thz systems', 0.50868159532547), ('thz communication', 0.4941602051258087), ('hybrid beamforming architecture', 0.4622153043746948), ('terahertz thz', 0.45512232184410095), ('hybrid beamforming', 0.45081108808517456)]" 434,434,69,434_discretization stochastic_stochastic allen cahn_approximations stochastic_stochastic allen,"['discretization stochastic', 'stochastic allen cahn', 'approximations stochastic', 'stochastic allen', 'approximation stochastic', 'stochastic wave equations', 'parabolic stochastic', 'parabolic stochastic partial', 'stochastic semilinear', 'nonlinear stochastic']","['Lower and upper bounds for strong approximation errors for numerical\n approximations of stochastic heat equations Optimal upper and lower error estimates for strong full-discrete numerical\napproximations of the stochastic heat equation driven by space-time white noise\nare obtained. In particular, we establish the optimality of strong convergence\nrates for full-discrete approximations of stochastic Allen-Cahn equations with\nspace-time white noise which have recently been obtained in [Becker, S., Gess,\nB., Jentzen, A., and Kloeden, P. E., Strong convergence rates for explicit\nspace-time discrete numerical approximations of stochastic Allen-Cahn\nequations. arXiv:1711.02423 (2017)].\n', 'Strong convergence rates for explicit space-time discrete numerical\n approximations of stochastic Allen-Cahn equations The scientific literature contains a number of numerical approximation\nresults for stochastic partial differential equations (SPDEs) with\nsuperlinearly growing nonlinearities but, to the best of our knowledge, none of\nthem prove strong or weak convergence rates for full-discrete numerical\napproximations of space-time white noise driven SPDEs with superlinearly\ngrowing nonlinearities. In particular, in the scientific literature there\nexists neither a result which proves strong convergence rates nor a result\nwhich proves weak convergence rates for full-discrete numerical approximations\nof stochastic Allen-Cahn equations. In this article we bridge this gap and\nestablish strong convergence rates for full-discrete numerical approximations\nof space-time white noise driven SPDEs with superlinearly growing\nnonlinearities such as stochastic Allen-Cahn equations. Moreover, we also\nestablish lower bounds for strong temporal and spatial approximation errors\nwhich demonstrate that our strong convergence rates are essentially sharp and\ncan, in general, not be improved.\n', 'An efficient explicit full-discrete scheme for strong approximation of\n stochastic Allen-Cahn equation In Becker and Jentzen (2019) and Becker et al. (2017), an explicit temporal\nsemi-discretization scheme and a space-time full-discretization scheme were,\nrespectively, introduced and analyzed for the additive noise-driven stochastic\nAllen-Cahn type equations, with strong convergence rates recovered. The present\nwork aims to propose a different explicit full-discrete scheme to numerically\nsolve the stochastic Allen-Cahn equation with cubic nonlinearity, perturbed by\nadditive space-time white noise. The approximation is easily implementable,\nperforming the spatial discretization by a spectral Galerkin method and the\ntemporal discretization by a kind of nonlinearity-tamed accelerated exponential\nintegrator scheme. Error bounds in a strong sense are analyzed for both the\nspatial semi-discretization and the spatio-temporal full discretization, with\nconvergence rates in both space and time explicitly identified. It turns out\nthat the obtained convergence rate of the new scheme is, in the temporal\ndirection, twice as high as existing ones in the literature. Numerical results\nare finally reported to confirm the previous theoretical findings.\n']","[('discretization stochastic', 0.6437339186668396), ('stochastic allen cahn', 0.6279503703117371), ('approximations stochastic', 0.6002830266952515), ('stochastic allen', 0.5761711001396179), ('approximation stochastic', 0.5729718208312988), ('stochastic wave equations', 0.544739305973053), ('parabolic stochastic', 0.5128073692321777), ('parabolic stochastic partial', 0.5073893666267395), ('stochastic semilinear', 0.5026876330375671), ('nonlinear stochastic', 0.49634894728660583)]" 435,435,69,435_output feedback stabilization_boundary feedback_boundary stabilization_feedback boundary,"['output feedback stabilization', 'boundary feedback', 'boundary stabilization', 'feedback boundary', 'feedback stabilization', 'boundary control', 'output feedback controller', 'output feedback control', 'pde backstepping', 'pde systems']","['Boundary Output Feedback Stabilization of Reaction-Diffusion PDEs with\n Delayed Boundary Measurement This paper addresses the boundary output feedback stabilization of general\n1-D reaction-diffusion PDEs with delayed boundary measurement. The output takes\nthe form of a either Dirichlet or Neumann trace. The output delay can be\narbitrarily large. The control strategy is composed of a finite-dimensional\nobserver that is used to observe a delayed version of the first modes of the\nPDE and a predictor component which is employed to obtain the control input to\nbe applied at current time. For any given value of the output delay, we assess\nthe stability of the resulting closed-loop system provided the order of the\nobserver is selected large enough. Taking advantage of this result, we discuss\nthe extension of the control strategy to the case of simultaneous input and\noutput delays.\n', 'Boundary Output Feedback Stabilization of State Delayed\n Reaction-Diffusion PDEs This paper studies the boundary output feedback stabilization of general 1-D\nreaction-diffusion PDEs in the presence of a state delay in the reaction term.\nThe control input applies through a Robin boundary condition while the system\noutput is selected as a either Dirichlet or Neumann boundary trace. The control\nstrategy takes the form of a finite-dimensional observer-based controller with\nfeedback and observer gains that are computed in order to dominate the state\ndelayed term. For any arbitrarily given value of the state delay, we show the\nexponential stability of the resulting closed-loop system provided the order of\nthe observer is selected large enough.\n', 'Observer-Based Output-Feedback Backstepping Stabilization of Continua of\n Hyperbolic PDEs and Application to Large-Scale $n+m$ Coupled Hyperbolic PDEs We develop a non-collocated, observer-based output-feedback law for a class\nof continua of linear hyperbolic PDE systems, which are viewed as the continuum\nversion of $n+m$, general heterodirectional hyperbolic systems as $n\\to\\infty$.\nThe design relies on the introduction of a novel, continuum PDE backstepping\ntransformation, which enables the construction of a Lyapunov functional for the\nestimation error system. Stability under the observer-based output-feedback law\nis established by using the Lyapunov functional construction for the estimation\nerror system and proving well-posedness of the complete closed-loop system,\nwhich allows utilization of the separation principle.\n Motivated by the fact that the continuum-based designs may provide\ncomputationally tractable control laws for large-scale, $n+m$ systems, we then\nutilize the control/observer kernels and the observer constructed for the\ncontinuum system to introduce an output-feedback control design for the\noriginal $n+m$ system. We establish exponential stability of the resulting\nclosed-loop system, which consists of a mixed $n+m$-continuum PDE system\n(comprising the plant-observer dynamics), introducing a virtual continuum\nsystem with resets, which enables utilization of the continuum approximation\nproperty of the solutions of the $n+m$ system by its continuum counterpart (for\nlarge $n$). We illustrate the potential computational complexity/flexibility\nbenefits of our approach via a numerical example of stabilization of a\nlarge-scale $n+m$ system, for which we employ the continuum observer-based\ncontroller, while the continuum-based stabilizing control/observer kernels can\nbe computed in closed form.\n']","[('output feedback stabilization', 0.5635818839073181), ('boundary feedback', 0.5615407228469849), ('boundary stabilization', 0.5592047572135925), ('feedback boundary', 0.5249781608581543), ('feedback stabilization', 0.5144673585891724), ('boundary control', 0.4985077381134033), ('output feedback controller', 0.49661922454833984), ('output feedback control', 0.4917483925819397), ('pde backstepping', 0.4548260569572449), ('pde systems', 0.45023688673973083)]" 436,436,69,436_phase retrieval via_phase retrieval_retrieval phase retrieval_phase retrieval phase,"['phase retrieval via', 'phase retrieval', 'retrieval phase retrieval', 'phase retrieval phase', 'compressed sensing', 'compressive sensing', 'recovering sparse', 'sparse signals', 'sparse signal', 'recover sparse']","['Inertial Proximal ADMM for Separable Multi-Block Convex Optimizations\n and Compressive Affine Phase Retrieval Separable multi-block convex optimization problem appears in many\nmathematical and engineering fields. In the first part of this paper, we\npropose an inertial proximal ADMM to solve a linearly constrained separable\nmulti-block convex optimization problem, and we show that the proposed inertial\nproximal ADMM has global convergence under mild assumptions on the\nregularization matrices. Affine phase retrieval arises in holography, data\nseparation and phaseless sampling, and it is also considered as a\nnonhomogeneous version of phase retrieval that has received considerable\nattention in recent years. Inspired by convex relaxation of vector sparsity and\nmatrix rank in compressive sensing and by phase lifting in phase retrieval, in\nthe second part of this paper, we introduce a compressive affine phase\nretrieval via lifting approach to connect affine phase retrieval with\nmulti-block convex optimization, and then based on the proposed inertial\nproximal ADMM for multi-block convex optimization, we propose an algorithm to\nrecover sparse real signals from their (noisy) affine quadratic measurements.\nOur numerical simulations show that the proposed algorithm has satisfactory\nperformance for affine phase retrieval of sparse real signals.\n', 'Strong convexity of affine phase retrieval The recovery of a signal from the intensity measurements with some entries\nbeing known in advance is termed as {\\em affine phase retrieval}. In this\npaper, we prove that a natural least squares formulation for the affine phase\nretrieval is strongly convex on the entire space under some mild conditions,\nprovided the measurements are complex Gaussian random vecotrs and the\nmeasurement number $m \\gtrsim d \\log d$ where $d$ is the dimension of signals.\nBased on the result, we prove that the simple gradient descent method for the\naffine phase retrieval converges linearly to the target solution with high\nprobability from an arbitrary initial point. These results show an essential\ndifference between the affine phase retrieval and the classical phase\nretrieval, where the least squares formulations for the classical phase\nretrieval are non-convex.\n', 'Solving phase retrieval with random initial guess is nearly as good as\n by spectral initialization The problem of recovering a signal $\\mathbf{x}\\in \\mathbb{R}^n$ from a set of\nmagnitude measurements $y_i=|\\langle \\mathbf{a}_i, \\mathbf{x} \\rangle |, \\;\ni=1,\\ldots,m$ is referred as phase retrieval, which has many applications in\nfields of physical sciences and engineering. In this paper we show that the\nsmoothed amplitude flow model for phase retrieval has benign geometric\nstructure under the optimal sampling complexity. In particular, we show that\nwhen the measurements $\\mathbf{a}_i\\in \\mathbb{R}^n$ are Gaussian random\nvectors and the number of measurements $m\\ge Cn$, our smoothed amplitude flow\nmodel has no spurious local minimizers with high probability, ie., the target\nsolution $\\mathbf{x}$ is the unique global minimizer (up to a global phase) and\nthe loss function has a negative directional curvature around each saddle\npoint. Due to this benign geometric landscape, the phase retrieval problem can\nbe solved by the gradient descent algorithms without spectral initialization.\nNumerical experiments show that the gradient descent algorithm with random\ninitialization performs well even comparing with state-of-the-art algorithms\nwith spectral initialization in empirical success rate and convergence speed.\n']","[('phase retrieval via', 0.7242335081100464), ('phase retrieval', 0.691697359085083), ('retrieval phase retrieval', 0.6267639398574829), ('phase retrieval phase', 0.6167480945587158), ('compressed sensing', 0.5794746279716492), ('compressive sensing', 0.558795690536499), ('recovering sparse', 0.5358235836029053), ('sparse signals', 0.5068024396896362), ('sparse signal', 0.47604697942733765), ('recover sparse', 0.4490545392036438)]" 437,437,69,437_expander graphs_expander graph_spectral expander_vertex expansion,"['expander graphs', 'expander graph', 'spectral expander', 'vertex expansion', 'ramanujan graphs', 'expanders', 'edge expansion', 'expansion small', 'spectral expansion', 'expansion defined']","['New Cosystolic Expanders from Tensors Imply Explicit Quantum LDPC Codes\n with $\\Omega(\\sqrt{n}\\log^kn)$ Distance In this work we introduce a new notion of expansion in higher dimensions that\nis stronger than the well studied cosystolic expansion notion, and is termed\n{\\em Collective-cosystolic expansion}.\n We show that tensoring two cosystolic expanders yields a new cosystolic\nexpander, assuming one of the complexes in the product, is not only cosystolic\nexpander, but rather a collective cosystolic expander.\n We then show that the well known bounded degree cosystolic expanders, the\nRamanujan complexes are, in fact, collective cosystolic expanders. This enables\nus to construct new bounded degree cosystolic expanders, by tensoring of\nRamanujan complexes.\n Using our new constructed bounded degree cosystolic expanders we construct\n{\\em explicit} quantum LDPC codes of distance $\\sqrt{n} \\log^k n$ for any $k$,\nimproving a recent result of Evra et. al. \\cite{EKZ}, and setting a new record\nfor distance of explicit quantum LDPC codes.\n The work of \\cite{EKZ} took advantage of the high dimensional expansion\nnotion known as cosystolic expansion, that occurs in Ramanujan complexes. Our\nimprovement is achieved by considering tensor product of Ramanujan complexes,\nand using their newly derived property, the collective cosystolic expansion.\n', ""New High Dimensional Expanders from Covers We present a new construction of high dimensional expanders based on covering\nspaces of simplicial complexes. High dimensional expanders (HDXs) are\nhypergraph analogues of expander graphs. They have many uses in theoretical\ncomputer science, but unfortunately only few constructions are known which have\narbitrarily small local spectral expansion.\n We give a randomized algorithm that takes as input a high dimensional\nexpander $X$ (satisfying some mild assumptions). It outputs a sub-complex $Y\n\\subseteq X$ that is a high dimensional expander and has infinitely many\nsimplicial covers. These covers form new families of bounded-degree high\ndimensional expanders. The sub-complex $Y$ inherits $X$'s underlying graph and\nits links are sparsifications of the links of $X$. When the size of the links\nof $X$ is $O(\\log |X|)$, this algorithm can be made deterministic. Our\nalgorithm is based on the groups and generating sets discovered by Lubotzky,\nSamuels and Vishne (2005), that were used to construct the first discovered\nhigh dimensional expanders. We show these groups give rise to many more\n``randomized'' high dimensional expanders.\n In addition, our techniques also give a random sparsification algorithm for\nhigh dimensional expanders, that maintains its local spectral properties. This\nmay be of independent interest.\n"", 'Combinatorics via Closed Orbits: Number Theoretic Ramanujan Graphs are\n not Unique Neighbor Expanders The question of finding expander graphs with strong vertex expansion\nproperties such as unique neighbor expansion and lossless expansion is central\nto computer science. A barrier to constructing these is that strong notions of\nexpansion could not be proven via the spectral expansion paradigm.\n A very symmetric and structured family of optimal spectral expanders (i.e.,\nRamanujan graphs) was constructed using number theory by Lubotzky, Phillips and\nSarnak, and was subsequently generalized by others. We call such graphs Number\nTheoretic Ramanujan Graphs. These graphs are not only spectrally optimal, but\nalso posses strong symmetries and rich structure. Thus, it has been widely\nconjectured that number theoretic Ramanujan graphs are lossless expanders, or\nat least unique neighbor expanders.\n In this work we disprove this conjecture, by showing that there are number\ntheoretic Ramanujan graphs that are not even unique neighbor expanders. This is\ndone by introducing a new combinatorial paradigm that we term the closed orbit\nmethod.\n The closed orbit method allows one to construct finite combinatorial objects\nwith extermal substructures. This is done by observing that there exist\ninfinite combinatorial structures with extermal substructures, coming from an\naction of a subgroup of the automorphism group of the structure. The crux of\nour idea is a systematic way to construct a finite quotient of the infinite\nstructure containing a simple shadow of the infinite substructure, which\nmaintains its extermal combinatorial property.\n Other applications of the method are to the edge expansion of number\ntheoretic Ramanujan graphs and vertex expansion of Ramanujan complexes.\nFinally, in the field of graph quantum ergodicity we produce number theoretic\nRamanujan graphs with an eigenfunction of small support that corresponds to the\nzero eigenvalue. This again contradicts common expectations.\n']","[('expander graphs', 0.6640743017196655), ('expander graph', 0.5776554942131042), ('spectral expander', 0.5770860910415649), ('vertex expansion', 0.5534707903862), ('ramanujan graphs', 0.5279740691184998), ('expanders', 0.5153231620788574), ('edge expansion', 0.4913121163845062), ('expansion small', 0.48499050736427307), ('spectral expansion', 0.4827525317668915), ('expansion defined', 0.46735748648643494)]" 438,438,69,438_quandles_quandle_arising groups_knot theory,"['quandles', 'quandle', 'arising groups', 'knot theory', 'groups generators', 'associated groups', 'automorphisms', 'trivial idempotents', 'non trivial idempotents', 'idempotents']","['Nilpotent quandles A nilpotent quandle is a quandle whose inner automorphism group is nilpotent.\nSuch quandles have been called reductive in previous works, but it turns out\nthat their behaviour is in fact very close to nilpotency for groups. In\nparticular, we show that it is easy to characterise generating sets of such\nquandles, and that they have the Hopf property. We also show how to construct\nfree nilpotent quandles from free nilpotent groups. We then use the properties\nof nilpotent quandles to describe a simple presentation of their associated\ngroup, and we use this to recover the classification of abelian quandles by\nLebed and Mortier [LM21]. We also study reduced quandles, and we show that the\nreduced fundamental quandle is equivalent, as an invariant of links, to the\nreduced peripheral system, sharpening a previous result of Hughes [Hug11].\nFinally, we give a characterisation of nilpotency in terms of the associated\ninvariants of braids.\n', 'Idempotents, free products and quandle coverings In this paper, we investigate idempotents in quandle rings and relate them\nwith quandle coverings. We prove that integral quandle rings of quandles of\nfinite type that are non-trivial coverings over nice base quandles admit\ninfinitely many non-trivial idempotents, and give their complete description.\nWe show that the set of all these idempotents forms a quandle in itself. As an\napplication, we deduce that the quandle ring of the knot quandle of a\nnon-trivial long knot admit non-trivial idempotents. We consider free products\nof quandles and prove that integral quandle rings of free quandles have only\ntrivial idempotents, giving an infinite family of quandles with this property.\nWe also give a description of idempotents in quandle rings of unions and\ncertain twisted unions of quandles.\n', 'Derivations of quandles The aim of this paper is to propose a theory of derivations for quandles.\nGiven a quandle $A$ admitting an action by a quandle $Q$, derivations from $Q$\nto $A$ are introduced as twisted analogues of quandle homomorphisms. It is\nshown that for each quandle $Q$ there exists a unique $Q$-quandle\n$\\mathcal{A}_Q$ (the derived quandle of $Q$) such that derivations from $Q$ to\nany $Q$-quandle $A$ are in bijective correspondence with $Q$-quandle\nhomomorphisms from $\\mathcal{A}_Q$ to $A$. Further, it is proved that the set\nof all derivations to an abelian $Q$-quandle $A$ has the structure of an\nabelian quandle, and inherits many other properties from $A$. In the end, the\nideas are extended to the setting of virtual quandles.\n']","[('quandles', 0.6069127917289734), ('quandle', 0.5649697184562683), ('arising groups', 0.4019137918949127), ('knot theory', 0.39837929606437683), ('groups generators', 0.3452865183353424), ('associated groups', 0.3422608971595764), ('automorphisms', 0.33807599544525146), ('trivial idempotents', 0.3321877717971802), ('non trivial idempotents', 0.3284178376197815), ('idempotents', 0.3268849849700928)]" 439,439,69,439_triangles whose_triangles_triangles two_hyperbolic triangles,"['triangles whose', 'triangles', 'triangles two', 'hyperbolic triangles', 'triangles common', 'equilateral triangles', 'spherical triangles', 'triangle', 'triangle three', 'triangle triangle']","[""Heron triangles and the hunt for unicorns A Heron triangle is one that has all integer side lengths and integer area,\nwhich takes its name from Heron of Alexandria's area formula. From a more\nrelaxed point of view, if rescaling is allowed, then one can define a Heron\ntriangle to be one whose side lengths and area are all rational numbers. A\nperfect triangle is a Heron triangle with all three medians being rational.\nAccording to a longstanding conjecture, no such triangle exists, so perfect\ntriangles are as rare as unicorns.\n However, if perfect is the enemy of good, then perhaps it is best to insist\non only two of the medians being rational. Buchholz and Rathbun found an\ninfinite family of Heron triangles with two rational medians, which they were\nable to associate with the set of rational points on an elliptic curve\n$E(\\mathbb{Q})$. Here we describe a recently discovered explicit formula for\nthe sides, area and medians of these (almost perfect) triangles, expressed in\nterms of a pair of integer sequences: these are Somos sequences, which first\nbecame popular thanks to David Gale's column in Mathematical Intelligencer.\n"", 'Amicable Heron triangles A Heron triangle is a triangle whose side lengths and area are integers. Two\nHeron triangles are amicable if the perimeter of one is the area of the other.\nWe show, using elementary techniques, that there is only one pair of amicable\nHeron triangles.\n', 'Spherical Heron triangles and elliptic curves We define spherical Heron triangles (spherical triangles with ""rational""\nside-lengths and angles) and parametrize them via rational points of certain\nfamilies of elliptic curves. We show that the congruent number problem has\ninfinitely many solutions for most areas in the spherical setting and we find a\nspherical Heron triangle with rational medians. We also explore the question of\nspherical triangles with a single rational median or a single a rational area\nbisector (median splitting the triangle in half), and discuss various problems\ninvolving isosceles spherical triangles.\n']","[('triangles whose', 0.5954829454421997), ('triangles', 0.5940314531326294), ('triangles two', 0.5714617967605591), ('hyperbolic triangles', 0.5615163445472717), ('triangles common', 0.5507704019546509), ('equilateral triangles', 0.5456045866012573), ('spherical triangles', 0.5294310450553894), ('triangle', 0.5234453082084656), ('triangle three', 0.5076762437820435), ('triangle triangle', 0.4800568222999573)]" 440,440,69,440_compact topological group_topological groups_groups topological_compact groups,"['compact topological group', 'topological groups', 'groups topological', 'compact groups', 'topological group', 'locally compact group', 'group topology', 'compact group', 'abelian topological', 'countably compact']","['On the continuity of the inverse in (strongly) paratopological\n gyrogroups In this paper, we consider the continuity of the inverse in (strongly)\nparatopological gyrogroups. The conclusions are established as follows: (1) A\ncompact Hausdorff paratopological gyrogroup $G$ is a topological gyrogroup. (2)\nA Hausdorff locally compact strongly paratopological gyrogroup is a topological\ngyrogroup. (3) If $G$ is locally compact strongly paratopological\ngyrocommutative gyrogroup (without any separation restrictions), then $G$ is a\nstrongly topological gyrogroup. (4) Every regular feebly compact strongly\nparatopological gyrogroup is a topological gyrogroup. (5) If a Hausdorff\nstrongly paratopological gyrogroup $G$ is countablly compact and topologically\nperiodic, then $G$ is a strongly topological gyrogroup.\n', 'The strong Pytkeev property and strong countable completeness in\n (strongly) topological gyrogroups A topological gyrogroup is a gyrogroup endowed with a topology such that the\nbinary operation is jointly continuous and the inverse mapping is also\ncontinuous. In this paper, it is proved that if $G$ is a sequential topological\ngyrogroup with an $\\omega^{\\omega}$-base, then $G$ has the strong Pytkeev\nproperty. Moreover, some equivalent conditions about $\\omega^{\\omega}$-base and\nstrong Pytkeev property are given in Baire topological gyrogroups. Finally, it\nis shown that if $G$ is a strongly countably complete strongly topological\ngyrogroup, then $G$ contains a closed, countably compact, admissible\nsubgyrogroup $P$ such that the quotient space $G/P$ is metrizable and the\ncanonical homomorphism $\\pi :G\\rightarrow G/P$ is closed.\n', 'Separability in (strongly) topological gyrogroups Separability is one of the most basic and important topological properties.\nIn this paper, the separability in (strongly) topological gyrogroups is\nstudied. It is proved that every first-countable left {\\omega}-narrow strongly\ntopological gyrogroup is separable. Furthermore, it is shown that if a\nfeathered strongly topological gyrogroup G is isomorphic to a subgyrogroup of a\nseparable strongly topological gyrogroup, then G is separable. Therefore, if a\nmetrizable strongly topological gyrogroup G is isomorphic to a subgyrogroup of\na separable strongly topological gyrogroup, then G is separable, and if a\nlocally compact strongly topological gyrogroup G is isomorphic to a\nsubgyrogroup of a separable strongly topological gyrogroup, then G is\nseparable.\n']","[('compact topological group', 0.6590691208839417), ('topological groups', 0.6589993834495544), ('groups topological', 0.6424903869628906), ('compact groups', 0.6147348284721375), ('topological group', 0.6021379828453064), ('locally compact group', 0.6002689599990845), ('group topology', 0.583915114402771), ('compact group', 0.5675554275512695), ('abelian topological', 0.5044041275978088), ('countably compact', 0.4936213493347168)]" 441,441,69,441_groups definable_definable minimal_type definable_groups fields,"['groups definable', 'definable minimal', 'type definable', 'groups fields', 'every definable', 'definable', 'algebraic groups', 'absolute galois groups', 'galois groups', 'definable sets']","['One-dimensional subgroups and connected components in non-abelian\n $p$-adic definable groups We generalize two of our previous results on abelian definable groups in\n$p$-adically closed fields to the non-abelian case. First, we show that if $G$\nis a definable group that is not definably compact, then $G$ has a\none-dimensional definable subgroup which is not definably compact. This is a\n$p$-adic analogue of the Peterzil-Steinhorn theorem for o-minimal theories.\nSecond, we show that if $G$ is a group definable over the standard model\n$\\mathbb{Q}_p$, then $G^0 = G^{00}$. As an application, definably amenable\ngroups over $\\mathbb{Q}_p$ are open subgroups of algebraic groups, up to finite\nfactors. We also prove that $G^0 = G^{00}$ when $G$ is a definable subgroup of\na linear algebraic group, over any model.\n', 'On groups with definable $f$-generics definable in $p$-adically closed\n fields The aim of this paper is to develop the theory of groups definable in the\n$p$-adic field ${\\mathbb Q}_p$, with ``definable $f$-generics"" in the sense of\nan ambient saturated elementary extension of ${\\mathbb Q}_p$. We call such\ngroups definable $f$-generic groups.\n So, by a ``definable f-generic\'\' or dfg group we mean a definable group in a\nsaturated model with a global f-generic type which is definable over a small\nmodel. In the present context the group is definable over ${\\mathbb Q}_p$, and\nthe small model will be ${\\mathbb Q}_p$ itself. The notion of a dfg group is\ndual, or rather opposite to that of an fsg group (group with ``finitely\nsatisfiable generics"") and is a useful tool to describe the analogue of torsion\nfree o-minimal groups in the $p$-adic context.\n In the current paper our group will be definable over ${\\mathbb Q}_p$ in an\nambient saturated elementary extension $\\mathbb K$ of ${\\mathbb Q}_p$, so as to\nmake sense of the notions of $f$-generic etc. In this paper we will show that\nevery definable $f$-generic group definable in ${\\mathbb Q}_p$ is virtually\nisomorphic to a finite index subgroup of a trigonalizable algebraic group over\n${\\mathbb Q}_p$. This is analogous to the $o$-minimal context, where every\nconnected torsion free group definable in $\\mathbb R$ is isomorphic to a\ntrigonalizable algebraic group (Lemma 3.4, \\cite{COS}). We will also show that\nevery open definable $f$-generic subgroup of a definable $f$-generic group has\nfinite index, and every $f$-generic type of a definable $f$-generic group is\nalmost periodic, which gives a positive answer to the problem raised in\n\\cite{P-Y} of whether $f$-generic types coincide with almost periodic types in\nthe $p$-adic case.\n', 'Abelian groups definable in $p$-adically closed fields Recall that a group $G$ has finitely satisfiable generics ($fsg$) or\ndefinable $f$-generics ($dfg$) if there is a global type $p$ on $G$ and a small\nmodel $M_0$ such that every left translate of $p$ is finitely satisfiable in\n$M_0$ or definable over $M_0$, respectively. We show that any abelian group\ndefinable in a $p$-adically closed field is an extension of a definably compact\n$fsg$ definable group by a $dfg$ definable group. We discuss an approach which\nmight prove a similar statement for interpretable abelian groups. In the case\nwhere $G$ is an abelian group definable in the standard model $\\mathbb{Q}_p$,\nwe show that $G^0 = G^{00}$, and that $G$ is an open subgroup of an algebraic\ngroup, up to finite factors. This latter result can be seen as a rough\nclassification of abelian definable groups in $\\mathbb{Q}_p$.\n']","[('groups definable', 0.615484893321991), ('definable minimal', 0.53328537940979), ('type definable', 0.5021486878395081), ('groups fields', 0.48309510946273804), ('every definable', 0.47211411595344543), ('definable', 0.4455510973930359), ('algebraic groups', 0.44361788034439087), ('absolute galois groups', 0.43314874172210693), ('galois groups', 0.431674063205719), ('definable sets', 0.4300747513771057)]" 442,442,68,442_stochastic games_sum stochastic games_markov games_games convergence,"['stochastic games', 'sum stochastic games', 'markov games', 'games convergence', 'zero sum games', 'equilibrium game', 'nash equilibrium game', 'nash equilibrium', 'learning dynamics', 'learning agents']","[""Synchronization in Learning in Periodic Zero-Sum Games Triggers\n Divergence from Nash Equilibrium Learning in zero-sum games studies a situation where multiple agents\ncompetitively learn their strategy. In such multi-agent learning, we often see\nthat the strategies cycle around their optimum, i.e., Nash equilibrium. When a\ngame periodically varies (called a ``periodic'' game), however, the Nash\nequilibrium moves generically. How learning dynamics behave in such periodic\ngames is of interest but still unclear. Interestingly, we discover that the\nbehavior is highly dependent on the relationship between the two speeds at\nwhich the game changes and at which players learn. We observe that when these\ntwo speeds synchronize, the learning dynamics diverge, and their time-average\ndoes not converge. Otherwise, the learning dynamics draw complicated cycles,\nbut their time-average converges. Under some assumptions introduced for the\ndynamical systems analysis, we prove that this behavior occurs. Furthermore,\nour experiments observe this behavior even if removing these assumptions. This\nstudy discovers a novel phenomenon, i.e., synchronization, and gains insight\nwidely applicable to learning in periodic games.\n"", 'Towards convergence to Nash equilibria in two-team zero-sum games Contemporary applications of machine learning in two-team e-sports and the\nsuperior expressivity of multi-agent generative adversarial networks raise\nimportant and overlooked theoretical questions regarding optimization in\ntwo-team games. Formally, two-team zero-sum games are defined as multi-player\ngames where players are split into two competing sets of agents, each\nexperiencing a utility identical to that of their teammates and opposite to\nthat of the opposing team. We focus on the solution concept of Nash equilibria\n(NE). We first show that computing NE for this class of games is\n$\\textit{hard}$ for the complexity class ${\\mathrm{CLS}}$. To further examine\nthe capabilities of online learning algorithms in games with full-information\nfeedback, we propose a benchmark of a simple -- yet nontrivial -- family of\nsuch games. These games do not enjoy the properties used to prove convergence\nfor relevant algorithms. In particular, we use a dynamical systems perspective\nto demonstrate that gradient descent-ascent, its optimistic variant, optimistic\nmultiplicative weights update, and extra gradient fail to converge (even\nlocally) to a Nash equilibrium. On a brighter note, we propose a first-order\nmethod that leverages control theory techniques and under some conditions\nenjoys last-iterate local convergence to a Nash equilibrium. We also believe\nour proposed method is of independent interest for general min-max\noptimization.\n', 'Nash Equilibria for Exchangeable Team against Team Games, their Mean\n Field Limit, and Role of Common Randomness We study stochastic mean-field games among finite number of teams with large\nfinite as well as infinite number of decision makers. For this class of games\nwithin static and dynamic settings, we establish the existence of a Nash\nequilibrium, and show that a Nash equilibrium exhibits exchangeability in the\nfinite decision maker regime and symmetry in the infinite one. To arrive at\nthese existence and structural theorems, we endow the set of randomized\npolicies with a suitable topology under various decentralized information\nstructures, which leads to the desired convexity and compactness of the set of\nrandomized policies. Then, we establish the existence of a randomized Nash\nequilibrium that is exchangeable (not necessarily symmetric) among decision\nmakers within each team for a general class of exchangeable stochastic games.\nAs the number of decision makers within each team goes to infinity (that is for\nthe mean-field game among teams), using a de Finetti representation theorem, we\nshow existence of a randomized Nash equilibrium that is symmetric (i.e.,\nidentical) among decision makers within each team and also independently\nrandomized. Finally, we establish that a Nash equilibrium for a class of\nmean-field games among teams (which is symmetric) constitutes an approximate\nNash equilibrium for the corresponding pre-limit (exchangeable) game among\nteams with large but finite number of decision makers. We thus show that common\nrandomness is not necessary for large team-against-team games, unlike the case\nwith small sized teams.\n']","[('stochastic games', 0.6388931274414062), ('sum stochastic games', 0.6335944533348083), ('markov games', 0.6007513403892517), ('games convergence', 0.5717445015907288), ('zero sum games', 0.569260835647583), ('equilibrium game', 0.564379870891571), ('nash equilibrium game', 0.5642666816711426), ('nash equilibrium', 0.5358735918998718), ('learning dynamics', 0.5358541011810303), ('learning agents', 0.5328167080879211)]" 443,443,68,443_anderson models_driven gaussian noise_parabolic anderson_gaussian noise white,"['anderson models', 'driven gaussian noise', 'parabolic anderson', 'gaussian noise white', 'gaussian noise', 'gaussian noises', 'stochastic heat', 'noise spatial', 'driven gaussian', 'fractional noise']","['Functional central limit theorems for spatial averages of the parabolic\n Anderson model with delta initial condition in dimension $d\\geq 1$ Let $\\{u(t,x)\\}_{t>0,x\\in{{\\mathbb R}^{d}}}$ denote the solution to a\n$d$-dimensional parabolic Anderson model with delta initial condition and\ndriven by a multiplicative noise that is white in time and has a spatially\nhomogeneous covariance given by a nonnegative-definite measure $f$. Let\n$S_{N,t}:=N^{-d}\\int_{{[0,N]}^d}{[U(t,x)-1]}{\\rm d}x$ denote the spatial\naverage on ${{\\mathbb R}^{d}}$. We obtain various functional central limit\ntheorems (CLTs) for spatial averages based on the quantitative analysis of $f$\nand spatial dimension $d$. In particular, when $f$ is given by Riesz kernel,\nthat is, $f({\\rm x})={\\Vert x \\Vert}^{-\\beta}{\\rm d}x$, $\\beta\\in(0,2\\wedge\nd)$, the functional CLT is also based on the index $\\beta$.\n', ""Convergence of densities of spatial averages of the parabolic Anderson\n model driven by colored noise In this paper, we present a rate of convergence in the uniform norm for the\ndensities of spatial averages of the solution to the d-dimensional parabolic\nAnderson model driven by a Gaussian multiplicative noise, which is white in\ntime and has a spatial covariance given by the Riesz kernel. The proof is based\non the combination of Malliavin calculus techniques and the Stein's method for\nnormal approximations.\n"", 'Fractal Geometry of the Valleys of the Parabolic Anderson Equation We study the macroscopic fractal properties of the deep valleys of the\nsolution of the $(1+1)$-dimensional parabolic Anderson equation $${\\partial\n\\over \\partial t}u(t,x) =\\frac{1}{2} {\\partial^2 \\over \\partial x^2} u(t,x) +\nu(t,x)\\dot{W}(t,x),t>0, x\\in {\\bf R},\\quad\n u(0,x) \\equiv u_0(x),x\\in {\\bf R}, $$ where $\\dot{W}$ is the time-space white\nnoise and $0<\\inf_{x\\in {\\bf R}} u_0(x)\\leq \\sup_{x\\in {\\bf R}} u_0(x)<\\infty.$\nUnlike the macroscopic multifractality of the tall peaks, we show that valleys\nof the parabolic Anderson equation are macroscopically monofractal. In fact,\nthe macroscopic Hausdorff dimension (introduced by Barlow and Taylor [J. Phys.\nA 22 (1989) 2621--2628; Proc. Lond. Math. Soc. (3) 64 (1992) 125--152]) of the\nvalleys undergoes a phase transition at a point which does not depend on the\ninitial data. The key tool of our proof is a lower bound to the lower tail\nprobability of the parabolic Anderson equation. Such lower bound is obtained\nfor the first time in this paper and will be derived by utilizing the\nconnection between the parabolic Anderson equation and the Kardar-Parisi-Zhang\nequation. Our techniques of proving this lower bound can be extended to other\nmodels in the KPZ universality class including the KPZ fixed point.\n']","[('anderson models', 0.49170786142349243), ('driven gaussian noise', 0.48054054379463196), ('parabolic anderson', 0.4676809310913086), ('gaussian noise white', 0.4674839675426483), ('gaussian noise', 0.43646979331970215), ('gaussian noises', 0.4252844452857971), ('stochastic heat', 0.417334645986557), ('noise spatial', 0.3911520838737488), ('driven gaussian', 0.38881155848503113), ('fractional noise', 0.3840440809726715)]" 444,444,68,444_reduced basis methods_reduced order modeling_basis methods_reduced basis rb,"['reduced basis methods', 'reduced order modeling', 'basis methods', 'reduced basis rb', 'reduced order models', 'reduced basis', 'empirical interpolation', 'based reduction', 'orthogonal decomposition', 'discrete empirical interpolation']","['Uncertainty quantification for nonlinear solid mechanics using reduced\n order models with Gaussian process regression Uncertainty quantification (UQ) tasks, such as sensitivity analysis and\nparameter estimation, entail a huge computational complexity when dealing with\ninput-output maps involving the solution of nonlinear differential problems,\nbecause of the need to query expensive numerical solvers repeatedly.\nProjection-based reduced order models (ROMs), such as the Galerkin-reduced\nbasis (RB) method, have been extensively developed in the last decades to\novercome the computational complexity of high fidelity full order models\n(FOMs), providing remarkable speedups when addressing UQ tasks related with\nparameterized differential problems. Nonetheless, constructing a\nprojection-based ROM that can be efficiently queried usually requires extensive\nmodifications to the original code, a task which is non-trivial for nonlinear\nproblems, or even not possible at all when proprietary software is used.\nNon-intrusive ROMs - which rely on the FOM as a black box - have been recently\ndeveloped to overcome this issue. In this work, we consider ROMs exploiting\nproper orthogonal decomposition to construct a reduced basis from a set of FOM\nsnapshots, and Gaussian process regression (GPR) to approximate the RB\nprojection coefficients. Two different approaches, namely a global GPR and a\ntensor-decomposition-based GPR, are explored on a set of 3D time-dependent\nsolid mechanics examples. Finally, the non-intrusive ROM is exploited to\nperform global sensitivity analysis (relying on both screening and\nvariance-based methods) and parameter estimation (through Markov chain Monte\nCarlo methods), showing remarkable computational speedups and very good\naccuracy compared to high-fidelity FOMs.\n', 'An EIM-degradation free reduced basis method via over collocation and\n residual hyper reduction-based error estimation The need for multiple interactive, real-time simulations using different\nparameter values has driven the design of fast numerical algorithms with\ncertifiable accuracies. The reduced basis method (RBM) presents itself as such\nan option. RBM features a mathematically rigorous error estimator which drives\nthe construction of a low-dimensional subspace. A surrogate solution is then\nsought in this low-dimensional space approximating the parameter-induced high\nfidelity solution manifold. However when the system is nonlinear or its\nparameter dependence nonaffine, this efficiency gain degrades tremendously, an\ninherent drawback of the application of the empirical interpolation method\n(EIM).\n In this paper, we augment and extend the EIM approach as a direct solver, as\nopposed to an assistant, for solving nonlinear partial differential equations\non the reduced level. The resulting method, called Reduced Over-Collocation\nmethod (ROC), is stable and capable of avoiding the efficiency degradation. Two\ncritical ingredients of the scheme are collocation at about twice as many\nlocations as the number of basis elements for the reduced approximation space,\nand an efficient error indicator for the strategic building of the reduced\nsolution space. The latter, the main contribution of this paper, results from\nan adaptive hyper reduction of the residuals for the reduced solution.\nTogether, these two ingredients render the proposed R2-ROC scheme both offline-\nand online-efficient. A distinctive feature is that the efficiency degradation\nappearing in traditional RBM approaches that utilize EIM for nonlinear and\nnonaffine problems is circumvented, both in the offline and online stages.\nNumerical tests on different families of time-dependent and steady-state\nnonlinear problems demonstrate the high efficiency and accuracy of our R2-ROC\nand its superior stability performance.\n', 'Generative Reduced Basis Method We present a generative reduced basis (RB) approach to construct reduced\norder models for parametrized partial differential equations. Central to this\napproach is the construction of generative RB spaces that provide rapidly\nconvergent approximations of the solution manifold. We introduce a generative\nsnapshot method to generate significantly larger sets of snapshots from a small\ninitial set of solution snapshots. This method leverages multivariate nonlinear\ntransformations to enrich the RB spaces, allowing for a more accurate\napproximation of the solution manifold than commonly used techniques such as\nproper orthogonal decomposition and greedy sampling. The key components of our\napproach include (i) a Galerkin projection of the full order model onto the\ngenerative RB space to form the reduced order model; (ii) a posteriori error\nestimates to certify the accuracy of the reduced order model; and (iii) an\noffline-online decomposition to separate the computationally intensive model\nconstruction, performed once during the offline stage, from the real-time model\nevaluations performed many times during the online stage. The error estimates\nallow us to efficiently explore the parameter space and select parameter points\nthat maximize the accuracy of the reduced order model. Through numerical\nexperiments, we demonstrate that the generative RB method not only improves the\naccuracy of the reduced order model but also provides tight error estimates.\n']","[('reduced basis methods', 0.6810027956962585), ('reduced order modeling', 0.5378035306930542), ('basis methods', 0.5173454880714417), ('reduced basis rb', 0.45655325055122375), ('reduced order models', 0.45084348320961), ('reduced basis', 0.44971659779548645), ('empirical interpolation', 0.415083110332489), ('based reduction', 0.3781919479370117), ('orthogonal decomposition', 0.37807920575141907), ('discrete empirical interpolation', 0.3705623149871826)]" 445,445,68,445_latin squares_orthogonal latin squares_latin square_squares,"['latin squares', 'orthogonal latin squares', 'latin square', 'squares', 'squares order', 'combinatorial designs', 'square order', 'latin hypercube', 'orthogonal latin', 'mutually orthogonal latin']","[""Recent results on Choi's orthogonal Latin squares Choi Seok-Jeong studied Latin squares at least 60 years earlier than Euler\nalthough this was less known. He introduced a pair of orthogonal Latin squares\nof order 9 in his book. Interestingly, his two orthogonal non-double-diagonal\nLatin squares produce a magic square of order 9, whose theoretical reason was\nnot studied. There have been a few studies on Choi's Latin squares of order 9.\nThe most recent one is Ko-Wei Lih's construction of Choi's Latin squares of\norder 9 based on the two $3 \\times 3$ orthogonal Latin squares.\n In this paper, we give a new generalization of Choi's orthogonal Latin\nsquares of order 9 to orthogonal Latin squares of size $n^2$ using the\nKronecker product including Lih's construction. We find a geometric description\nof Choi's orthogonal Latin squares of order 9 using the dihedral group $D_8$.\nWe also give a new way to construct magic squares from two orthogonal\nnon-double-diagonal Latin squares, which explains why Choi's Latin squares\nproduce a magic square of order 9.\n"", 'Do K33-Free Latin Squares Exist? We discuss the problem of existence of latin squares without a substructure\nconsisting of six elements $(r_1,c_2,l_3)$, $(r_2,c_3,l_1)$, $(r_3,c_1,l_2)$,\n$(r_2,c_1,l_3)$, $(r_3,c_2,l_1)$, $(r_1,c_3,l_2)$. Equivalently, the\ncorresponding latin square graph does not have an induced subgraph isomorphic\nto $K_{3,3}$. The exhaustive search [Brouwer, Wanless. Universally\nnoncommutative loops. 2011] says that there are no such latin squares of order\nfrom $3$ to $11$, and there are only two $K_{3,3}$-free latin squares of order\n$8$, up to equivalence. We repeat the search, establishing also the number of\nlatin $m$-by-$n$ rectangles for each $m$ and $n$ less or equal to $11$. As a\nswitched combination of two orthogonal latin squares of order $8$, we construct\na $K_{3,3}$-free (universally noncommutative) latin square of order $16$.\n Keywords: latin square; transversal; trade; pattern avoiding; eigenfunction;\nuniversally noncommutative loops.\n', 'Uniform semi-Latin squares and their pairwise-variance aberrations For integers $n>2$ and $k>0$, an $(n\\times n)/k$ semi-Latin square is an\n$n\\times n$ array of $k$-subsets (called blocks) of an $nk$-set (of\ntreatments), such that each treatment occurs once in each row and once in each\ncolumn of the array. A semi-Latin square is uniform if every pair of blocks,\nnot in the same row or column, intersect in the same positive number of\ntreatments. We show that when a uniform $(n\\times n)/k$ semi-Latin square\nexists, the Schur optimal $(n\\times n)/k$ semi-Latin squares are precisely the\nuniform ones. We then compare uniform semi-Latin squares using the criterion of\npairwise-variance (PV) aberration, introduced by J.P. Morgan for affine\nresolvable designs, and determine the uniform $(n\\times n)/k$ semi-Latin\nsquares with minimum PV aberration when there exist $n-1$ mutually orthogonal\nLatin squares (MOLS) of order $n$. These do not exist when $n=6$, and the\nsmallest uniform semi-Latin squares in this case have size $(6\\times 6)/10$. We\npresent a complete classification of the uniform $(6\\times 6)/10$ semi-Latin\nsquares, and display the one with least PV aberration. We give a construction\nproducing a uniform $((n+1)\\times (n+1))/((n-2)n)$ semi-Latin square when there\nexist $n-1$ MOLS of order $n$, and determine the PV aberration of such a\nuniform semi-Latin square. Finally, we describe how certain affine resolvable\ndesigns and balanced incomplete-block designs (BIBDs) can be constructed from\nuniform semi-Latin squares. From the uniform $(6\\times 6)/10$ semi-Latin\nsquares we classified, we obtain (up to block design isomorphism) exactly 16875\naffine resolvable designs for 72 treatments in 36 blocks of size 12 and 8615\nBIBDs for 36 treatments in 84 blocks of size 6. In particular, this shows that\nthere are at least 16875 pairwise non-isomorphic orthogonal arrays\n$\\mathrm{OA}(72,6,6,2)$.\n']","[('latin squares', 0.6889646053314209), ('orthogonal latin squares', 0.6724368333816528), ('latin square', 0.5975907444953918), ('squares', 0.5134188532829285), ('squares order', 0.49816128611564636), ('combinatorial designs', 0.4095515012741089), ('square order', 0.37511396408081055), ('latin hypercube', 0.3717191815376282), ('orthogonal latin', 0.3524201810359955), ('mutually orthogonal latin', 0.3514713943004608)]" 446,446,67,446_optimal clustering_unsupervised clustering_clustering methods_clustering fundamental,"['optimal clustering', 'unsupervised clustering', 'clustering methods', 'clustering fundamental', 'optimal number clusters', 'clustering high', 'spectral clustering', 'clustering algorithms', 'clustering', 'means clustering']","['The information bottleneck and geometric clustering The information bottleneck (IB) approach to clustering takes a joint\ndistribution $P\\!\\left(X,Y\\right)$ and maps the data $X$ to cluster labels $T$\nwhich retain maximal information about $Y$ (Tishby et al., 1999). This\nobjective results in an algorithm that clusters data points based upon the\nsimilarity of their conditional distributions $P\\!\\left(Y\\mid X\\right)$. This\nis in contrast to classic ""geometric clustering\'\' algorithms such as $k$-means\nand gaussian mixture models (GMMs) which take a set of observed data points\n$\\left\\{ \\mathbf{x}_{i}\\right\\} _{i=1:N}$ and cluster them based upon their\ngeometric (typically Euclidean) distance from one another. Here, we show how to\nuse the deterministic information bottleneck (DIB) (Strouse and Schwab, 2017),\na variant of IB, to perform geometric clustering, by choosing cluster labels\nthat preserve information about data point location on a smoothed dataset. We\nalso introduce a novel method to choose the number of clusters, based on\nidentifying solutions where the tradeoff between number of clusters used and\nspatial information preserved is strongest. We apply this approach to a variety\nof simple clustering problems, showing that DIB with our model selection\nprocedure recovers the generative cluster labels. We also show that, in\nparticular limits of our model parameters, clustering with DIB and IB is\nequivalent to $k$-means and EM fitting of a GMM with hard and soft assignments,\nrespectively. Thus, clustering with (D)IB generalizes and provides an\ninformation-theoretic perspective on these classic algorithms.\n', 'Some notes on the $k$-means clustering for missing data The classical $k$-means clustering requires a complete data matrix without\nmissing entries. As a natural extension of the $k$-means clustering for missing\ndata, the $k$-POD clustering has been proposed, which ignores the missing\nentries in the $k$-means clustering. This paper shows the inconsistency of the\n$k$-POD clustering even under the missing completely at random mechanism. More\nspecifically, the expected loss of the $k$-POD clustering can be represented as\nthe weighted sum of the expected $k$-means losses with parts of variables.\nThus, the $k$-POD clustering converges to the different clustering from the\n$k$-means clustering as the sample size goes to infinity. This result indicates\nthat although the $k$-means clustering works well, the $k$-POD clustering may\nfail to capture the hidden cluster structure. On the other hand, for\nhigh-dimensional data, the $k$-POD clustering could be a suitable choice when\nthe missing rate in each variable is low.\n', 'A provable initialization and robust clustering method for general\n mixture models Clustering is a fundamental tool in statistical machine learning in the\npresence of heterogeneous data. Most recent results focus primarily on optimal\nmislabeling guarantees when data are distributed around centroids with\nsub-Gaussian errors. Yet, the restrictive sub-Gaussian model is often invalid\nin practice since various real-world applications exhibit heavy tail\ndistributions around the centroids or suffer from possible adversarial attacks\nthat call for robust clustering with a robust data-driven initialization. In\nthis paper, we present initialization and subsequent clustering methods that\nprovably guarantee near-optimal mislabeling for general mixture models when the\nnumber of clusters and data dimensions are finite. We first introduce a hybrid\nclustering technique with a novel multivariate trimmed mean type centroid\nestimate to produce mislabeling guarantees under a weak initialization\ncondition for general error distributions around the centroids. A matching\nlower bound is derived, up to factors depending on the number of clusters. In\naddition, our approach also produces similar mislabeling guarantees even in the\npresence of adversarial outliers. Our results reduce to the sub-Gaussian case\nin finite dimensions when errors follow sub-Gaussian distributions. To solve\nthe problem thoroughly, we also present novel data-driven robust initialization\ntechniques and show that, with probabilities approaching one, these initial\ncentroid estimates are sufficiently good for the subsequent clustering\nalgorithm to achieve the optimal mislabeling rates. Furthermore, we demonstrate\nthat the Lloyd algorithm is suboptimal for more than two clusters even when\nerrors are Gaussian and for two clusters when error distributions have heavy\ntails. Both simulated data and real data examples further support our robust\ninitialization procedure and clustering algorithm.\n']","[('optimal clustering', 0.6640930771827698), ('unsupervised clustering', 0.6129897236824036), ('clustering methods', 0.5813641548156738), ('clustering fundamental', 0.5767962336540222), ('optimal number clusters', 0.5672590136528015), ('clustering high', 0.5541749000549316), ('spectral clustering', 0.5424906015396118), ('clustering algorithms', 0.542026698589325), ('clustering', 0.541009247303009), ('means clustering', 0.518790602684021)]" 447,447,67,447_finite coloring_number monochromatic_finite colouring_coloring mathbb,"['finite coloring', 'number monochromatic', 'finite colouring', 'coloring mathbb', 'number colors', 'contains monochromatic', 'colorings', 'monochromatic', 'every coloring', 'coloring']","['Almost-monochromatic sets and the chromatic number of the plane In a colouring of $\\mathbb{R}^d$ a pair $(S,s_0)$ with $S\\subseteq\n\\mathbb{R}^d$ and with $s_0\\in S$ is \\emph{almost monochromatic} if $S\\setminus\n\\{s_0\\}$ is monochromatic but $S$ is not. We consider questions about finding\nalmost monochromatic similar copies of pairs $(S,s_0)$ in colourings of\n$\\mathbb{R}^d$, $\\mathbb{Z}^d$, and in $\\mathbb{Q}$ under some restrictions on\nthe colouring.\n Among other results, we characterise those $(S,s_0)$ with $S\\subseteq\n\\mathbb{Z}$ for which every finite colouring of $\\mathbb{R}$ without an\ninfinite monochromatic arithmetic progression contains an almost monochromatic\nsimilar copy of $(S,s_0)$. We also show that if $S\\subseteq \\mathbb{Z}^d$ and\n$s_0$ is outside of the convex hull of $S\\setminus \\{s_0\\}$, then every finite\ncolouring of $\\mathbb{R}^d$ without a similar monochromatic copy of\n$\\mathbb{Z}^d$ contains an almost monochromatic similar copy of $(S,s_0)$.\n Further, we propose an approach of finding almost-monochromatic sets that\nmight lead to a non-computer assisted proof of $\\chi(\\R^2)\\geq 5$.\n', 'Integer colorings with no rainbow $k$-term arithmetic progression In this paper, we study the rainbow Erd\\H{o}s-Rothschild problem with respect\nto $k$-term arithmetic progressions. For a set of positive integers $S\n\\subseteq [n]$, an $r$-coloring of $S$ is \\emph{rainbow $k$-AP-free} if it\ncontains no rainbow $k$-term arithmetic progression. Let $g_{r,k}(S)$ denote\nthe number of rainbow $k$-AP-free $r$-colorings of $S$. For sufficiently large\n$n$ and fixed integers $r\\ge k\\ge 3$, we show that $g_{r,k}(S) 0$ for every\n$0\\le i\\le n-1$, then $f(x)$ has at most $gcd(\\nu_p(a_0),n)$ irreducible\nfactors over the field $\\mathbb{Q}$ of rational numbers and each irreducible\nfactor has degree at least $n/gcd(\\nu_p(a_0),n)$. The goal of this paper is to\ngeneralize this criterion in the following context: Let $(K,\\nu)$ be a rank one\ndiscrete valued field, $R_\\nu$ its valuation ring and $\\mathbb{F}_\\nu$ its\nresidue field. Assume that $f(x)=\\phi^n(x) + a_{n- 1}(x)\\phi^{n-1}(x)+\\cdot+\na_0(x)\\in R_\\nu[x]$, with for every $i=0,\\dots,n-1$, $a_i(x)\\in R_\\nu[x]$, and\n$a_0(x)\\neq 0$ for some monic polynomial $\\phi\\in R_\\nu[x]$ with\n$\\overline{\\phi}$ is irreducible in $\\mathbb{F}_\\nu[x]$. If for every $0\\le\ni\\le n-1$, $n\\nu_p(a_i)\\ge (n-i)\\nu_p(a_0)>0$,} then $f(x)$ has at most\n$gcd(\\nu_p(a_0(x)),n)$ irreducible factors over the field $K^h$ and so over $K$\nand each irreducible factor has degree at least $n/gcd(\\nu_p(a_0),n)$, where\n$K^h$ is the henselization of $(K,\\nu)$.\n']","[('irreducible polynomials', 0.6165496706962585), ('polynomials irreducible', 0.5998358726501465), ('number irreducible factors', 0.57880038022995), ('polynomials finite fields', 0.5739825367927551), ('factorization polynomials', 0.5648220181465149), ('polynomials integer coefficients', 0.5489695072174072), ('irreducibility criterion', 0.5409563183784485), ('number irreducible', 0.5370399951934814), ('irreducible factors', 0.5282518863677979), ('monic polynomials', 0.5270919799804688)]" 451,451,67,451_constraint satisfaction_constraint satisfaction problems_complexity dichotomy_categorical structures,"['constraint satisfaction', 'constraint satisfaction problems', 'complexity dichotomy', 'categorical structures', 'finite structures', 'relational structures', 'complexity classes', 'proof systems', 'proof complexity', 'complexity classification']","[""Proof complexity of CSP The CSP (constraint satisfaction problems) is a class of problems deciding\nwhether there exists a homomorphism from an instance relational structure to a\ntarget one. The CSP dichotomy is a profound result recently proved by Zhuk\n(2020, J. ACM, 67) and Bulatov (2017, FOCS, 58). It establishes that for any\nfixed target structure, CSP is either NP-complete or $p$-time solvable. Zhuk's\nalgorithm solves CSP in polynomial time for constraint languages having a weak\nnear-unanimity polymorphism.\n For negative instances of $p$-time CSPs, it is reasonable to explore their\nproof complexity. We show that the soundness of Zhuk's algorithm can be proved\nin a theory of bounded arithmetic, namely in the theory $V^1$ augmented by\nthree special universal algebra axioms. This implies that any propositional\nproof system that simulates both Extended Resolution and a theory that proves\nthe three axioms admits $p$-size proofs of all negative instances of a fixed\n$p$-time CSP.\n"", '\\omega-categorical structures avoiding height 1 identities The algebraic dichotomy conjecture for Constraint Satisfaction Problems\n(CSPs) of reducts of (infinite) finitely bounded homogeneous structures states\nthat such CSPs are polynomial-time tractable if the model-complete core of the\ntemplate has a pseudo-Siggers polymorphism, and NP-complete otherwise.\n One of the important questions related to the dichotomy conjecture is\nwhether, similarly to the case of finite structures, the condition of having a\npseudo-Siggers polymorphism can be replaced by the condition of having\npolymorphisms satisfying a fixed set of identities of height 1, i.e.,\nidentities which do not contain any nesting of functional symbols. We provide a\nnegative answer to this question by constructing for each non-trivial set of\nheight 1 identities a structure within the range of the conjecture whose\npolymorphisms do not satisfy these identities, but whose CSP is tractable\nnevertheless.\n An equivalent formulation of the dichotomy conjecture characterizes\ntractability of the CSP via the local satisfaction of non-trivial height 1\nidentities by polymorphisms of the structure. We show that local satisfaction\nand global satisfaction of non-trivial height 1 identities differ for\n$\\omega$-categorical structures with less than doubly exponential orbit growth,\nthereby resolving one of the main open problems in the algebraic theory of such\nstructures.\n', 'Topology is relevant (in a dichotomy conjecture for infinite-domain\n constraint satisfaction problems) The algebraic dichotomy conjecture for Constraint Satisfaction Problems\n(CSPs) of reducts of (infinite) finitely bounded homogeneous structures states\nthat such CSPs are polynomial-time tractable when the model-complete core of\nthe template has a pseudo-Siggers polymorphism, and NP-complete otherwise.\n One of the important questions related to this conjecture is whether,\nsimilarly to the case of finite structures, the condition of having a\npseudo-Siggers polymorphism can be replaced by the condition of having\npolymorphisms satisfying a fixed set of identities of height 1, i.e.,\nidentities which do not contain any nesting of functional symbols. We provide a\nnegative answer to this question by constructing for each non-trivial set of\nheight 1 identities a structure whose polymorphisms do not satisfy these\nidentities, but whose CSP is tractable nevertheless.\n An equivalent formulation of the dichotomy conjecture characterizes\ntractability of the CSP via the local satisfaction of non-trivial height 1\nidentities by polymorphisms of the structure. We show that local satisfaction\nand global satisfaction of non-trivial height 1 identities differ for\n$\\omega$-categorical structures with less than double exponential orbit growth,\nthereby resolving one of the main open problems in the algebraic theory of such\nstructures.\n']","[('constraint satisfaction', 0.5693583488464355), ('constraint satisfaction problems', 0.532406747341156), ('complexity dichotomy', 0.5217820405960083), ('categorical structures', 0.46494656801223755), ('finite structures', 0.46486642956733704), ('relational structures', 0.4617173969745636), ('complexity classes', 0.45548179745674133), ('proof systems', 0.43313589692115784), ('proof complexity', 0.42851608991622925), ('complexity classification', 0.422303706407547)]" 452,452,67,452_modular lattices_lattices introduced_planar lattices_lattices general,"['modular lattices', 'lattices introduced', 'planar lattices', 'lattices general', 'finite lattices', 'lattices short', 'finite distributive lattices', 'lattices', 'lattices two', 'congruence lattices']","[""On slim rectangular lattices Let $L$ be a slim, planar, semimodular lattice (slim means that it does not\ncontain an ${\\mathsf M}_3$-sublattice). We call the interval $I = [o, i]$ of\n$L$ \\emph{rectangular}, if there are complementary $a, b \\in I$ such that $a$\nis to the left of $b$. We claim that a rectangular interval of a slim\nrectangular lattice is also a slim rectangular lattice. We will present some\napplications, including a recent result of G. Cz\\'edli.\n In a paper with E. Knapp about a dozen years ago, we introduced natural\ndiagrams} for slim rectangular lattices. Five years later, G. Cz\\'edli\nintroduced ${\\E C}_1$-diagrams} We prove that they are the same.\n"", 'Slim patch lattices as absolute retracts and maximal lattices Patch lattices, introduced by G. Cz\\\'edli and E.T. Schmidt in 2013, are the\nbuilding stones for slim (and so necessarily finite and planar) semimodular\nlattices with respect to gluing. Slim semimodular lattices were introduced by\nG. Gr\\""atzer and E. Knapp in 2007, and they have been intensively studied since\nthen. Outside lattice theory, these lattices played the main role in adding a\nuniqueness part to the classical Jordan--H\\""older theorem for groups by G.\nCz\\\'edli and E.T. Schmidt in 2011, and they also led to results in\ncombinatorial geometry. In this paper, we prove that slim patch lattices are\nexactly the absolute retracts with more than two elements for the category of\nslim semimodular lattices with length-preserving lattice embeddings as\nmorphisms. Also, slim patch lattices are the same as the maximal objects $L$ in\nthis category such that $|L|>2$. Furthermore, slim patch lattices are\ncharacterized as the algebraically closed lattices $L$ in this category such\nthat $|L|>2$. Finally, we prove that if we consider $\\{0,1\\}$-preserving\nlattice homomorphisms rather than length-preserving ones, then the absolute\nretracts for the class of slim semimodular lattices are the at most 4-element\nboolean lattices.\n', 'Lamps in slim rectangular planar semimodular lattices A planar (upper) semimodular lattice $L$ is slim if the five-element\nnondistributive modular lattice $M_3$ does not occur among its sublattices.\n(Planar lattices are finite by definition.) Slim rectangular lattices as\nparticular slim planar semimodular lattices were defined by G. Gr\\""atzer and E.\nKnapp in 2007. In 2009, they also proved that the congruence lattices of slim\nplanar semimodular lattices with at least three elements are the same as those\nof slim rectangular lattices. In order to provide an effective tool for\nstudying these congruence lattices, we introduce the concept of lamps of slim\nrectangular lattices and prove several of their properties. Lamps and several\ntools based on them allow us to prove in a new and easy way that the congruence\nlattices of slim planar semimodular lattices satisfy the two previously known\nproperties. Also, we use lamps to prove that these congruence lattices satisfy\nfour new properties including the two-pendant four-crown property and the\nforbidden marriage property.\n']","[('modular lattices', 0.6779797077178955), ('lattices introduced', 0.6768861413002014), ('planar lattices', 0.6715413331985474), ('lattices general', 0.6671714186668396), ('finite lattices', 0.6614130735397339), ('lattices short', 0.65742427110672), ('finite distributive lattices', 0.657025933265686), ('lattices', 0.6569386124610901), ('lattices two', 0.6545324921607971), ('congruence lattices', 0.6542240381240845)]" 453,453,66,453_plato_mathematician_history mathematics_mathematicians,"['plato', 'mathematician', 'history mathematics', 'mathematicians', 'modern mathematical', 'ptolemy', 'mathematical knowledge', 'mathematics', 'euclid', 'greek']","[""Clairaut, Euler and the figure of the Earth The sphericity of the form of the Earth was questioned around the year 1687,\nprimarily, by Isaac Newton who deduced from his theory of universal gravitation\nthat the Earth has the form of a spheroid flattened at the poles and elongated\nat the equator. In France, somepreeminent geographers were not convinced by\nNewton's arguments, and about the same period, based on empirical measurements,\nthey emitted another theory, claiming that on the contrary, the Earth has the\nform of a spheroid flattened at the equator and elongated at the poles. To find\nthe real figure of the Earth became one of the major questions that were\ninvestigated by geographers, astronomers, mathematicians and other scientists\nin the eighteenth century, and the work done around this question had an impact\non the development of all these fields. In this paper, we review the work of\nthe eighteenth-century French mathematician, astronomer and geographer\nAlexis-Claude Clairaut related to the question of the figure of the Earth. We\nreport on the relation between this work and that of Leonhard Euler. At the\nsame time, we comment on the impact of the question of the figure of the Earth\non mathematics, astronomy and hydrostatics. Finally, we review some later\nmathematical developments that are due to various authors that were motivated\nby this question. It is interesting to see how a question on geography had such\nan impact on the theoretical sciences. The final version of this paper will\nappear in Ganita Bh{\\=a}r{\\=a}t{\\=i}, (Indian Mathematics) the Bulletin of the\nIndian Society for History of Mathematics.\n"", ""Truth and Knowledge: the Incorrect Definition of `Powers' by\n Theaetetus-A New Interpretation of Theaetetus (147d7-148b2) In a first article (referred here as B-O), we studied the first part of the\nso-called 'mathematical part' of Plato's Theaetetus, i.e. Theodorus' lesson. In\nthe present one, we consider the sequel and the end of the passage\n(147d7-148b2), as well as its philosophical interpretation in connection with\nthe whole dialogue. As in the previous article, we analyze it simultaneously\nfrom the mathematical, the historical and the philosophical points of view, a\nnecessity to understand it. Our strategy is once again to take seriously\nPlato's text, not as the dream of a poet. Our analysis casts a new light on\nthis passage, as an essential testimony for both Plato's philosophy and for\nhistory of mathematics. Plato's relation to Theodorus and Theaetetus is more\ncomplex than usually claimed; the search for a definition of knowledge\nconducted in a large part of the dialogue and even in some other dialogues is\nrooted in the mathematical passage; it needs a reevaluation of its connection\nto Euclid's Elements, in particular the proposition X.9, as well as a supposed\nEuclid's 'catastrophic' mistake (to quote Jean Itard) on incommensurability. In\na nutshell, the passage has to be understood differently than in the usual\ninterpretations gathered together under the collective so-called name 'Modern\nStandard Interpretation' (or MSI). Both articles form a whole. They are both\naimed to an audience without any particular mathematical background, and\nrequire only elementary mathematical knowledge, essentially of high\nschool-level. Some more complex points are developed in an Appendix at the end\nof the article.\n"", ""Theodorus' lesson in Plato's Theaetetus (147d1-d6) Revisited-A New\n Perspective This article is the first part of a study of the so-called 'mathematical\npart' of Plato's Theaetetus (147d-148b). The subject of this 'mathematical\npart' is the irrationality, one of the most important topics in early Greek\nmathematics. As of huge interest for mathematicians, historians of mathematics\nas well as of philosophy, there had been an avalanche of studies about it. In\nour work, we revisit this question, for we think something is missing: a global\nanalysis of Plato's text, from these three points of view simultaneously:\nhistory, mathematics and philosophy. It is what we have undertook through a new\ntranslation, a new interpretation of the mathematical lesson about irrational\nmagnitudes and a novel interpretation of the whole passage from these three\npoints of view. Our guideline is considering Plato's writings seriously, not as\nsome playful work. This simple rule is indeed surprisingly constraining, but it\nallows us to get a rare direct glance inside pre-Euclidean mathematics, in\ncontradiction with the 'Main Standard Interpretation' prevailing in history of\nmathematics as well as in history of philosophy. This study had been divided in\ntwo parts for editorial reasons. In the present article, we propose an analysis\nof the first part of this 'mathematical part', Theodorus' lesson. In the second\narticle (Brisson-Ofman (to appear)), we present the sequel of the lesson and a\nphilosophical interpretation of the 'mathematical part' within the framework of\nthe entire dialogue. Both articles form a whole. They are both aimed to an\naudience without any particular mathematical background, and require only\nelementary mathematical knowledge, essentially of high school-level. Some more\ndelicate points are nevertheless developed in the Appendices.\n""]","[('plato', 0.5039989352226257), ('mathematician', 0.4897053837776184), ('history mathematics', 0.47836726903915405), ('mathematicians', 0.4480035603046417), ('modern mathematical', 0.4465402364730835), ('ptolemy', 0.437541127204895), ('mathematical knowledge', 0.4308575391769409), ('mathematics', 0.4005937874317169), ('euclid', 0.39122024178504944), ('greek', 0.3611803352832794)]" 454,454,66,454_multipartite entanglement_entanglement measures_maximally entangled states_multipartite quantum,"['multipartite entanglement', 'entanglement measures', 'maximally entangled states', 'multipartite quantum', 'entanglement theory', 'distillable entanglement', 'entanglement', 'bipartite quantum states', 'entangled states', 'maximally entangled']","['Entanglement monogamy via multivariate trace inequalities Entropy is a fundamental concept in quantum information theory that allows to\nquantify entanglement and investigate its properties, for example its monogamy\nover multipartite systems. Here, we derive variational formulas for relative\nentropies based on restricted measurements of multipartite quantum systems. By\ncombining these with multivariate matrix trace inequalities, we recover and\nsometimes strengthen various existing entanglement monogamy inequalities. In\nparticular, we give direct, matrix-analysis-based proofs for the faithfulness\nof squashed entanglement by relating it to the relative entropy of entanglement\nmeasured with one-way local operations and classical communication, as well as\nfor the faithfulness of conditional entanglement of mutual information by\nrelating it to the separably measured relative entropy of entanglement. We\ndiscuss variations of these results using the relative entropy to states with\npositive partial transpose, and multipartite setups. Our results simplify and\ngeneralize previous derivations in the literature that employed operational\narguments about the asymptotic achievability of information-theoretic tasks.\n', 'Constructing Multipartite Planar Maximally Entangled States from Phase\n States and Quantum Secret Sharing Protocol In this paper, we explore the construction of Planar Maximally Entangled\n(PME) states from phase states. PME states form a class of $n$-partite states\nin which any subset of adjacent particles whose size is less than or equal to\nhalf the total number of particles is in a fully entangled state. This property\nis essential to ensuring the robustness and stability of PME states in various\nquantum information applications. We introduce phase states for a set of\nso-called noninteracting $n$ particles and describe their corresponding\nseparable density matrices. These phase states, although individually\nseparable, serve as a starting point for the generation of entangled states\nwhen subjected to unitary dynamics. Using this method, we suggest a way to make\ncomplex multi-qubit states by watching how unconnected phase states change over\ntime with a certain unitary interaction operator. In addition, we show how to\nderive PME states from these intricate phase states for two-, three-, four-,\nand K-qubit systems. This construction method for PME states represents a\nsignificant advance over absolutely maximally entangled (AME) states, as it\nprovides a more accessible and versatile resource for quantum information\nprocessing. Not only does it enable the creation of a broader class of\nmultipartite entangled states, overcoming the limitations of AME states,\nnotably their restricted availability in low-dimensional systems; for example,\nthe absence of a four-qubit AME state, but it also offers a systematic\nconstruction method for any even number of qudits, paving the way for practical\napplications in key quantum technologies such as teleportation, secret sharing\nand error correction, where multipartite entanglement plays a central role in\nprotocol efficiency.\n', 'Multipartite entanglement measures The main concern of this paper is how to define proper measures of\nmultipartite entanglement for mixed quantum states. Since the structure of\npartial separability and multipartite entanglement is getting complicated if\nthe number of subsystems exceeds two, one can not expect the existence of an\nultimate scalar entanglement measure, which grasps even a small part of the\nrich hierarchical structure of multipartite entanglement, and some higher order\nstructure characterizing that is needed. In this paper we make some steps\ntowards this direction.\n First, we reveal the lattice-theoretic structure of the partial separability\nclassification, introduced earlier [Sz. Szalay and Z. Kokenyesi, Phys. Rev. A\n86, 032341 (2012)]. It turns out that, mathematically, the structure of the\nentanglement classes is the up-set lattice of the structure of the different\nkinds of partial separability, which is the down-set lattice of the lattice of\nthe partitions of the subsystems. It turns also out that, physically, this\nstructure is related to the LOCC convertibility: If a state from a class can be\nmapped into another one, then that class can be found higher in the hierarchy.\n Second, we introduce the notion of multipartite monotonicity, expressing that\na given set of entanglement monotones, while measuring the different kinds of\nentanglement, shows also the same hierarchical structure as the entanglement\nclasses. Then we construct such hierarchies of entanglement measures, and\npropose a physically well-motivated one, being the direct multipartite\ngeneralization of the entanglement of formation based on the entanglement\nentropy, motivated by the notion of statistical distinguishability. The\nmultipartite monotonicity shown by this set of measures motivates us to\nconsider the measures to be the different manifestations of some ""unified""\nnotion of entanglement.\n']","[('multipartite entanglement', 0.7728949785232544), ('entanglement measures', 0.6769061088562012), ('maximally entangled states', 0.6730167865753174), ('multipartite quantum', 0.6721490025520325), ('entanglement theory', 0.6660071611404419), ('distillable entanglement', 0.6612447500228882), ('entanglement', 0.6515666246414185), ('bipartite quantum states', 0.640624463558197), ('entangled states', 0.636874258518219), ('maximally entangled', 0.6177203059196472)]" 455,455,66,455_existence global attractors_existence global attractor_exponential attractors_attractors time,"['existence global attractors', 'existence global attractor', 'exponential attractors', 'attractors time', 'infinite dimensional dynamical', 'existence time dependent', 'diffusion unbounded', 'dimensional dynamical', 'global attractors', 'establish existence regularity']","['Existence and upper semicontinuity of pullback attractors for Kirchhoff\n wave equations in time-dependent spaces In this paper, we shall investigate the existence and upper semicontinuity of\npullback attractors for non-autonomous Kirchhoff wave equations with a strong\ndamping in the time-dependent space $X_t$. After deriving the existence and\nuniqueness of solutions by the Faedo-Galerkin approximation method, we\nestablish the existence of pullback attractors. Later on, we prove the upper\nsemicontinuity of pullback attractors between the Kirchhoff-type wave equations\nwith $\\delta \\geq 0$ and the conventional wave equations with $\\delta=0$ by a\nseries of complex energy estimates.\n', 'Continuity of the attractors in time-dependent spaces and applications In this paper, we investigate the continuity of the attractors in\ntime-dependent phase spaces. (i) We establish two abstract criteria on the\nupper semicontinuity and the residual continuity of the pullback $\\mathscr\nD$-attractor with respect to the perturbations, and an equivalence criterion\nbetween their continuity and the pullback equi-attraction, which generalize the\ncontinuity theory of attractors developed recently in [27,28] to that in\ntime-dependent spaces. (ii) We propose the notion of pullback $\\mathscr\nD$-exponential attractor, which includes the notion of time-dependent\nexponential attractor [33] as its spacial case, and establish its existence and\nH\\""{o}lder continuity criterion via quasi-stability method introduced\noriginally by Chueshov and Lasiecka [12,13]. (iii) We apply above-mentioned\ncriteria to the semilinear damped wave equations with perturbed time-dependent\nspeed of propagation: $\\e\\rho(t) u_{tt}+\\alpha u_t -\\Delta u+f(u)=g$, with\nperturbation parameter $\\e\\in(0, 1]$, to realize above mentioned continuity of\npullback $\\mathscr D$ and $\\mathscr D$-exponential attractors in time-dependent\nphase spaces, and the method developed here allows to overcome the difficulty\nof the hyperbolicity of the model. These results deepen and extend recent\ntheory of attractors in time-dependent spaces in literatures [15,20,19].\n', 'Existence and dimensions of global attractors for a delayed\n reaction-diffusion equation on an unbounded domain The purpose of this paper is to investigate the existence and Hausdorff\ndimension as well as fractal dimension of global attractors for a delayed\nreaction-diffusion equation on an unbounded domain. The noncompactness of the\ndomain causes the Laplace operator has a continuous spectrum, the semigroup\ngenerated by the linear part and the Sobolev embeddings are no longer compact,\nmaking the problem more difficult compared with the equations on bounded\ndomains. We first obtain the existence of an absorbing set for the infinite\ndimensional dynamical system generated by the equation by a priori estimate of\nthe solutions. Then, we show the asymptotic compactness of the solution\nsemiflow by an uniform a priori estimates for far-field values of solutions\ntogether with the Arzel\\`a-Ascoli theorem, which facilitates us to show the\nexistence of global attractors. By decomposing the solution into three parts\nand establishing a squeezing property of each part, we obtain the explicit\nupper estimation of both Hausdorff and fractal dimension of the global\nattractors, which only depend on the inner characteristic of the equation,\nwhile not related to the entropy number compared with the existing literature.\n']","[('existence global attractors', 0.5759610533714294), ('existence global attractor', 0.5617557168006897), ('exponential attractors', 0.5226115584373474), ('attractors time', 0.5164950489997864), ('infinite dimensional dynamical', 0.4909083843231201), ('existence time dependent', 0.4449940323829651), ('diffusion unbounded', 0.43921607732772827), ('dimensional dynamical', 0.4353099465370178), ('global attractors', 0.41519853472709656), ('establish existence regularity', 0.4093858599662781)]" 456,456,66,456_maximum number edges_planar graph vertices_vertex planar graph_number edges vertex,"['maximum number edges', 'planar graph vertices', 'vertex planar graph', 'number edges vertex', 'planar graph', 'vertex planar', 'extremal graphs', 'tur number graph', 'number edges', 'vertex free']","[""Planar Tur\\'an number of two adjacent cycles The planar Tur\\'an number of $H$, denoted by $ex_{\\mathcal{P}}(n,H)$, is the maximum number of edges in an $n$-vertex $H$-free planar graph. The planar Tur\\'an number of $k(k\\geq 3)$ vertex-disjoint union of cycles is the trivial value $3n-6$. We determine the planar Tur\\'an number of $C_{3}\\text{-}C_{3}$ and $C_{3}\\text{-}C_{4}$, where $C_{k}\\text{-}C_{\\ell}$ denotes the graph consisting of two disjoint cycles $C_k$ with an edge connecting them."", ""The planar Tur\\'an number of double star $S_{2,4}$ Planar Tur\\'an number $ex_{\\mathcal{P}}(n,H)$ of $H$ is the maximum number of\nedges in an $n$-vertex planar graph which does not contain $H$ as a subgraph.\nGhosh, Gy\\H{o}ri, Paulos and Xiao initiated the topic of the planar Tur\\'an\nnumber for double stars. In this paper, we prove that\n$ex_{\\mathcal{P}}(n,S_{2,4})\\leq \\frac{31}{14}n$ for $n\\geq 1$, and show that\nequality holds for infinitely many integers $n$.\n"", ""Planar Tur\\'an number of the 7-cycle The $\\textit{planar Tur\\'an number}$ $\\textrm{ex}_{\\mathcal P}(n,H)$ of a\ngraph $H$ is the maximum number of edges in an $n$-vertex planar graph without\n$H$ as a subgraph. Let $C_{\\ell}$ denote the cycle of length $\\ell$. The planar\nTur\\'an number $\\textrm{ex}_{\\mathcal P}(n,C_{\\ell})$ behaves differently for\n$\\ell\\le 10$ and for $\\ell\\ge 11$, and it is known when $\\ell \\in \\{3,4,5,6\\}$.\nWe prove that $\\textrm{ex}_{\\mathcal P}(n,C_7) \\le \\frac{18n}{7} -\n\\frac{48}{7}$ for all $n > 38$, and show that equality holds for infinitely\nmany integers $n$.\n""]","[('maximum number edges', 0.5546605587005615), ('planar graph vertices', 0.5392929315567017), ('vertex planar graph', 0.5330348014831543), ('number edges vertex', 0.5271874666213989), ('planar graph', 0.5039851665496826), ('vertex planar', 0.4971644878387451), ('extremal graphs', 0.4968205988407135), ('tur number graph', 0.4807385206222534), ('number edges', 0.4580439329147339), ('vertex free', 0.45229020714759827)]" 457,457,66,457_abelian defect_blocks finite groups_defect group_block algebras,"['abelian defect', 'blocks finite groups', 'defect group', 'block algebras', 'morita equivalence classes', 'group block', 'conjecture blocks', 'corresponding blocks', 'equivalences morita type', 'picard groups']","['2-blocks with an abelian defect group and a freely acting cyclic\n inertial quotient We study blocks with an abelian defect group and a cyclic inertial quotient\nacting freely but not transitively. We prove that when p=2, such blocks are\ninertial, i.e. basic Morita equivalent to their Brauer correspondent. Together\nwith a result of the second author on Singer cycle actions on homocyclic defect\ngroups, this completes the classification of 2-blocks with a cyclic inertial\nquotient acting freely on an abelian defect group.\n', ""Brou\\'e's Conjecture for 2-blocks with elementary abelian defect groups\n of order 32 The first author has recently classified the Morita equivalence classes of\n2-blocks B of finite groups with elementary abelian defect group of order 32.\nIn all but three cases he proved that the Morita equivalence class determines\nthe inertial quotient of B. We finish the remaining cases by utilizing the\ntheory of lower defect groups. As a corollary, we verify Brou\\'e's Abelian\nDefect Group Conjecture in this situation.\n"", ""Morita equivalence classes of $2$-blocks with abelian defect groups of\n rank $4$ We classify all $2$-blocks with abelian defect groups of rank $4$ up to\nMorita equivalence. The classification holds for blocks over a suitable\ndiscrete valuation ring as well as for those over an algebraically closed\nfield. An application is that Brou\\'{e}'s abelian defect group conjecture holds\nfor all blocks under consideration here.\n""]","[('abelian defect', 0.6014416813850403), ('blocks finite groups', 0.5893712639808655), ('defect group', 0.5319609642028809), ('block algebras', 0.4966319501399994), ('morita equivalence classes', 0.45066753029823303), ('group block', 0.444175660610199), ('conjecture blocks', 0.4433278441429138), ('corresponding blocks', 0.44204768538475037), ('equivalences morita type', 0.42973560094833374), ('picard groups', 0.428396999835968)]" 458,458,66,458_fractional differential equations_hilfer fractional derivative_nonlinear fractional differential_fractional integro differential,"['fractional differential equations', 'hilfer fractional derivative', 'nonlinear fractional differential', 'fractional integro differential', 'fractional differential', 'fractional derivatives', 'type fractional differential', 'riemann liouville fractional', 'fractional derivative', 'nonlinear fractional']","['On the Nonlinear $\\Psi$-Hilfer Hybrid Fractional Differential Equations In this paper, we initially derive the equivalent fractional integral\nequation to $\\Psi$-Hilfer hybrid fractional differential equations and through\nit, we prove the existence of a solution in the weighted space. The primary\nobjective of the paper is to obtain estimates on $\\Psi$-Hilfer derivative and\nutilize it to derive the hybrid fractional differential inequalities involving\n$\\Psi$-Hilfer derivative. With the assistance of these fractional differential\ninequalities, we determine the existence of extremal solutions, comparison\ntheorems and uniqueness of the solution.\n', ""On the Nonlinear $\\Psi$-Hilfer Fractional Differential Equations We consider the nonlinear Cauchy problem for $ \\Psi $- Hilfer fractional\ndifferential equations and investigate the existence, interval of existence and\nuniqueness of solution in the weighted space of functions. The continuous\ndependence of solutions on initial conditions is proved via Weissinger fixed\npoint theorem. Picard's successive approximation method has been developed to\nsolve nonlinear Cauchy problem for differential equations with $ \\Psi $- Hilfer\nfractional derivative and an estimation have been obtained for the error bound.\nFurther, by Picard's successive approximation, we derive the representation\nformula for the solution of linear Cauchy problem for $ \\Psi $-Hilfer\nfractional differential equation with constant coefficient and variable\ncoefficient in terms of Mittag-Leffler function and Generalized (Kilbas-Saigo)\nMittag-Leffler function.\n"", 'Nonlocal Boundary Value Problem for Generalized Hilfer Implicit\n Fractional Differential Equations In this paper, we derive the equivalent fractional integral equation to the\nnonlinear implicit fractional differential equations involving $\\varphi$-Hilfer\nfractional derivative subject to nonlocal fractional integral boundary\nconditions. The existence of a solution, Ulam-Hyers, and Ulam-Hyers-Rassias\nstability has been acquired by means equivalent fractional integral equation.\nOur investigations depend on the fixed point theorem due to Krasnoselskii and\nthe Gronwall inequality involving $\\varphi$-Riemann--Liouville fractional\nintegral. An example is provided to show the utilization of primary outcomes.\n']","[('fractional differential equations', 0.6864091157913208), ('hilfer fractional derivative', 0.6749805808067322), ('nonlinear fractional differential', 0.6513458490371704), ('fractional integro differential', 0.6033055782318115), ('fractional differential', 0.5974915623664856), ('fractional derivatives', 0.5963417291641235), ('type fractional differential', 0.5862515568733215), ('riemann liouville fractional', 0.5855101346969604), ('fractional derivative', 0.5849968791007996), ('nonlinear fractional', 0.5793638229370117)]" 459,459,66,459_conformal prediction_conformal inference_conformity_methods conformal,"['conformal prediction', 'conformal inference', 'conformity', 'methods conformal', 'conformalized', 'conformal', 'weighted conformal', 'non conformity', 'prediction methods', 'prediction cp']","['Unifying Different Theories of Conformal Prediction This paper presents a unified framework for understanding the methodology and\ntheory behind several different methods in the conformal prediction literature,\nwhich includes standard conformal prediction (CP), weighted conformal\nprediction (WCP), nonexchangeable conformal prediction (NexCP), and\nrandomly-localized conformal prediction (RLCP), among others. At the crux of\nour framework is the idea that conformal methods are based on revealing partial\ninformation about the data at hand, and positing a conditional distribution for\nthe data given the partial information. Different methods arise from different\nchoices of partial information, and of the corresponding (approximate)\nconditional distribution. In addition to recovering and unifying existing\nresults, our framework leads to both new theoretical guarantees for existing\nmethods, and new extensions of the conformal methodology.\n', 'Localized Conformal Prediction: A Generalized Inference Framework for\n Conformal Prediction We propose a new inference framework called localized conformal prediction.\nIt generalizes the framework of conformal prediction by offering a\nsingle-test-sample adaptive construction that emphasizes a local region around\nthis test sample, and can be combined with different conformal score\nconstructions. The proposed framework enjoys an assumption-free finite sample\nmarginal coverage guarantee, and it also offers additional local coverage\nguarantees under suitable assumptions. We demonstrate how to change from\nconformal prediction to localized conformal prediction using several conformal\nscores, and we illustrate a potential gain via numerical examples.\n', 'Conformal prediction with localization We propose a new method called localized conformal prediction, where we can\nperform conformal inference using only a local region around a new test sample\nto construct its confidence interval. Localized conformal inference is a\nnatural extension to conformal inference. It generalizes the method of\nconformal prediction to the case where we can break the data exchangeability,\nso as to give the test sample a special role. To our knowledge, this is the\nfirst work that introduces such a localization to the framework of conformal\nprediction. We prove that our proposal can also have assumption-free and finite\nsample coverage guarantees, and we compare the behaviors of localized conformal\nprediction and conformal prediction in simulations.\n']","[('conformal prediction', 0.8031665086746216), ('conformal inference', 0.6939605474472046), ('conformity', 0.5734134912490845), ('methods conformal', 0.5389817953109741), ('conformalized', 0.5241352915763855), ('conformal', 0.5057578682899475), ('weighted conformal', 0.49680426716804504), ('non conformity', 0.4957426190376282), ('prediction methods', 0.45694443583488464), ('prediction cp', 0.43643811345100403)]" 460,460,66,460_quantile regression_regression quantile_quantile estimation_conditional quantiles,"['quantile regression', 'regression quantile', 'quantile estimation', 'conditional quantiles', 'quantile functions', 'conditional quantile', 'quantile based', 'quantile', 'quantile loss', 'quantiles']","['Smoothed Quantile Regression with Large-Scale Inference Quantile regression is a powerful tool for learning the relationship between\na response variable and a multivariate predictor while exploring heterogeneous\neffects. In this paper, we consider statistical inference for quantile\nregression with large-scale data in the ""increasing dimension"" regime. We\nprovide a comprehensive and in-depth analysis of a convolution-type smoothing\napproach that achieves adequate approximation to computation and inference for\nquantile regression. This method, which we refer to as {\\it{conquer}}, turns\nthe non-differentiable quantile loss function into a twice-differentiable,\nconvex and locally strongly convex surrogate, which admits a fast and scalable\nBarzilai-Borwein gradient-based algorithm to perform optimization, and\nmultiplier bootstrap for statistical inference. Theoretically, we establish\nexplicit non-asymptotic bounds on both estimation and Bahadur-Kiefer\nlinearization errors, from which we show that the asymptotic normality of the\nconquer estimator holds under a weaker requirement on the number of the\nregressors than needed for conventional quantile regression. Moreover, we prove\nthe validity of multiplier bootstrap confidence constructions. Our numerical\nstudies confirm the conquer estimator as a practical and reliable approach to\nlarge-scale inference for quantile regression. Software implementing the\nmethodology is available in the \\texttt{R} package \\texttt{conquer}.\n', 'A Simplified Condition For Quantile Regression Quantile regression is effective in modeling and inferring the conditional\nquantile given some predictors and has become popular in risk management due to\nwide applications of quantile-based risk measures. When forecasting risk for\neconomic and financial variables, quantile regression has to account for\nheteroscedasticity, which raises the question of whether the identification\ncondition on residuals in quantile regression is equivalent to one independent\nof heteroscedasticity. In this paper, we present some identification conditions\nunder three probability models and use them to establish simplified conditions\nin quantile regression.\n', ""Bayesian joint quantile autoregression Quantile regression continues to increase in usage, providing a useful\nalternative to customary mean regression. Primary implementation takes the form\nof so-called multiple quantile regression, creating a separate regression for\neach quantile of interest. However, recently, advances have been made in joint\nquantile regression, supplying a quantile function which avoids crossing of the\nregression across quantiles. Here, we turn to quantile autoregression (QAR),\noffering a fully Bayesian version. We extend the initial quantile regression\nwork of Koenker and Xiao (2006) in the spirit of Tokdar and Kadane (2012). We\noffer a directly interpretable parametric model specification for QAR. Further,\nwe offer a p-th order QAR(p) version, a multivariate QAR(1) version, and a\nspatial QAR(1) version. We illustrate with simulation as well as a temperature\ndataset collected in Arag\\'on, Spain.\n""]","[('quantile regression', 0.8011374473571777), ('regression quantile', 0.7843177914619446), ('quantile estimation', 0.7394453287124634), ('conditional quantiles', 0.6395343542098999), ('quantile functions', 0.6373835206031799), ('conditional quantile', 0.6373003125190735), ('quantile based', 0.6255989074707031), ('quantile', 0.6181362271308899), ('quantile loss', 0.5913863778114319), ('quantiles', 0.5893331170082092)]" 461,461,65,461_conformal field theory_liouville conformal field_conformal field theories_liouville conformal,"['conformal field theory', 'liouville conformal field', 'conformal field theories', 'liouville conformal', 'conformal bootstrap', 'conformal field', 'dimensional conformal field', 'dimensional conformal', 'conformal', 'liouville theory']","[""Segal's axioms and bootstrap for Liouville Theory In 1987 Graeme Segal gave a functorial definition of Conformal Field Theory (CFT) that was designed to capture the mathematical essence of the Conformal Bootstrap formalism pioneered in physics by Belavin-Polyakov-Zamolodchikov. In Segal's formulation the basic objects of CFT, the correlation functions of conformal primary fields, are viewed as functions on the moduli space of Riemann surfaces with marked points which behave naturally under gluing of surfaces. In this paper we give a probabilistic realization of Segal's axioms in Liouville Conformal Field Theory (LCFT) which is a CFT that plays a fundamental role in the theory of random surfaces and two dimensional quantum gravity. Then we use Segal's axioms to express the correlation functions of LCFT in terms of the basic objects of LCFT: its {\\it spectrum} and its {\\it structure constants}, determined in earlier works by the authors. As a consequence, we obtain a formula for the correlation functions as multiple integrals over the spectrum of LCFT, the structure of these integrals being associated to a pant decomposition of the surface. The integrand is the modulus squared of a function called conformal block: its structure is encoded by the commutation relations of an algebra of operators called the Virasoro algebra and it depends holomorphically on the moduli of the surface with marked points. The integration measure involves a product of structure constants, which have an explicit expression, the so called DOZZ formula."", ""Conformal Bootstrap for surfaces with boundary in Liouville CFT. Part 1:\n Segal axioms This paper is the first part of the proof of the conformal bootstrap for\nLiouville conformal field theory on surfaces with a boundary, devoted to\nSegal's axioms in this context. We introduce the notion of Segal's amplitudes\non surfaces with corners and prove the gluing property for such amplitudes. The\nsemi-group of half-annuli and its generator are studied and we develop the\nnecessary material for proving its spectral decomposition using scattering\ntheory in the companion paper \\cite{GRW2}. The Segal gluing properties and the\nspectral decomposition allows us to prove the conformal bootstrap formula for\ncorrelation functions of Liouville conformal field theory with a boundary. This\nhas several important applications to the study of conformal blocks\n(analyticity and convergence) in \\cite{remypreprint}, in the construction of a\nunitary representation of mapping class group in the space of conformal blocks,\nand the study of random moduli \\cite{ARSmoduliRPM} in Liouville quantum\ngravity.\n"", 'Stress-Energy in Liouville Conformal Field Theory on Compact Riemann\n Surfaces We derive the conformal Ward identities for the correlation functions of the\nStress--Energy tensor in probabilistic Liouville Conformal Field Theory on\ncompact Riemann surfaces by varying the correlation functions with respect to\nthe background metric. The conformal Ward identities show that the correlation\nfunctions of the Stress--Energy tensor can be expressed as a differential\noperator with meromorphic coefficient acting on the correlation functions of\nthe primary fields of Liouville Conformal Field Theory.\n Variations of the metric come in three different forms: reparametrizations,\nconformal scalings and deformations of the conformal structure. Conformal\nsymmetry makes it easy to treat variations of the metric that do not deform the\nconformal structure. Variations that deform the conformal structure have to be\ntreated separately, and this part of the computation relies on regularity and\nintegrability properties of the correlation functions of Liouville Conformal\nField Theory.\n']","[('conformal field theory', 0.7105077505111694), ('liouville conformal field', 0.7091464400291443), ('conformal field theories', 0.70110684633255), ('liouville conformal', 0.6841360330581665), ('conformal bootstrap', 0.6121594309806824), ('conformal field', 0.6072519421577454), ('dimensional conformal field', 0.592595636844635), ('dimensional conformal', 0.5772327780723572), ('conformal', 0.5593013763427734), ('liouville theory', 0.5490968227386475)]" 462,462,65,462_ehrhart polynomials_rational polytopes_ehrhart polynomial_polytopes lattice,"['ehrhart polynomials', 'rational polytopes', 'ehrhart polynomial', 'polytopes lattice', 'ehrhart quasi polynomial', 'rational polytope', 'lattice polytopes', 'lattice polytope', 'polynomials lattice', 'reflexive polytopes']","['A new class of magic positive Ehrhart polynomials of reflexive polytopes The magic positivity of Ehrhart polynomials is a useful tool for proving the\nreal-rootedness of the $h^\\ast$-polynomials. In this paper, we provide a new\nclass of reflexive polytopes whose Ehrhart polynomials are magic positive.\nFirst, we prove that the Ehrhart polynomials of Stasheff polytopes are magic\npositive. Second, we provide a partial proof of the magic positivity of the\nEhrhart polynomials of the dual polytopes of the symmetric edge polytopes of\ncycles.\n', 'Ehrhart Functions of Weighted Lattice Points This paper studies three different ways to assign weights to the lattice\npoints of a convex polytope and discusses the algebraic and combinatorial\nproperties of the resulting weighted Ehrhart functions and their generating\nfunctions and associated rings. These will be called $q$-weighted,\n$r$-weighted, and $s$-weighted Ehrhart functions, respectively. The key\nquestions we investigate are \\emph{When are the weighted Ehrhart series\nrational functions and which classical Ehrhart theory properties are preserved?\nAnd, when are the abstract formal power series the Hilbert series of Ehrhart\nrings of some polytope?} We prove generalizations about weighted Ehrhart\n$h^*$-coefficients of $q$-weighted Ehrhart series, and show $q$- and\n$s$-weighted Ehrhart reciprocity theorems. Then, we show the $q$- and\n$r$-weighted Ehrhart rings are the (classical) Ehrhart rings of weight lifting\npolytopes.\n', ""Stanley's non-Ehrhart-positive order polytopes We say a polytope is Ehrhart positive if all the coefficients in its Ehrhart\npolynomial are positive. Answering an Ehrhart positivity question posed on\nMathoverflow, Stanley provided an example of a non-Ehrhart-positive order\npolytope of dimension $21$. Stanley's example comes from a certain family of\norder polytopes. In this paper, we study the Ehrhart positivity question on\nthis family of polytopes. By giving explicit formulas for the coefficients of\nthe Ehrhart polynomials of these polytopes in terms of Bernolli numbers, we\ndetermine the sign of each Ehrhart coefficient of each polytope in the family.\n As a consequence of our result, we conclude that for any positive integer $d\n\\ge 21,$ there exists an order polytope of dimension $d$ that is not Ehrhart\npositive, and for any positive integer $\\ell$, there exists an order polytope\nwhose Ehrhart polynomial has precisely $\\ell$ negative coefficients, which\nanswers a question posed by Hibi. We finish this article by discussing the\nexistence of lower-dimensional order polytopes whose Ehrhart polynomials have a\nnegative coefficient.\n""]","[('ehrhart polynomials', 0.6471689343452454), ('rational polytopes', 0.6245351433753967), ('ehrhart polynomial', 0.6062913537025452), ('polytopes lattice', 0.5852457284927368), ('ehrhart quasi polynomial', 0.5805622935295105), ('rational polytope', 0.5713094472885132), ('lattice polytopes', 0.568119466304779), ('lattice polytope', 0.5301533341407776), ('polynomials lattice', 0.5075013041496277), ('reflexive polytopes', 0.5045790672302246)]" 463,463,65,463_efficient compression_neural network compression_lossless compression_compression scheme,"['efficient compression', 'neural network compression', 'lossless compression', 'compression scheme', 'compression', 'compression algorithms', 'network compression', 'compression methods', 'lossy compression', 'compression techniques']","[""An Error-Bounded Lossy Compression Method with Bit-Adaptive Quantization\n for Particle Data This paper presents error-bounded lossy compression tailored for particle\ndatasets from diverse scientific applications in cosmology, fluid dynamics, and\nfusion energy sciences. As today's high-performance computing capabilities\nadvance, these datasets often reach trillions of points, posing significant\nvisualization, analysis, and storage challenges. While error-bounded lossy\ncompression makes it possible to represent floating-point values with strict\npointwise accuracy guarantees, the lack of correlations in particle data's\nstorage ordering often limits the compression ratio. Inspired by\nquantization-encoding schemes in SZ lossy compressors, we dynamically determine\nthe number of bits to encode particles of the dataset to increase the\ncompression ratio. Specifically, we utilize a k-d tree to partition particles\ninto subregions and generate ``bit boxes'' centered at particles for each\nsubregion to encode their positions. These bit boxes ensure error control while\nreducing the bit count used for compression. We comprehensively evaluate our\nmethod against state-of-the-art compressors on cosmology, fluid dynamics, and\nfusion plasma datasets.\n"", 'Enhancing ZFP: A Statistical Approach to Understanding and Reducing Error Bias in a Lossy Floating-Point Compression Algorithm The amount of data generated and gathered in scientific simulations and data collection applications is continuously growing, putting mounting pressure on storage and bandwidth concerns. A means of reducing such issues is data compression; however, lossless data compression is typically ineffective when applied to floating-point data. Thus, users tend to apply a lossy data compressor, which allows for small deviations from the original data. It is essential to understand how the error from lossy compression impacts the accuracy of the data analytics. Thus, we must analyze not only the compression properties but the error as well. In this paper, we provide a statistical analysis of the error caused by ZFP compression, a state-of-the-art, lossy compression algorithm explicitly designed for floating-point data. We show that the error is indeed biased and propose simple modifications to the algorithm to neutralize the bias and further reduce the resulting error.', 'Black-Box Statistical Prediction of Lossy Compression Ratios for\n Scientific Data Lossy compressors are increasingly adopted in scientific research, tackling\nvolumes of data from experiments or parallel numerical simulations and\nfacilitating data storage and movement. In contrast with the notion of entropy\nin lossless compression, no theoretical or data-based quantification of lossy\ncompressibility exists for scientific data. Users rely on trial and error to\nassess lossy compression performance. As a strong data-driven effort toward\nquantifying lossy compressibility of scientific datasets, we provide a\nstatistical framework to predict compression ratios of lossy compressors. Our\nmethod is a two-step framework where (i) compressor-agnostic predictors are\ncomputed and (ii) statistical prediction models relying on these predictors are\ntrained on observed compression ratios. Proposed predictors exploit spatial\ncorrelations and notions of entropy and lossyness via the quantized entropy. We\nstudy 8+ compressors on 6 scientific datasets and achieve a median percentage\nprediction error less than 12%, which is substantially smaller than that of\nother methods while achieving at least a 8.8x speedup for searching for a\nspecific compression ratio and 7.8x speedup for determining the best compressor\nout of a collection.\n']","[('efficient compression', 0.6626338362693787), ('neural network compression', 0.6618268489837646), ('lossless compression', 0.6378976106643677), ('compression scheme', 0.6190735697746277), ('compression', 0.6048305034637451), ('compression algorithms', 0.599842369556427), ('network compression', 0.5975890159606934), ('compression methods', 0.5954598188400269), ('lossy compression', 0.5922426581382751), ('compression techniques', 0.5890854001045227)]" 464,464,65,464_commutative group schemes_group schemes_commutative group scheme_schemes,"['commutative group schemes', 'group schemes', 'commutative group scheme', 'schemes', 'reductive groups', 'affine schemes', 'torsors', 'group scheme', 'schemes give', 'reductive group']","['Generically isotropic reductive group schemes are locally isotropic Let $R$ be a semilocal geometrically factorial Noetherian domain of\ncharacteristic zero. We show that a reductive $R$-group scheme is isotropic if\nit is generically isotropic. We derive various consequences, in particular for\nthe Grothenieck-Serre conjecture and for homotopic invariance of torsors.\n', 'Generically trivial torsors under constant groups We resolve the Grothendieck-Serre question over an arbitrary base field $k$:\nfor a smooth $k$-group scheme $G$ and a smooth $k$-variety $X$, we show that\nevery generically trivial $G$-torsor over $X$ trivializes Zariski semilocally\non $X$. This was known when $G$ is reductive or when $k$ is perfect, and to\nsettle it in general we uncover a wealth of new arithmetic phenomena over\nimperfect $k$. We build our arguments on new purity theorems for torsors under\npseudo-complete, pseudo-proper, and pseudo-finite $k$-groups, for instance,\nrespectively, under wound unipotent $k$-groups, under pseudo-abelian varieties,\nand under the kernels $\\mathrm{Ker}(i_G)$ of comparison maps $i_G$ that relate\npseudo-reductive groups to restrictions of scalars of reductive groups. We then\ndeduce an Auslander-Buchsbaum extension theorem for torsors under\nquasi-reductive $k$-groups; for instance, we show that torsors over\n$\\mathbb{A}^2_k \\setminus \\{(0,0)\\}$ under wound unipotent $k$-groups extend to\ntorsors over $\\mathbb{A}^2_k$. For a quasi-reductive $k$-group $G$, this\nextension theorem allows us to quickly classify $G$-torsors over\n$\\mathbb{P}^1_k$ by an argument that already simplifies the reductive case and\nto establish Birkhoff, Cartan, and Iwasawa decompositions for $G(k((t)))$. We\ncombine these new results with deep inputs from recent work on the structure of\npseudo-reductive and quasi-reductive $k$-groups to show an unramifiedness\nstatement for the Whitehead group (the unstable $K_1$-group) of a\nquasi-reductive $k$-group, and then use it to argue that, for a smooth\n$k$-group $G$ and a semilocal $k$-algebra $A$, every $G$-torsor over\n$\\mathbb{P}^1_A$ trivial at $\\{t = \\infty\\}$ is also trivial at $\\{t = 0\\}$,\nwhich is known to imply the Grothendieck--Serre conclusion via geometric\narguments. To achieve all this, we develop and heavily use the structure theory\nof $k$-group schemes locally of finite type.\n', ""The Bass--Quillen conjecture for torsors over valuation rings For a valuation ring $V$, a smooth $V$-algebra $A$, and a reductive $V$-group\nscheme $G$ satisfying a certain natural isotropicity condition, we prove that\nevery Nisnevich $G$-torsor on $\\mathbb{A}^N_A$ descends to a $G$-torsor on $A$.\nAs a corollary, we generalize Raghunathan's theorem on torsors over affine\nspaces to a relative setting. We also extend several affine representability\nresults of Asok, Hoyois, and Wendt from equi-characteristics to mixed\ncharacteristics. Our proof relies on previous work on the purity of reductive\ntorsors over smooth relative curves and the Grothendieck--Serre conjecture for\nconstant reductive group schemes.\n""]","[('commutative group schemes', 0.602130115032196), ('group schemes', 0.5981515049934387), ('commutative group scheme', 0.527291476726532), ('schemes', 0.5012729167938232), ('reductive groups', 0.49710533022880554), ('affine schemes', 0.4746985137462616), ('torsors', 0.4672471582889557), ('group scheme', 0.4656130373477936), ('schemes give', 0.4622882604598999), ('reductive group', 0.4606578052043915)]" 465,465,64,465_rankin selberg functions_selberg functions_rankin selberg_chi primitive dirichlet,"['rankin selberg functions', 'selberg functions', 'rankin selberg', 'chi primitive dirichlet', 'primitive dirichlet character', 'subconvexity bound', 'subconvex bound', 'primitive dirichlet', 'subconvexity bounds', 'mathrm gl _2']","['Hybrid subconvexity bounds for twists of $\\rm GL(3)$ $L$-functions Let $\\pi$ be a $SL(3,\\mathbb Z)$ Hecke-Maass cusp form and $\\chi$ a primitive\nDirichlet character of prime power conductor $\\mathfrak{q}=p^k$ with $p$ prime.\nIn this paper we will prove the following subconvexity bound $$\nL\\left(\\frac{1}{2}+it,\\pi\\times \\chi\\right)\\ll_{\\pi,\\varepsilon}\np^{3/4}\\big(\\mathfrak{q}(1+|t|)\\big)^{3/4-3/40+\\varepsilon}, $$ for any\n$\\varepsilon >0$ and $t \\in \\mathbb{R}$.\n', 'Hybrid bounds for ${\\rm{GL}}(4)\\times {\\rm{GL}}(1)$ twisted\n $L$-functions Let $P,M$ be a two primes such that $(P,M)=1$. Let $\\Pi$ be a normalized\nHecke-Maa\\ss\\ form on ${\\rm{GL}}(4)$ of level $P$, and $\\chi$ a primitive\nDirichlet character modulo $M$. In this paper, we study the hybrid subconvexity\nproblem for $L(s, \\Pi\\otimes \\chi)$ simultaneously in the level and conductor\naspects. Among other things, we prove a hybrid subconvex bound, so long as\n$M^{1/5} 0$, where\nthe implied constant depends only on the forms $f,g$ and $\\epsilon$. Here the\nconvexity bound has exponent $1+\\epsilon$, which was improved to\n$1-\\frac{1}{1324}$ (see \\cite{HM}). Our bound reduces it further to $1-\n\\frac{1}{28}$. The main ingredients is to reduce the original problem to a\n$GL(2) \\times GL(2)$ shifted convolution sum problem.\n']","[('rankin selberg functions', 0.5750684142112732), ('selberg functions', 0.49104830622673035), ('rankin selberg', 0.47504696249961853), ('chi primitive dirichlet', 0.4329797029495239), ('primitive dirichlet character', 0.4176907539367676), ('subconvexity bound', 0.36713069677352905), ('subconvex bound', 0.3603423833847046), ('primitive dirichlet', 0.35973066091537476), ('subconvexity bounds', 0.35925331711769104), ('mathrm gl _2', 0.3335503935813904)]" 466,466,64,466_tikhonov regularization parameter_tikhonov regularization term_tikhonov regularization_tikhonov regularized,"['tikhonov regularization parameter', 'tikhonov regularization term', 'tikhonov regularization', 'tikhonov regularized', 'regularization parameter', 'constrained convex optimization', 'accelerated gradient methods', 'convex optimization', 'strongly convex', 'convex optimization via']","['Fast convergence rates and trajectory convergence of a Tikhonov\n regularized inertial primal\\mbox{-}dual dynamical system with time scaling\n and vanishing damping A Tikhonov regularized inertial primal\\mbox{-}dual dynamical system with time\nscaling and vanishing damping is proposed for solving a linearly constrained\nconvex optimization problem in Hilbert spaces. The system under consideration\nconsists of two coupled second order differential equations and its convergence\nproperties depend upon the decaying speed of the product of the time scaling\nparameter and the Tikhonov regularization parameter (named the rescaled\nregularization parameter) to zero. When the rescaled regularization parameter\nconverges rapidly to zero, the system enjoys fast convergence rates of the\nprimal-dual gap, the feasibility violation, the objective residual, and the\ngradient norm of the objective function along the trajectory, and the weak\nconvergence of the trajectory to a primal-dual solution of the linearly\nconstrained convex optimization problem. When the rescaled regularization\nparameter converges slowly to zero, the generated primal trajectory converges\nstrongly to the minimal norm solution of the problem under suitable conditions.\nFinally, numerical experiments are performed to illustrate the theoretical\nfindings.\n', ""Accelerated gradient methods combining Tikhonov regularization with\n geometric damping driven by the Hessian In a Hilbert setting, for convex differentiable optimization, we consider\naccelerated gradient dynamics combining Tikhonov regularization with\nHessian-driven damping. The Tikhonov regularization parameter is assumed to\ntend to zero as time tends to infinity, which preserves equilibria. The\npresence of the Tikhonov regularization term induces a strong convexity\nproperty which vanishes asymptotically. To take advantage of the exponential\nconvergence rates attached to the heavy ball method in the strongly convex\ncase, we consider the inertial dynamic where the viscous damping coefficient is\ntaken proportional to the square root of the Tikhonov regularization parameter,\nand therefore also converges towards zero. Moreover, the dynamic involves a\ngeometric damping which is driven by the Hessian of the function to be\nminimized, which induces a significant attenuation of the oscillations. Under\nan appropriate tuning of the parameters, based on Lyapunov's analysis, we show\nthat the trajectories have at the same time several remarkable properties: they\nprovide fast convergence of values, fast convergence of gradients towards zero,\nand strong convergence to the minimum norm minimizer. This study extends a\nprevious paper by the authors where similar issues were examined but without\nthe presence of Hessian driven damping.\n"", 'Tikhonov regularized second-order plus first-order primal-dual dynamical\n systems with asymptotically vanishing damping for linear equality constrained\n convex optimization problems In this paper, in the setting of Hilbert spaces, we consider a Tikhonov\nregularized second-order plus first-order primal-dual dynamical system with\nasymptotically vanishing damping for a linear equality constrained convex\noptimization problem. The convergence properties of the proposed dynamical\nsystem depend heavily upon the choice of the Tikhonov regularization parameter.\nWhen the Tikhonov regularization parameter decreases rapidly to zero, we\nestablish the fast convergence rates of the primal-dual gap, the objective\nfunction error, the feasibility measure, and the gradient norm of the objective\nfunction along the trajectory generated by the system. When the Tikhonov\nregularization parameter tends slowly to zero, we prove that the primal\ntrajectory of the Tikhonov regularized dynamical system converges strongly to\nthe minimal norm solution of the linear equality constrained convex\noptimization problem. Numerical experiments are performed to illustrate the\nefficiency of our approach.\n']","[('tikhonov regularization parameter', 0.6208226680755615), ('tikhonov regularization term', 0.5745869874954224), ('tikhonov regularization', 0.5717356204986572), ('tikhonov regularized', 0.5402715802192688), ('regularization parameter', 0.4997090697288513), ('constrained convex optimization', 0.49571993947029114), ('accelerated gradient methods', 0.4801374673843384), ('convex optimization', 0.47841694951057434), ('strongly convex', 0.4714740812778473), ('convex optimization via', 0.4710109233856201)]" 467,467,64,467_multiple zeta values_multiple zeta_double zeta values_multiple zeta functions,"['multiple zeta values', 'multiple zeta', 'double zeta values', 'multiple zeta functions', 'tate algebras', 'zeta values', 'double zeta', 'zeta functions', 'zeta', 'finite fields']","['Elliptic multizetas and the elliptic double shuffle relations We define an elliptic generating series whose coefficients, the elliptic\nmultizetas, are related to the elliptic analogues of multiple zeta values\nintroduced by Enriquez as the coefficients of his elliptic associator; both\nsets of coefficients lie in $\\mathcal{O}(\\mathfrak{H})$, the ring of functions\non the Poincar\\\'e upper half-plane $\\mathfrak H$. The elliptic multizetas\ngenerate a $\\mathbb Q$-algebra $\\mathcal{E}$ which is an elliptic analogue of\nthe algebra of multiple zeta values. Working modulo $2\\pi i$, we show that the\nalgebra $\\mathcal{E}$ decomposes into a geometric and an arithmetic part and\nstudy the precise relationship between the elliptic generating series and the\nelliptic associator defined by Enriquez. We show that the elliptic multizetas\nsatisfy a double shuffle type family of algebraic relations similar to the\ndouble shuffle relations satisfied by multiple zeta values. We prove that these\nelliptic double shuffle relations give all algebraic relations among elliptic\nmultizetas if (a) the classical double shuffle relations give all algebraic\nrelations among multiple zeta values and (b) the elliptic double shuffle Lie\nalgebra has a certain natural semi-direct product structure analogous to that\nestablished by Enriquez for the elliptic Grothendieck-Teichm\\""uller Lie\nalgebra.\n', ""Multiple zeta values with varying constant fields Multiple zeta values associated with function fields with varying constant\nfields are dealt with simultaneously. Thakur introduced multiple zeta values in\nthe arithmetic of positive characteristic function fields, and the definition\ndepends on the field of constants of the chosen function field. Using\nPapanikolas' theory on the relationship between the $t$-motivic Galois group\nand the periods of a pre-$t$-motive, we show that there exist no algebraic\nrelations which relate multiple zeta values with different constants field.\n"", ""AGZT-Lectures on formal multiple zeta values Formal multiple zeta values allow to study multiple zeta values by algebraic\nmethods in a way that the open question about their transcendence is\ncircumvented. In this note we show that Hoffman's basis conjecture for formal\nmultiple zeta values is implied by the free odd generation conjecture for the\ndouble shuffle Lie algebra. We use the concept of a post-Lie structure for a\nconvenient approach to the multiplication on the double shuffle group. From\nthis, we get a coaction on the algebra of formal multiple zeta values. This in\nturn allows us to follow the proof of Brown's celebrated and unconditional\ntheorem for the same result in the context of motivic multiple zeta values. We\nneed the free odd generation conjecture twice: at first it gives a formula for\nthe graded dimensions and secondly it is a key to derive a lift of the Zagier\nformula to the formal context.\n""]","[('multiple zeta values', 0.6074334383010864), ('multiple zeta', 0.5769208073616028), ('double zeta values', 0.5765171051025391), ('multiple zeta functions', 0.5764449238777161), ('tate algebras', 0.5737501382827759), ('zeta values', 0.56546550989151), ('double zeta', 0.5293262004852295), ('zeta functions', 0.4848848581314087), ('zeta', 0.4751836061477661), ('finite fields', 0.4078332185745239)]" 468,468,64,468_electrical impedance tomography_impedance tomography_impedance tomography eit_tomography based,"['electrical impedance tomography', 'impedance tomography', 'impedance tomography eit', 'tomography based', 'electrical impedance', 'tomography', 'conductivity boundary', 'tomography eit', 'boundary measurements', 'complete electrode']","['Immersed Boundary Method for the Complete Electrode Model in Electrical\n Impedance Tomography We propose an immersed boundary scheme for the numerical resolution of the\nComplete Electrode Model in Electrical Impedance Tomography, that we use as a\nmain ingredient in the resolution of inverse problems in medical imaging. Such\nmethod allows to use a Cartesian mesh without accurate discretization of the\nboundary, which is useful in situations where the boundary is complicated\nand/or changing. We prove the convergence of our method, and illustrate its\nefficiency with two dimensional direct and inverse problems.\n', 'Weak Galerkin Method for Electrical Impedance Tomography In this work, we propose and analyse a weak Galerkin method for the\nelectrical impedance tomography based on a bounded variation regularization. We\nuse the complete electrode model as the forward system that is approximated by\na weak Galerkin method with lowest order. The error estimates are studied for\nthe forward problem, which are used to establish the convergence of this weak\nGalerkin algorithm for the inverse problem. Numerical examples are presented to\nverify the effectiveness and efficiency of the weak Galerkin algorithm for the\nelectrical impedance tomography.\n', 'Mumford-Shah regularization in electrical impedance tomography with\n complete electrode model In electrical impedance tomography, we aim to solve the conductivity within a\ntarget body through electrical measurements made on the surface of the target.\nThis inverse conductivity problem is severely ill-posed, especially in real\napplications with only partial boundary data available. Thus regularization has\nto be introduced. Conventionally regularization promoting smooth features is\nused, however, the Mumford--Shah regularizer familiar for image segmentation is\nmore appropriate for targets consisting of several distinct objects or\nmaterials. It is, however, numerically challenging. We show theoretically\nthrough $\\Gamma$-convergence that a modification of the Ambrosio--Tortorelli\napproximation of the Mumford--Shah regularizer is applicable to electrical\nimpedance tomography, in particular the complete electrode model of boundary\nmeasurements. With numerical and experimental studies, we confirm that this\nfunctional works in practice and produces higher quality results than typical\nregularizations employed in electrical impedance tomography when the\nconductivity of the target consists of distinct smoothly-varying regions.\n']","[('electrical impedance tomography', 0.7275944948196411), ('impedance tomography', 0.6414700746536255), ('impedance tomography eit', 0.5895735025405884), ('tomography based', 0.4696519374847412), ('electrical impedance', 0.46740737557411194), ('tomography', 0.4565812945365906), ('conductivity boundary', 0.44715574383735657), ('tomography eit', 0.4406236410140991), ('boundary measurements', 0.4237327575683594), ('complete electrode', 0.4062657058238983)]" 469,469,64,469_hyperelliptic curves genus_hyperelliptic curve genus_hyperelliptic curves_hyperelliptic curve,"['hyperelliptic curves genus', 'hyperelliptic curve genus', 'hyperelliptic curves', 'hyperelliptic curve', 'jacobian varieties', 'genus curves', 'jacobians curves', 'curves genus', 'jacobian variety', 'families hyperelliptic']","['Hyperelliptic Curves with Maximal Galois Action on the Torsion Points of\n their Jacobians In this article, we show that in each of four standard families of\nhyperelliptic curves, there is a density-$1$ subset of members with the\nproperty that their Jacobians have adelic Galois representation with image as\nlarge as possible. This result constitutes an explicit application of a general\ntheorem on arbitrary rational families of abelian varieties to the case of\nfamilies of Jacobians of hyperelliptic curves. Furthermore, we provide explicit\nexamples of hyperelliptic curves of genus $2$ and $3$ over $\\mathbb Q$ whose\nJacobians have such maximal adelic Galois representations.\n', 'Quadratic torsion orders on Jacobian varieties We establish the existence of hyperelliptic curves of genus $g\\ge 2$ defined\nover $\\mathbb{Q}$ whose Jacobians possess rational torsion points of order $N$\nwhere $N=4g^2+2g-2$ or $4g^2+ 2g -4$. For $N=2g^2+7g+1$, we introduce a\n$1$-parameter family of hyperelliptic curves of genus $g$ over $\\mathbb{Q}$\nwith a rational torsion point of order $N$ on their Jacobians.\n', 'Translating the discrete logarithm problem on Jacobians of genus 3\n hyperelliptic curves with $(\\ell,\\ell,\\ell)$-isogenies We give an algorithm to compute $(\\ell,\\ell,\\ell)$-isogenies from the\nJacobians of genus three hyperelliptic curves to the Jacobians of\nnon-hyperelliptic curves. An important application is to reduce the discrete\nlogarithm problem in the Jacobian of a hyperelliptic curve to the corresponding\nproblem in the Jacobian of a non-hyperelliptic curve.\n']","[('hyperelliptic curves genus', 0.7583663463592529), ('hyperelliptic curve genus', 0.7432161569595337), ('hyperelliptic curves', 0.7394399642944336), ('hyperelliptic curve', 0.6814892888069153), ('jacobian varieties', 0.6144089698791504), ('genus curves', 0.6093424558639526), ('jacobians curves', 0.5936639308929443), ('curves genus', 0.5916022658348083), ('jacobian variety', 0.5900390148162842), ('families hyperelliptic', 0.579734742641449)]" 470,470,64,470_branching random walks_branching random walk_random walks_galton watson trees,"['branching random walks', 'branching random walk', 'random walks', 'galton watson trees', 'biased random walk', 'galton watson tree', 'reinforced random walks', 'trees random', 'tree random', 'random walk']","['The frog model on Galton-Watson trees We consider an interacting particle system on trees known as the frog model:\ninitially, a single active particle begins at the root and\ni.i.d.~$\\mathrm{Poiss}(\\lambda)$ many inactive particles are placed at each\nnon-root vertex. Active particles perform discrete time simple random walk and\nactivate the inactive particles they encounter. We show that for Galton-Watson\ntrees with offspring distributions $Z$ satisfying $\\mathbf{P}(Z \\geq 2) = 1$\nand $\\mathbf{E}[Z^{4 + \\epsilon}] < \\infty$ for some $\\epsilon > 0$, there is a\ncritical value $\\lambda_c\\in(0,\\infty)$ separating recurrent and transient\nregimes for almost surely every tree, thereby answering a question of\nHoffman-Johnson-Junge. In addition, we also establish that this critical\nparameter depends on the entire offspring distribution, not just the maximum\nvalue of $Z$, answering another question of Hoffman-Johnson-Junge and showing\nthat the frog model and contact process behave differently on Galton-Watson\ntrees.\n', 'Differentiability of the speed of biased random walks on Galton-Watson\n trees We prove that the speed of a $\\lambda$-biased random walk on a supercritical\nGalton-Watson tree is differentiable for $\\lambda$ such that the walk is\nballistic and obeys a central limit theorem, and give an expression of the\nderivative using a certain $2$-dimensional Gaussian random variable. The proof\nheavily uses the renewal structure of Galton-Watson trees that was introduced\nby Lyons-Pemantle-Peres.\n', 'On transience of frogs on Galton-Watson trees We consider a random interacting particle system, known as the frog model, on\ninfinite Galton-Watson trees allowing offspring zero and one. The system starts\nwith one awake particle (frog) at the root of the tree and a random number of\nsleeping particles at the other vertices. Awake frogs move according to simple\nrandom walk on the tree and as soon as they encounter sleeping frogs, those\nwill wake up and move independently according to simple random walk. The frog\nmodel is called transient, if there are almost surely only finitely many\nparticles returning to the root. In this paper we prove a zero-one law for\ntransience of the frog model and show the existence of a transient phase for\ncertain classes of Galton-Watson trees.\n']","[('branching random walks', 0.701907753944397), ('branching random walk', 0.6874219179153442), ('random walks', 0.5908543467521667), ('galton watson trees', 0.5906566977500916), ('biased random walk', 0.5851370096206665), ('galton watson tree', 0.5635023713111877), ('reinforced random walks', 0.5487191677093506), ('trees random', 0.5390554666519165), ('tree random', 0.5324928164482117), ('random walk', 0.5323582887649536)]" 471,471,64,471_differential uniformity_functions finite fields_differential properties_permutation polynomials,"['differential uniformity', 'functions finite fields', 'differential properties', 'permutation polynomials', 'multiplicative differential', 'uniformity also', 'uniform permutations', 'ciphers', 'perfect nonlinear functions', 'zero differential']","['Investigations of c-Differential Uniformity of Permutations with Carlitz\n Rank 3 The $c$-differential uniformity is recently proposed to reflect resistance\nagainst some variants of differential attack. Finding functions with low\n$c$-differential uniformity is attracting attention from many researchers. For\neven characteristic, it is known that permutations of low Carlitz rank have\ngood cryptographic parameters, for example, low differential uniformity, high\nnonlinearity, etc. In this paper we show that permutations with low Carlitz\nrank have low $c$-differential uniformity. We also investigate $c$-differential\nuniformity of permutations with Carlitz rank 3 in detail.\n', 'A connection between the boomerang uniformity and the extended\n differential in odd characteristic and applications This paper makes the first bridge between the classical\ndifferential/boomerang uniformity and the newly introduced $c$-differential\nuniformity. We show that the boomerang uniformity of an odd APN function is\ngiven by the maximum of the entries (except for the first row/column) of the\nfunction\'s $(-1)$-Difference Distribution Table. In fact, the boomerang\nuniformity of an odd permutation APN function equals its $(-1)$-differential\nuniformity. We next apply this result to easily compute the boomerang\nuniformity of several odd APN functions. In the second part we give two classes\nof differentially low-uniform functions obtained by modifying the inverse\nfunction. The first class of permutations (CCZ-inequivalent to the inverse)\nover a finite field $\\mathbb{F}_{p^n}$ ($p$, an odd prime) is obtained from the\ncomposition of the inverse function with an order-$3$ cycle permutation, with\ndifferential uniformity $3$ if $p=3$ and $n$ is odd; $5$ if $p=13$ and $n$ is\neven; and $4$ otherwise. The second class is a family of binomials and we show\nthat their differential uniformity equals~$4$. We next complete the open case\nof $p=3$ in the investigation started by G\\"" olo\\u glu and McGuire (2014), for\n$p\\geq 5$, and continued by K\\""olsch (2021), for $p=2$, $n\\geq 5$, on the\ncharacterization of $L_1(X^{p^n-2})+L_2(X)$ (with linearized $L_1,L_2$) being a\npermutation polynomial. Finally, we extend to odd characteristic a result of\nCharpin and Kyureghyan (2010) providing an upper bound for the differential\nuniformity of the function and its switched version via a trace function.\n', 'On the second-order zero differential spectra of some power functions\n over finite fields Boukerrou et al. (IACR Trans. Symmetric Cryptol. 2020(1), 331-362) introduced\nthe notion of Feistel Boomerang Connectivity Table (FBCT), the Feistel\ncounterpart of the Boomerang Connectivity Table (BCT), and the Feistel\nboomerang uniformity (which is the same as the second-order zero differential\nuniformity in even characteristic). FBCT is a crucial table for the analysis of\nthe resistance of block ciphers to power attacks such as differential and\nboomerang attacks. It is worth noting that the coefficients of FBCT are related\nto the second-order zero differential spectra of functions. In this paper, by\ncarrying out certain finer manipulations of solving specific equations over the\nfinite field $\\mathbb{F}_{p^n}$, we explicitly determine the second-order zero\ndifferential spectra of some power functions with low differential uniformity,\nand show that our considered functions also have low second-order zero\ndifferential uniformity. Our study pushes further former investigations on\nsecond-order zero differential uniformity and Feistel boomerang differential\nuniformity for a power function $F$.\n']","[('differential uniformity', 0.5266542434692383), ('functions finite fields', 0.4195200800895691), ('differential properties', 0.41569435596466064), ('permutation polynomials', 0.40549784898757935), ('multiplicative differential', 0.40398740768432617), ('uniformity also', 0.3854975402355194), ('uniform permutations', 0.3834455609321594), ('ciphers', 0.382006973028183), ('perfect nonlinear functions', 0.37897437810897827), ('zero differential', 0.37443453073501587)]" 472,472,64,472_free cumulants_free probability theory_non commutative probability_cumulants,"['free cumulants', 'free probability theory', 'non commutative probability', 'cumulants', 'moment cumulant', 'commutative probability space', 'monotone independence', 'free probability', 'cumulant', 'shuffle algebra']","[""Cumulant-cumulant relations in free probability theory from Magnus'\n expansion Relations between moments and cumulants play a central role in both classical\nand non-commutative probability theory. The latter allows for several distinct\nfamilies of cumulants corresponding to different types of independences: free,\nBoolean and monotone. Relations among those cumulants have been studied\nrecently. In this work we focus on the problem of expressing with a closed\nformula multivariate monotone cumulants in terms of free and Boolean cumulants.\nIn the process we introduce various constructions and statistics on\nnon-crossing partitions. Our approach is based on a pre-Lie algebra structure\non cumulant functionals. Relations among cumulants are described in terms of\nthe pre-Lie Magnus expansion combined with results on the continuous\nBaker-Campbell-Hausdorff formula due to A. Murua.\n"", 'Conditionally monotone cumulants via shuffle algebra In this work we study conditional monotone cumulants and additive convolution\nin the shuffle-algebraic approach to non-commutative probability. We describe\nc-monotone cumulants as an infinitesimal character and identify the c-monotone\nadditive convolution as an associative operation in the set of pairs of\ncharacters in the dual of a double tensor Hopf algebra. In this algebraic\nframework, we understand previous results on c-monotone cumulants and prove a\ncombinatorial formula that relates c-free and c-monotone cumulants. We also\nidentify the notion of $t$-Boolean cumulants in the shuffle-algebraic approach\nand introduce the corresponding notion of $t$-monotone cumulants as a\nparticular case of c-monotone cumulants.\n', 'Relations between infinitesimal non-commutative cumulants Boolean, free and monotone cumulants as well as relations among them, have\nproven to be important in the study of non-commutative probability theory.\nQuite notably, Boolean cumulants were successfully used to study free infinite\ndivisibility via the Boolean Bercovici--Pata bijection. On the other hand, in\nrecent years the concept of infinitesimal non-commutative probability has been\ndeveloped, together with the notion of infinitesimal cumulants which can be\nuseful in the context of combinatorial questions.\n In this paper, we show that the known relations among free, Boolean and\nmonotone cumulants still hold in the infinitesimal framework. Our approach is\nbased on the use of Grassmann algebra. Formulas involving infinitesimal\ncumulants can be obtained by applying a formal derivation to known formulas.\n The relations between the various types of cumulants turn out to be captured\nvia the shuffle algebra approach to moment-cumulant relations in\nnon-commutative probability theory. In this formulation, (free, Boolean and\nmonotone) cumulants are represented as elements of the Lie algebra of\ninfinitesimal characters over a particular combinatorial Hopf algebra. The\nlatter consists of the graded connected double tensor algebra defined over a\nnon-commutative probability space and is neither commutative nor cocommutative.\nIn this note it is shown how the shuffle algebra approach naturally extends to\nthe notion of infinitesimal non-commutative probability space. The basic step\nconsists in replacing the base field as target space of linear Hopf algebra\nmaps by the Grassmann algebra over the base field. We also consider the\ninfinitesimal analog of the Boolean Bercovici--Pata map.\n']","[('free cumulants', 0.5851132869720459), ('free probability theory', 0.5654887557029724), ('non commutative probability', 0.4718267619609833), ('cumulants', 0.46808645129203796), ('moment cumulant', 0.468056321144104), ('commutative probability space', 0.46741795539855957), ('monotone independence', 0.4578694701194763), ('free probability', 0.4176594316959381), ('cumulant', 0.4138374626636505), ('shuffle algebra', 0.4106959402561188)]" 473,473,64,473_stochastic maximum principle_stochastic optimal control_optimal control stochastic_stochastic maximum,"['stochastic maximum principle', 'stochastic optimal control', 'optimal control stochastic', 'stochastic maximum', 'stochastic control', 'backward stochastic differential', 'principle optimal control', 'stochastic control systems', 'stochastic optimal', 'backward stochastic partial']","[""Stochastic maximum principle for optimal control problem with varying\n terminal time and non-convex control domain In this paper, we consider a varying terminal time structure for the\nstochastic optimal control problem under state constraints, in which the\nterminal time varies with the mean value of the state. In this new stochastic\noptimal control system, the control domain does not need to be convex and the\ndiffusion coefficient contains the control variable. To overcome the difficulty\nin the proof of the related Pontryagin's stochastic maximum principle, we\ndevelop asymptotic first- and second-order adjoint equations for the varying\nterminal time, and then establish its variational equation. In the end, two\nexamples are given to verify the main results of this study.\n"", ""On Stochastic Maximum Principle: A Backward Stochastic Partial\n Differential Equations Point of View In this paper, we consider a class of stochastic control problems for\nstochastic differential equations with random coefficients. The control domain\nneed not to be convex but the control process is not allowed to enter in\ndiffusion term. Moreover, the terminal cost involves a non linear term of the\nexpected value of terminal state. Our purpose is to derive a new version of the\nPontryagin's stochastic maximum principle by adopting an idea inspired from the\nwork of Peng [S. Peng, Maximum Principle for Stochastic Optimal Control with\nNonconvex Control Domain, Lecture Notes in Control & Information Sciences, 114,\n(1990), pp. 724-732]. More specifically, we show that if we combine the spike\nperturbation of the optimal control combined with the stochastic Feynman-Kac\nrepresentation of linear backward stochastic partial differential equations\n(BSPDE, for short), a new version of the stochastic maximum principle can be\nderived. We also investigate sufficient conditions of optimality. In the last\npart of this paper, motivated by our version of SMP, an interesting class of\nforward backward stochastic partial differential equations is naturally\nintroduced and the solvability of such kind of equations is briefly presented.\n"", 'Stochastic maximum principle for recursive optimal control problems with\n varying terminal time This paper introduces a new recursive stochastic optimal control problem\ndriven by a forward-backward stochastic differential equations (FBSDEs), where\nthe ter?minal time varies according to the constraints of the state of the\nforward equation. This new optimal control problem can be used to describe the\ninvestment portfolio problems with the varying investment period. Based on\nnovel \\r{ho}-moving variational and adjoint equations, we establish the\nstochastic maximum principle for this optimal control problem including the\nclassical optimal control problem as a particular case. Furthermore, we propose\nan example to verify our main results.\n']","[('stochastic maximum principle', 0.755662739276886), ('stochastic optimal control', 0.7549058198928833), ('optimal control stochastic', 0.7384849190711975), ('stochastic maximum', 0.6602541208267212), ('stochastic control', 0.6596713662147522), ('backward stochastic differential', 0.6289165616035461), ('principle optimal control', 0.6266623139381409), ('stochastic control systems', 0.6225612759590149), ('stochastic optimal', 0.6125560998916626), ('backward stochastic partial', 0.6032155752182007)]" 474,474,64,474_gorenstein algebras_gorenstein algebra_artinian algebras_graded algebras,"['gorenstein algebras', 'gorenstein algebra', 'artinian algebras', 'graded algebras', 'algebras codimension', 'gorenstein', 'monomial algebras', 'artinian', 'jacobian algebra', 'lefschetz']","['Lefschetz properties for jacobian rings of cubic fourfolds and other\n Artinian algebras In this paper, we exploit some geometric-differential techniques to prove the\nstrong Lefschetz property in degree $1$ for a complete intersection standard\nArtinian Gorenstein algebra of codimension $6$ presented by quadrics. We prove\nalso some strong Lefschetz properties for the same kind of Artinian algebras in\nhigher codimensions. Moreover, we analyze some loci that come naturally into\nthe picture of ""special"" Artinian algebras: for them, we give some geometric\ndescriptions and show a connection between the non emptiness of the so-called\nnon-Lefschetz locus in degree $1$ and the ""lifting"" of a weak Lefschetz\nproperty to an algebra from one of its quotients.\n', 'Lefschetz properties of some codimension three Artinian Gorenstein\n algebras Codimension two Artinian algebras $A$ have the strong and weak Lefschetz\nproperties provided the characteristic is zero or greater than the socle\ndegree. It is open to what extent such results might extend to codimension\nthree AG algebras - the most promising results so far have concerned the weak\nLefschetz property for such algebras. We here show that every standard-graded\ncodimension three Artinian Gorenstein algebra $A$ having low maximum value of\nthe Hilbert function - at most six - has the strong Lefschetz property,\nprovided that the characteristic is zero. When the characteristic is greater\nthan the socle degree of $A$, we show that $A$ is almost strong Lefschetz. This\nquite modest result is nevertheless arguably the most encompassing so far\nconcerning the strong Lefschetz property for graded codimension three AG\nalgebras.\n', 'Hilbert Functions of Artinian Gorenstein algebras with the Strong\n Lefschetz Property We prove that a sequence $h$ of non-negative integers is the Hilbert function\nof some Artinian Gorenstein algebra with the strong Lefschetz property if and\nonly if it is an SI-sequence. This generalizes the result by T. Harima which\ncharacterizes the Hilbert functions of Artinian Gorenstein algebras with the\nweak Lefschetz property. We also provide classes of Artinian Gorenstein\nalgebras obtained from the ideal of points in $\\mathbb{P}^n$ such that some of\ntheir higher Hessians have non-vanishing determinants. Consequently, we provide\nfamilies of such algebras satisfying the SLP.\n']","[('gorenstein algebras', 0.7360035181045532), ('gorenstein algebra', 0.6930315494537354), ('artinian algebras', 0.6080862879753113), ('graded algebras', 0.4917362630367279), ('algebras codimension', 0.4672408998012543), ('gorenstein', 0.436754047870636), ('monomial algebras', 0.42949819564819336), ('artinian', 0.3927019536495209), ('jacobian algebra', 0.3847786486148834), ('lefschetz', 0.3827832341194153)]" 475,475,63,475_distributed matrix_matrix computations_matrix multiplication_secure distributed,"['distributed matrix', 'matrix computations', 'matrix multiplication', 'secure distributed', 'coded distributed', 'matrix computation', 'coded computation', 'codes distributed', 'distributed computing', 'communication computation']","['GASP Codes for Secure Distributed Matrix Multiplication We consider the problem of secure distributed matrix multiplication (SDMM) in\nwhich a user wishes to compute the product of two matrices with the assistance\nof honest but curious servers. We construct polynomial codes for SDMM by\nstudying a combinatorial problem on a special type of addition table, which we\ncall the degree table. The codes are based on arithmetic progressions, and are\nthus named GASP (Gap Additive Secure Polynomial) Codes. GASP Codes are shown to\noutperform all previously known polynomial codes for secure distributed matrix\nmultiplication in terms of download rate.\n', ""Speeding Up Private Distributed Matrix Multiplication via Bivariate\n Polynomial Codes We consider the problem of private distributed matrix multiplication under\nlimited resources. Coded computation has been shown to be an effective solution\nin distributed matrix multiplication, both providing privacy against the\nworkers and boosting the computation speed by efficiently mitigating\nstragglers. In this work, we propose the use of recently-introduced bivariate\npolynomial codes to further speed up private distributed matrix multiplication\nby exploiting the partial work done by the stragglers rather than completely\nignoring them. We show that the proposed approach reduces the average\ncomputation time of private distributed matrix multiplication compared to its\ncompetitors in the literature while improving the upload communication cost and\nthe workers' storage efficiency.\n"", ""Bivariate Polynomial Codes for Secure Distributed Matrix Multiplication We consider the problem of secure distributed matrix multiplication (SDMM).\nCoded computation has been shown to be an effective solution in distributed\nmatrix multiplication, both providing privacy against workers and boosting the\ncomputation speed by efficiently mitigating stragglers. In this work, we\npresent a non-direct secure extension of the recently introduced bivariate\npolynomial codes. Bivariate polynomial codes have been shown to be able to\nfurther speed up distributed matrix multiplication by exploiting the partial\nwork done by the stragglers rather than completely ignoring them while reducing\nthe upload communication cost and/or the workers' storage's capacity needs. We\nshow that, especially for upload communication or storage constrained settings,\nthe proposed approach reduces the average computation time of SDMM compared to\nits competitors in the literature.\n""]","[('distributed matrix', 0.573223888874054), ('matrix computations', 0.5590437054634094), ('matrix multiplication', 0.5170714259147644), ('secure distributed', 0.5143439769744873), ('coded distributed', 0.5108539462089539), ('matrix computation', 0.5050907731056213), ('coded computation', 0.49766916036605835), ('codes distributed', 0.4945460259914398), ('distributed computing', 0.47574833035469055), ('communication computation', 0.467773973941803)]" 476,476,63,476_subdivision_linear schemes_quasi interpolation_hermite interpolation,"['subdivision', 'linear schemes', 'quasi interpolation', 'hermite interpolation', 'schemes', 'schemes widely', 'generalized hermite', 'subdivided', 'class schemes', 'ridge functions']","['Multivariate Generalized Hermite Subdivision Schemes Due to properties such as interpolation, smoothness, and spline connections,\nHermite subdivision schemes employ fast iterative algorithms for geometrically\nmodeling curves/surfaces in CAGD and for building Hermite wavelets in numerical\nPDEs. In this paper we introduce a notion of generalized Hermite (dyadic)\nsubdivision schemes and then we characterize their convergence, smoothness and\nunderlying matrix masks with or without interpolation properties. We also\nintroduce the notion of linear-phase moments for achieving the\npolynomial-interpolation property. For any given positive integer m, we\nconstructively prove that there always exist convergent smooth generalized\nHermite subdivision schemes with linear-phase moments such that their basis\nvector functions are spline functions in $C^m$ and have linearly independent\ninteger shifts. As byproducts, our results resolve convergence, smoothness and\nexistence of Lagrange, Hermite, or Birkhoff subdivision schemes. Even in\ndimension one our results significantly generalize and extend many known\nresults on extensively studied univariate Hermite subdivision schemes. To\nillustrate the theoretical results in this paper, we provide examples of\nconvergent generalized Hermite subdivision schemes with symmetric matrix masks\nhaving short support and smooth basis vector functions with or without\ninterpolation property.\n', 'Multivariate Vector Subdivision Schemes with a General Matrix-valued\n Filter Subdivision schemes are closely related to splines and wavelets and have\nnumerous applications in CAGD and numerical differential equations. Subdivision\nschemes employ a scalar filter; that is, scalar subdivision schemes, have been\nextensively studied in the literature. In contrast, subdivision schemes with a\nmatrix filter, which are the so-called vector subdivision schemes, are far from\nbeing well understood. So far, only vector subdivision schemes that use special\nmatrix-valued filters have been well-investigated, such as the Lagrange and\nHermite subdivision schemes. To the best of our knowledge, it remains unclear\nhow to define and characterize the convergence of a vector subdivision scheme\nthat uses a general matrix-valued filter. Though filters from Lagrange and\nHermite subdivision schemes have nice properties and are widely used in\npractice, filters not from either subdivision scheme appear in many\napplications. Hence, it is necessary to study vector subdivision schemes with a\ngeneral matrix-valued filter. In this paper, from the perspective of a vector\ncascade algorithm, we show that there is only one meaningful way to define a\nvector subdivision scheme. We will analyze the convergence of the newly defined\nvector subdivision scheme and show that it is equivalent to the convergence of\nthe corresponding vector cascade algorithm. Applying our theory, we show that\nexisting results on the convergence of Lagrange and Hermite subdivision schemes\ncan be easily obtained and improved. Finally, we will present some examples of\nvector subdivision schemes to illustrate our main results.\n', 'Analysis and convergence of Hermite subdivision schemes Hermite interpolation property is desired in applied and computational\nmathematics. Hermite and vector subdivision schemes are of interest in CAGD for\ngenerating subdivision curves and in computational mathematics for building\nHermite wavelets to numerically solve partial differential equations. In\ncontrast to well-studied scalar subdivision schemes, Hermite and vector\nsubdivision schemes employ matrix-valued masks and vector input data, which\nmake their analysis much more complicated and difficult than their scalar\ncounterparts. Despite recent progresses on Hermite subdivision schemes, several\nkey questions still remain unsolved, for example, characterization of Hermite\nmasks, factorization of matrix-valued masks, and convergence of Hermite\nsubdivision schemes. In this paper, we shall study Hermite subdivision schemes\nthrough investigating vector subdivision operators acting on vector polynomials\nand establishing the relations among Hermite subdivision schemes, vector\ncascade algorithms and refinable vector functions. This approach allows us to\nresolve several key problems on Hermite subdivision schemes including\ncharacterization of Hermite masks, factorization of matrix-valued masks, and\nconvergence of Hermite subdivision schemes.\n']","[('subdivision', 0.4758419692516327), ('linear schemes', 0.457271546125412), ('quasi interpolation', 0.431007444858551), ('hermite interpolation', 0.4290284514427185), ('schemes', 0.39579540491104126), ('schemes widely', 0.3793403208255768), ('generalized hermite', 0.3707045912742615), ('subdivided', 0.3636758029460907), ('class schemes', 0.3503813147544861), ('ridge functions', 0.3419687747955322)]" 477,477,63,477_random waves_random wave_euclidean random_random gaussian,"['random waves', 'random wave', 'euclidean random', 'random gaussian', 'gaussian random', 'fluctuations number', 'length random', 'random spherical', 'asymptotic variance', 'non gaussian']","['Boundary effect on the nodal length for Arithmetic Random Waves, and\n spectral semi-correlations We test M. Berry\'s ansatz on nodal deficiency in presence of boundary. The\nsquare billiard is studied, where the high spectral degeneracies allow for the\nintroduction of a Gaussian ensemble of random Laplace eigenfunctions\n(""boundary-adapted arithmetic random waves""). As a result of a precise\nasymptotic analysis, two terms in the asymptotic expansion of the expected\nnodal length are derived, in the high energy limit along a generic sequence of\nenergy levels. It is found that the precise nodal deficiency or surplus of the\nnodal length depends on arithmetic properties of the energy levels, in an\nexplicit way.\n To obtain the said results we apply the Kac-Rice method for computing the\nexpected nodal length of a Gaussian random field. Such an application uncovers\nmajor obstacles, e.g. the occurrence of ""bad"" subdomains, that, one hopes,\ncontribute insignificantly to the nodal length. Fortunately, we were able to\nreduce this contribution to a number theoretic question of counting the\n""spectral semi-correlations"", a concept joining the likes of ""spectral\ncorrelations"" and ""spectral quasi-correlations"" in having impact on the nodal\nlength for arithmetic dynamical systems.\n This work rests on several breakthrough techniques of J. Bourgain, whose\ninterest in the subject helped shaping it to high extent, and whose fundamental\nwork on spectral correlations, joint with E. Bombieri, has had a crucial impact\non the field.\n', ""Spectral quasi correlations and phase-transitions for the nodal length\n of Arithmetic Random Waves Spectral quasi correlations are small sums of lattice points lying on the\nsame circle; we show that, for generic integers representable as the sum of two\nsquares, there are no spectral quasi-correlations. Moreover, we apply our\nresult to study the nodal length of Arithmetic Random Waves at small scales: we\nshow that there exists a phase-transition for the distribution of the nodal\nlength at a logarithmic power above Planck-scale. Furthermore, we give strong\nevidence for the existence of an intermediate phase between Arithmetic and\nBerry's random waves.\n"", ""Nodal Statistics of Planar Random Waves We consider Berry's random planar wave model (1977) for a positive Laplace\neigenvalue $E>0$, both in the real and complex case, and prove limit theorems\nfor the nodal statistics associated with a smooth compact domain, in the\nhigh-energy limit ($E\\to \\infty$). Our main result is that both the nodal\nlength (real case) and the number of nodal intersections (complex case) verify\na Central Limit Theorem, which is in sharp contrast with the non-Gaussian\nbehaviour observed for real and complex arithmetic random waves on the flat\n$2$-torus, see Marinucci et al. (2016) and Dalmao et al. (2016). Our findings\ncan be naturally reformulated in terms of the nodal statistics of a single\nrandom wave restricted to a compact domain diverging to the whole plane. As\nsuch, they can be fruitfully combined with the recent results by Canzani and\nHanin (2016), in order to show that, at any point of isotropic scaling and for\nenergy levels diverging sufficently fast, the nodal length of any Gaussian\npullback monochromatic wave verifies a central limit theorem with the same\nscaling as Berry's model. As a remarkable byproduct of our analysis, we\nrigorously confirm the asymptotic behaviour for the variances of the nodal\nlength and of the number of nodal intersections of isotropic random waves, as\nderived in Berry (2002).\n""]","[('random waves', 0.5687032341957092), ('random wave', 0.5546650290489197), ('euclidean random', 0.45282459259033203), ('random gaussian', 0.4416176378726959), ('gaussian random', 0.42195427417755127), ('fluctuations number', 0.405129998922348), ('length random', 0.3934871256351471), ('random spherical', 0.38275766372680664), ('asymptotic variance', 0.3805796504020691), ('non gaussian', 0.3685644567012787)]" 478,478,63,478_systems controllability_controllability linear_controllability analysis_controllability matrix,"['systems controllability', 'controllability linear', 'controllability analysis', 'controllability matrix', 'minimal controllability', 'controllability system', 'controllability', 'controllability observability', 'controllability conditions', 'controllability can']","['Estimation of Strong Structural Controllable Subspace of Network:\n Equitable Partition Method In this paper, the strong structural controllability of the network is\nanalyzed. Based on the unified definition of equitable partition for kinds of\nscene, the upper bound of the strong structural controllable subspace in\ndifferent scenarios is given, and the strong structural observability is\nanalyzed by using the characteristics of the dual system. Finally, the\npractical significance when the dimension of the strong structural controllable\nsubspace is less than the number of individuals is given, and an invariant\nattribute of strong structural controllability analysis is proposed.\n', 'Composition Rules for Strong Structural Controllability and Minimum\n Input Problem in Diffusively-Coupled Networks This paper presents new results and reinterpretation of existing conditions\nfor strong structural controllability in a structured network determined by the\nzero/non-zero patterns of edges. For diffusively-coupled networks with\nself-loops, we first establish a necessary and sufficient condition for strong\nstructural controllability, based on the concepts of dedicated and sharing\nnodes. Subsequently, we define several conditions for strong structural\ncontrollability across various graph types by decomposing them into disjoint\npath graphs. We further extend our findings by introducing a composition rule,\nfacilitating the analysis of strong structural controllability in larger\nnetworks. This rule allows us to determine the strong structural\ncontrollability of connected graphs called pactus graphs (a generalization of\nthe well-known cactus graph) by consideration of the strong structural\ncontrollability of its disjoint component graphs. In this process, we introduce\nthe notion of a component input node, which is a state node that functions\nidentically to an external input node. Based on this concept, we present an\nalgorithm with approximate polynomial complexity to determine the minimum\nnumber of external input nodes required to maintain strong structural\ncontrollability in a diffusively-coupled network with self-loops.\n', 'The Controllability and Structural Controllability of Laplacian Dynamics In this paper, classic controllability and structural controllability under\ntwo protocols are investigated. For classic controllability, the multiplicity\nof eigenvalue zero of general Laplacian matrix $L^*$ is shown to be determined\nby the sum of the numbers of zero circles, identical nodes and opposite pairs,\nwhile it is always simple for the Laplacian $L$ with diagonal entries in\nabsolute form. For a fixed structurally balanced topology, the controllable\nsubspace is proved to be invariant even if the antagonistic weights are\nselected differently under the corresponding protocol with $L$. For a graph\nexpanded from a star graph rooted from a single leader, the dimension of\ncontrollable subspace is two under the protocol associated with $L^*$. In\naddition, the system is structurally controllable under both protocols if and\nonly if the topology without unaccessible nodes is connected. As a reinforcing\ncase of structural controllability, strong structural controllability requires\nthe system to be controllable for any choice of weights. The connection between\nfather nodes and child nodes affects strong structural controllability because\nit determines the linear relationship of the control information from father\nnodes. This discovery is a major factor in establishing the sufficient\nconditions on strong structural controllability for multi-agent systems under\nboth protocols, rather than for complex networks, about latter results are\nalready abundant.\n']","[('systems controllability', 0.6486363410949707), ('controllability linear', 0.6393600702285767), ('controllability analysis', 0.6369073987007141), ('controllability matrix', 0.6344345808029175), ('minimal controllability', 0.6115476489067078), ('controllability system', 0.6105129718780518), ('controllability', 0.6027651429176331), ('controllability observability', 0.6013805866241455), ('controllability conditions', 0.5984927415847778), ('controllability can', 0.5539373159408569)]" 479,479,63,479_lossless compression_image compression_lossy compression_compression performance,"['lossless compression', 'image compression', 'lossy compression', 'compression performance', 'compression rate', 'efficient compression', 'rate distortion', 'compression methods', 'compression', 'compression algorithms']","['Universal Representations for Classification-enhanced Lossy Compression In lossy compression, the classical tradeoff between compression rate and\nreconstruction distortion has traditionally guided algorithm design. However,\nBlau and Michaeli [5] introduced a generalized framework, known as the\nrate-distortion-perception (RDP) function, incorporating perceptual quality as\nan additional dimension of evaluation. More recently, the\nrate-distortion-classification (RDC) function was investigated in [19],\nevaluating compression performance by considering classification accuracy\nalongside distortion. In this paper, we explore universal representations,\nwhere a single encoder is developed to achieve multiple decoding objectives\nacross various distortion and classification (or perception) constraints. This\nuniversality avoids retraining encoders for each specific operating point\nwithin these tradeoffs. Our experimental validation on the MNIST dataset\nindicates that a universal encoder incurs only minimal performance degradation\ncompared to individually optimized encoders for perceptual image compression\ntasks, aligning with prior results from [23]. Nonetheless, we also identify\nthat in the RDC setting, reusing an encoder optimized for one specific\nclassification-distortion tradeoff leads to a significant distortion penalty\nwhen applied to alternative points.\n', 'A Rate-Distortion-Classification Approach for Lossy Image Compression In lossy image compression, the objective is to achieve minimal signal\ndistortion while compressing images to a specified bit rate. The increasing\ndemand for visual analysis applications, particularly in classification tasks,\nhas emphasized the significance of considering semantic distortion in\ncompressed images. To bridge the gap between image compression and visual\nanalysis, we propose a Rate-Distortion-Classification (RDC) model for lossy\nimage compression, offering a unified framework to optimize the trade-off\nbetween rate, distortion, and classification accuracy. The RDC model is\nextensively analyzed both statistically on a multi-distribution source and\nexperimentally on the widely used MNIST dataset. The findings reveal that the\nRDC model exhibits desirable properties, including monotonic non-increasing and\nconvex functions, under certain conditions. This work provides insights into\nthe development of human-machine friendly compression methods and Video Coding\nfor Machine (VCM) approaches, paving the way for end-to-end image compression\ntechniques in real-world applications.\n', 'Analysis and Enhancement of Lossless Image Compression in JPEG-XL As the demand for digital information grows in fields like medicine, remote\nsensing, and archival, efficient image compression becomes crucial. This paper\nfocuses on lossless image compression, vital for managing the increasing volume\nof image data without quality loss. Current research emphasizes techniques such\nas predictive coding, transform coding, and context modeling to improve\ncompression ratios. This study evaluates lossless compression in JPEG XL, the\nlatest standard in the JPEG family, and aims to enhance its compression ratio\nby modifying the codebase. Results show that while overall compression levels\nare below the original codec, one prediction method improves compression for\nspecific image types. This study offers insights into enhancing lossless\ncompression performance and suggests possibilities for future advancements in\nthis area.\n']","[('lossless compression', 0.6087267398834229), ('image compression', 0.6059099435806274), ('lossy compression', 0.5776505470275879), ('compression performance', 0.5611299276351929), ('compression rate', 0.5593934059143066), ('efficient compression', 0.5555649399757385), ('rate distortion', 0.5357561111450195), ('compression methods', 0.5208307504653931), ('compression', 0.519421398639679), ('compression algorithms', 0.5091071724891663)]" 480,480,63,480_group schemes_fundamental groups_etale fundamental_fundamental group,"['group schemes', 'fundamental groups', 'etale fundamental', 'fundamental group', 'abelian varieties', 'fundamental group mathbb', 'schemes', 'variety algebraically closed', 'abelian variety', 'conjecture etale']","[""The tame fundamental group schemes of curves in positive characteristic The tame fundamental group scheme for an algebraic variety is the maximal\nlinearly reductive quotient of Nori's fundamental group scheme. In this paper,\nwe study the tame fundamental group schemes of smooth curves defined over\nalgebraically closed fields of positive characteristic and develop the theory\nof cospecialization maps for them. As a result, we see that the tame\nfundamental group schemes heavily depend on the curves. We also see that\nnumerical invariants of curves can be reconstructed from the tame fundamental\ngroup schemes.\n"", ""The section conjecture for the toric fundamental group over $p$-adic\n fields The toric fundamental group is the Tannaka dual of a category of vector\nbundles which become direct sums of line bundles on a finite \\'etale cover. It\nis an extension of the \\'etale fundamental group scheme by a projective limit\nof tori.\n Grothendieck's section conjecture for the \\'etale fundamental group implies\nthe analogous statement for the toric fundamental group. We call this the toric\nsection conjecture. We prove that a resolution of the toric section conjecture\nwould reduce the original one to particular cases about which more is known,\nmainly due to J. Stix.\n We prove that abelian varieties over $p$-adic fields satisfy the toric\nsection conjecture, and give strong evidence that it holds for hyperbolic\ncurves over $p$-adic fields, too.\n"", 'A note on certain Tannakian group schemes In this note, we prove that the F-fundamental group scheme is birational\ninvariant for smooth projective varieties. We prove that the F-fundamental\ngroup scheme is naturally a quotient of the Nori fundamental group scheme. For\nelliptic curves, it turns out that the F-fundamental group scheme and the Nori\nfundamental group scheme coincides. We also consider an extension of the Nori\nfundamental group scheme in positive characteristic using semi-essentially\nfinite vector bundles and prove that in this way, we do not get a non-trivial\nextension of the Nori fundamental group scheme for elliptic curves, unlike in\ncharacteristic zero.\n']","[('group schemes', 0.5616292357444763), ('fundamental groups', 0.5542318224906921), ('etale fundamental', 0.5300147533416748), ('fundamental group', 0.5270683169364929), ('abelian varieties', 0.51651531457901), ('fundamental group mathbb', 0.49789679050445557), ('schemes', 0.4877047836780548), ('variety algebraically closed', 0.486341267824173), ('abelian variety', 0.4826926290988922), ('conjecture etale', 0.48142093420028687)]" 481,481,63,481_yang baxter solutions_solutions yang baxter_theoretic yang baxter_quantum yang baxter,"['yang baxter solutions', 'solutions yang baxter', 'theoretic yang baxter', 'quantum yang baxter', 'baxter solutions', 'solutions yang', 'yang baxter', 'solutions quantum', 'groups solutions', 'theoretic yang']","['A characterization of finite simple set-theoretic solutions of the\n Yang-Baxter equation In this paper we present a characterization of finite simple involutive\nnon-degenerate set-theoretic solutions of the Yang-Baxter equation by means of\nleft braces and we provide some significant examples.\n', 'Indecomposable involutive set-theoretical solutions to the Yang-Baxter\n equation of size $p^2$ The quantum Yang-Baxter equation is a braiding condition on vector spaces\nwhich is of high relevance in several fields of mathematics, such as knot\ntheory and quantum group theory. Their combinatorial counterpart are\nset-theoretic solutions to the Yang--Baxter equation, whose investigation is\nstrongly driven by the study of algebraic objects called (skew) braces. In this\narticle, we focus on indecomposable involutive non-degenerate set-theoretic\nsolutions to the Yang-Baxter equation. More specifically, through a thorough\nanalysis of their associated braces, we give a full classification of those\nwhich are of size $p^2$, for $p$ a prime.\n', 'Enumeration of set-theoretic solutions to the Yang-Baxter equation We use Constraint Satisfaction methods to enumerate and construct\nset-theoretic solutions to the Yang-Baxter equation of small size. We show that\nthere are 321931 involutive solutions of size nine, 4895272 involutive\nsolutions of size ten and 422449480 non-involutive solution of size eight. Our\nmethod is then used to enumerate non-involutive biquandles.\n']","[('yang baxter solutions', 0.7274637818336487), ('solutions yang baxter', 0.6957356333732605), ('theoretic yang baxter', 0.6372444033622742), ('quantum yang baxter', 0.6245448589324951), ('baxter solutions', 0.6140480637550354), ('solutions yang', 0.5185389518737793), ('yang baxter', 0.4996185600757599), ('solutions quantum', 0.4738007187843323), ('groups solutions', 0.46086952090263367), ('theoretic yang', 0.4398537278175354)]" 482,482,63,482_numerical approximation semilinear_approximation methods_numerical approximation_semilinear pdes,"['numerical approximation semilinear', 'approximation methods', 'numerical approximation', 'semilinear pdes', 'approximation schemes', 'stochastic galerkin methods', 'semilinear heat equations', 'elliptic pdes', 'approximation semilinear', 'semilinear parabolic partial']","['Multilevel Picard approximations for high-dimensional semilinear\n second-order PDEs with Lipschitz nonlinearities The recently introduced full-history recursive multilevel Picard (MLP)\napproximation methods have turned out to be quite successful in the numerical\napproximation of solutions of high-dimensional nonlinear PDEs. In particular,\nthere are mathematical convergence results in the literature which prove that\nMLP approximation methods do overcome the curse of dimensionality in the\nnumerical approximation of nonlinear second-order PDEs in the sense that the\nnumber of computational operations of the proposed MLP approximation method\ngrows at most polynomially in both the reciprocal $1/\\epsilon$ of the\nprescribed approximation accuracy $\\epsilon>0$ and the PDE dimension $d\\in\n\\mathbb{N}=\\{1,2,3, \\ldots\\}$. However, in each of the convergence results for\nMLP approximation methods in the literature it is assumed that the coefficient\nfunctions in front of the second-order differential operator are affine linear.\nIn particular, until today there is no result in the scientific literature\nwhich proves that any semilinear second-order PDE with a general time horizon\nand a non affine linear coefficient function in front of the second-order\ndifferential operator can be approximated without the curse of dimensionality.\nIt is the key contribution of this article to overcome this obstacle and to\npropose and analyze a new type of MLP approximation method for semilinear\nsecond-order PDEs with possibly nonlinear coefficient functions in front of the\nsecond-order differential operators. In particular, the main result of this\narticle proves that this new MLP approximation method does indeed overcome the\ncurse of dimensionality in the numerical approximation of semilinear\nsecond-order PDEs.\n', 'Overcoming the curse of dimensionality in the numerical approximation of\n high-dimensional semilinear elliptic partial differential equations Recently, so-called full-history recursive multilevel Picard (MLP)\napproximation schemes have been introduced and shown to overcome the curse of\ndimensionality in the numerical approximation of semilinear parabolic partial\ndifferential equations (PDEs) with Lipschitz nonlinearities. The key\ncontribution of this article is to introduce and analyze a new variant of MLP\napproximation schemes for certain semilinear elliptic PDEs with Lipschitz\nnonlinearities and to prove that the proposed approximation schemes overcome\nthe curse of dimensionality in the numerical approximation of such semilinear\nelliptic PDEs.\n', 'Numerical simulations for full history recursive multilevel Picard\n approximations for systems of high-dimensional partial differential equations One of the most challenging issues in applied mathematics is to develop and\nanalyze algorithms which are able to approximately compute solutions of\nhigh-dimensional nonlinear partial differential equations (PDEs). In\nparticular, it is very hard to develop approximation algorithms which do not\nsuffer under the curse of dimensionality in the sense that the number of\ncomputational operations needed by the algorithm to compute an approximation of\naccuracy $\\epsilon > 0$ grows at most polynomially in both the reciprocal\n$1/\\epsilon$ of the required accuracy and the dimension $d \\in \\mathbb{N}$ of\nthe PDE. Recently, a new approximation method, the so-called full history\nrecursive multilevel Picard (MLP) approximation method, has been introduced\nand, until today, this approximation scheme is the only approximation method in\nthe scientific literature which has been proven to overcome the curse of\ndimensionality in the numerical approximation of semilinear PDEs with general\ntime horizons. It is a key contribution of this article to extend the MLP\napproximation method to systems of semilinear PDEs and to numerically test it\non several example PDEs. More specifically, we apply the proposed MLP\napproximation method in the case of Allen-Cahn PDEs, Sine-Gordon-type PDEs,\nsystems of coupled semilinear heat PDEs, and semilinear Black-Scholes PDEs in\nup to 1000 dimensions. The presented numerical simulation results suggest in\nthe case of each of these example PDEs that the proposed MLP approximation\nmethod produces very accurate results in short runtimes and, in particular, the\npresented numerical simulation results indicate that the proposed MLP\napproximation scheme significantly outperforms certain deep learning based\napproximation methods for high-dimensional semilinear PDEs.\n']","[('numerical approximation semilinear', 0.577593982219696), ('approximation methods', 0.5028925538063049), ('numerical approximation', 0.49057093262672424), ('semilinear pdes', 0.4715627431869507), ('approximation schemes', 0.4654906988143921), ('stochastic galerkin methods', 0.4595715403556824), ('semilinear heat equations', 0.4514892101287842), ('elliptic pdes', 0.4385432004928589), ('approximation semilinear', 0.4330664873123169), ('semilinear parabolic partial', 0.3970268964767456)]" 483,483,63,483_optimal power flow_ac optimal power_ac power flow_ac optimal,"['optimal power flow', 'ac optimal power', 'ac power flow', 'ac optimal', 'power flow', 'power flow opf', 'power grid', 'power flow equations', 'current optimal power', 'optimal power']","[""Differentiable Optimization for Deep Learning-Enhanced DC Approximation\n of AC Optimal Power Flow The growing scale of power systems and the increasing uncertainty introduced\nby renewable energy sources necessitates novel optimization techniques that are\nsignificantly faster and more accurate than existing methods. The AC Optimal\nPower Flow (AC-OPF) problem, a core component of power grid optimization, is\noften approximated using linearized DC Optimal Power Flow (DC-OPF) models for\ncomputational tractability, albeit at the cost of suboptimal and inefficient\ndecisions. To address these limitations, we propose a novel deep learning-based\nframework for network equivalency that enhances DC-OPF to more closely mimic\nthe behavior of AC-OPF. The approach utilizes recent advances in differentiable\noptimization, incorporating a neural network trained to predict adjusted nodal\nshunt conductances and branch susceptances in order to account for nonlinear\npower flow behavior. The model can be trained end-to-end using modern deep\nlearning frameworks by leveraging the implicit function theorem. Results\ndemonstrate the framework's ability to significantly improve prediction\naccuracy, paving the way for more reliable and efficient power systems.\n"", 'Learning to Solve AC Optimal Power Flow by Differentiating through\n Holomorphic Embeddings Alternating current optimal power flow (AC-OPF) is one of the fundamental\nproblems in power systems operation. AC-OPF is traditionally cast as a\nconstrained optimization problem that seeks optimal generation set points\nwhilst fulfilling a set of non-linear equality constraints -- the power flow\nequations. With increasing penetration of renewable generation, grid operators\nneed to solve larger problems at shorter intervals. This motivates the research\ninterest in learning OPF solutions with neural networks, which have fast\ninference time and is potentially scalable to large networks. The main\ndifficulty in solving the AC-OPF problem lies in dealing with this equality\nconstraint that has spurious roots, i.e. there are assignments of voltages that\nfulfill the power flow equations that however are not physically realizable.\nThis property renders any method relying on projected-gradients brittle because\nthese non-physical roots can act as attractors. In this paper, we show\nefficient strategies that circumvent this problem by differentiating through\nthe operations of a power flow solver that embeds the power flow equations into\na holomorphic function. The resulting learning-based approach is validated\nexperimentally on a 200-bus system and we show that, after training, the\nlearned agent produces optimized power flow solutions reliably and fast.\nSpecifically, we report a 12x increase in speed and a 40% increase in\nrobustness compared to a traditional solver. To the best of our knowledge, this\napproach constitutes the first learning-based approach that successfully\nrespects the full non-linear AC-OPF equations.\n', ""Improving the Accuracy of DC Optimal Power Flow Formulations via\n Parameter Optimization DC Optimal Power Flow (DC-OPF) problems optimize the generators' active power\nsetpoints while satisfying constraints based on the DC power flow\nlinearization. The computational tractability advantages of DC-OPF problems\ncome at the expense of inaccuracies relative to AC Optimal Power Flow (AC-OPF)\nproblems which accurately model the nonlinear steady-state behavior of power\ngrids. This paper proposes an algorithm that significantly improves the\naccuracy of the generators' active power setpoints from DC-OPF problems with\nrespect to the corresponding AC-OPF problems over a specified range of\noperating conditions. Using sensitivity information in a machine\nlearning-inspired methodology, this algorithm tunes coefficient and bias\nparameters in the DC power flow approximation to improve the accuracy of the\nresulting DC-OPF solutions. Employing the Truncated Newton Conjugate-Gradient\n(TNC) method -- a Quasi-Newton optimization technique -- this parameter tuning\noccurs during an offline training phase, with the resulting parameters then\nused in online computations. Numerical results underscore the algorithm's\nefficacy with accuracy improvements in squared two-norm and $\\infty$-norm\nlosses of up to $90\\%$ and $79\\%$, respectively, relative to traditional DC-OPF\nformulations.\n""]","[('optimal power flow', 0.5480743050575256), ('ac optimal power', 0.5040249228477478), ('ac power flow', 0.45992571115493774), ('ac optimal', 0.4550696611404419), ('power flow', 0.45172393321990967), ('power flow opf', 0.44556885957717896), ('power grid', 0.4416418671607971), ('power flow equations', 0.4300520718097687), ('current optimal power', 0.42112356424331665), ('optimal power', 0.41454291343688965)]" 484,484,63,484_dividends_dividend_markov additive process_stochastic control,"['dividends', 'dividend', 'markov additive process', 'stochastic control', 'levy processes', 'surplus process', 'markov additive', 'process optimal', 'optimality', 'risk theory']","[""An optimization dichotomy for capital injections and absolutely\n continuous dividend strategies We consider an optimal stochastic control problem in which a firm's\ncash/surplus process is controlled by dividend payments and capital injections.\nStockholders aim to maximize their dividend stream minus the cost of injecting\ncapital, if needed. We consider absolutely continuous dividend policies subject\nto a level-dependent upper bound on the dividend rate while we allow for\ngeneral capital injections behavior. We prove that the optimal strategy can\nonly be of two types: dividends are paid according to a \\textit{mean-reverting}\nstrategy with capital injections performed each time the cash process reaches\nzero; or, dividends are paid according to another \\textit{mean-reverting}\nstrategy and no injection of capital is ever made, until ruin is reached. We\ngive a complete solution to this problem and characterize this dichotomy by\ncomparing (the derivatives of) the value functions at zero of two sub-problems.\nThe first sub-problem is concerned solely with the maximization of dividends,\nwhile the second sub-problem is the corresponding bail-out optimal dividend\nproblem for which we provide also a complete solution.\n"", ""On De Finetti's control under Poisson observations: optimality of a\n double barrier strategy in a Markov additive model In this paper we consider the De Finetti's optimal dividend and capital\ninjection problem under a Markov additive model. We assume that the surplus\nprocess before dividends and capital injections follows a spectrally positive\nMarkov additive process. Dividend payments are made only at the jump times of\nan independent Poisson process. Capitals are required to be injected whenever\nneeded to ensure a non-negative surplus process to avoid bankruptcy. Our\npurpose is to characterize the optimal periodic dividend and capital injection\nstrategy that maximizes the expected total discounted dividends subtracted by\nthe total discounted costs of capital injection. To this end, we first consider\nan auxiliary optimal periodic dividend and capital injection problem with final\npayoff under a single spectrally positive L\\'evy process and conjecture that\nthe optimal strategy is a double barrier strategy. Using the fluctuation theory\nand excursion-theoretical approach of the spectrally positive L\\'evy process\nand the Hamilton-Jacobi-Bellman inequality approach of the control theory, we\nare able to verify the conjecture that some double barrier periodic dividend\nand capital injection strategy solves the auxiliary problem. With the results\nfor the auxiliary control problem and a fixed point argument for recursive\niterations induced by the dynamic programming principle, the optimality of a\nregime-modulated double barrier periodic dividend and capital injection\nstrategy is proved for our target control problem.\n"", 'Optimal ratcheting of dividend payout under Brownian motion surplus This paper is concerned with a long standing optimal dividend payout problem\nsubject to the so-called ratcheting constraint, that is, the dividend payout\nrate shall be non-decreasing over time and is thus self-path-dependent. The\nsurplus process is modeled by a drifted Brownian motion process and the aim is\nto find the optimal dividend ratcheting strategy to maximize the expectation of\nthe total discounted dividend payouts until the ruin time. Due to the\nself-path-dependent control constraint, the standard control theory cannot be\ndirectly applied to tackle the problem. The related Hamilton-Jacobi-Bellman\n(HJB) equation is a new type of variational inequality. In the literature, it\nis only shown to have a viscosity solution, which is not strong enough to\nguarantee the existence of an optimal dividend ratcheting strategy. This paper\nproposes a novel partial differential equation method to study the HJB\nequation. We not only prove the the existence and uniqueness of the solution in\nsome stronger functional space, but also prove the strict monotonicity,\nboundedness, and $C^\\infty$-smoothness of the dividend ratcheting free\nboundary. Based on these results, we eventually derive an optimal dividend\nratcheting strategy, and thus solve the open problem completely. Economically\nspeaking, we find that if the surplus volatility is above an explicit\nthreshold, then one should pay dividends at the maximum rate, regardless the\nsurplus level. Otherwise, by contrast, the optimal dividend ratcheting strategy\nrelays on the surplus level and one should only ratchet up the dividend payout\nrate when the surplus level touches the dividend ratcheting free boundary.\nMoreover, our numerical results suggest that one should invest into those\ncompanies with stable dividend payout strategies since their income rates\nshould be higher and volatility rates smaller.\n']","[('dividends', 0.49920588731765747), ('dividend', 0.47229570150375366), ('markov additive process', 0.42522016167640686), ('stochastic control', 0.40502607822418213), ('levy processes', 0.36901596188545227), ('surplus process', 0.3542971611022949), ('markov additive', 0.35388848185539246), ('process optimal', 0.3493140637874603), ('optimality', 0.3413011431694031), ('risk theory', 0.3352701961994171)]" 485,485,63,485_viscous hamilton jacobi_convex hamilton jacobi_solutions hamilton jacobi_existence viscosity solutions,"['viscous hamilton jacobi', 'convex hamilton jacobi', 'solutions hamilton jacobi', 'existence viscosity solutions', 'hamilton jacobi equations', 'viscous hamilton', 'existence viscosity', 'convex hamilton', 'convergence viscosity', 'viscosity solutions']","['The selection problem for a new class of perturbations of\n Hamilton-Jacobi equations and its applications This paper studies a perturbation problem given by the equation:\n\\begin{equation*} H(x, d_xu_\\lambda, \\lambda u_\\lambda(x))+\\lambda\nV(x,\\lambda)=c \\quad \\text{in $M$}, \\end{equation*} where $M$ is a closed\nmanifold and $\\lambda>0$ is a perturbation parameter. The Hamiltonian\n$H(x,p,u):T^*M\\times \\mathbb{R}\\to \\mathbb{R}$ satisfies certain convexity,\nsuperlinearity, and monotonicity conditions. $\\lambda\nV(\\cdot,\\lambda):M\\to\\mathbb{R}$ converges to zero as $\\lambda\\to 0$. First, we\nstudy the asymptotic behavior of the viscosity solution\n$u_\\lambda:M\\to\\mathbb{R}$ as $\\lambda$ approaches zero. This perturbation\nproblem explores the combined effects of both the vanishing discount process\nand potential perturbations, leading to a new selection principle that extends\nbeyond the classical vanishing discount approach. Additionally, we apply this\nprinciple to Hamilton-Jacobi equations with $u$-independent Hamiltonians,\nresulting in the introduction of a new solution operator. This operator\nprovides new insights into the variational characterization of viscosity\nsolutions and Mather measures.\n', ""On the negative limit of viscosity solutions for discounted\n Hamilton-Jacobi equations Suppose $M$ is a closed Riemannian manifold. For a $C^2$ generic (in the\nsense of Ma\\~n\\'e) Tonelli Hamiltonian $H: T^*M\\rightarrow\\mathbb{R}$, the\nminimal viscosity solution $u_\\lambda^-:M\\rightarrow \\mathbb{R}$ of the\nnegative discounted equation \\[-\\lambda u+H(x,d_xu)=c(H),\\quad x\\in M,\\\n\\lambda>0 \\] with the Ma\\~n\\'e's critical value $c(H)$ converges to a uniquely\nestablished viscosity solution $u_0^-$ of the critical Hamilton-Jacobi equation\n\\[ H(x,d_x u)=c(H),\\quad x\\in M \\] as $\\lambda\\rightarrow 0_+$. We also propose\na dynamical interpretation of $u_0^-$.\n"", 'Convergence of solutions for some degenerate discounted Hamilton--Jacobi\n equations We study solutions of Hamilton--Jacobi equations of the form $$\\lambda\n\\alpha(x) u_\\lambda(x) + H(x, D_x u_\\lambda) = c,$$\n where $\\alpha$ is a nonnegative function, $\\lambda$ a positive constant, $c$\na constant and $H $ a convex coercive Hamiltonian. Under suitable conditions on\n$\\alpha$ we prove that the functions $u_\\lambda$ converge as $\\lambda\\to 0$ to\na function $u_0$ that is a solution of the critical equation $H(x, D_x u_0) =\nc$.\n']","[('viscous hamilton jacobi', 0.6327298879623413), ('convex hamilton jacobi', 0.6288728713989258), ('solutions hamilton jacobi', 0.6039184331893921), ('existence viscosity solutions', 0.5780844688415527), ('hamilton jacobi equations', 0.5732761025428772), ('viscous hamilton', 0.5586130619049072), ('existence viscosity', 0.5216942429542542), ('convex hamilton', 0.5071069598197937), ('convergence viscosity', 0.4984537959098816), ('viscosity solutions', 0.4887389540672302)]" 486,486,63,486_simplicial complexes_simplicial complex_random geometric graph_hypergraphs random,"['simplicial complexes', 'simplicial complex', 'random geometric graph', 'hypergraphs random', 'simplicial', 'random hypergraph', 'topology random', 'random geometric', 'random clique', 'random dimensional']","['Ample simplicial complexes Motivated by potential applications in network theory, engineering and\ncomputer science, we study $r$-ample simplicial complexes. These complexes can\nbe viewed as finite approximations to the Rado complex which has a remarkable\nproperty of {\\it indestructibility,} in the sense that removing any finite\nnumber of its simplexes leaves a complex isomorphic to itself. We prove that an\n$r$-ample simplicial complex is simply connected and $2$-connected for $r$\nlarge. The number $n$ of vertexes of an $r$-ample simplicial complex satisfies\n$\\exp(\\Omega(\\frac{2^r}{\\sqrt{r}}))$. We use the probabilistic method to\nestablish the existence of $r$-ample simplicial complexes with $n$ vertexes for\nany $n>r 2^r 2^{2^r}$. Finally, we introduce the iterated Paley simplicial\ncomplexes, which are explicitly constructed $r$-ample simplicial complexes with\nnearly optimal number of vertexes.\n', ""Central limit theorems for Soft random simplicial complexes A soft random graph $G(n,r,p)$ can be obtained from the random geometric\ngraph $G(n,r)$ by keeping every edge in $G(n,r)$ with probability $p$. The soft\nrandom simplicial complexes is a model for random simplicial complexes built\nover the soft random graph $G(n,r,p)$. This new model depends on a probability\nvector $\\rho$ which allows the simplicial complexes to present randomness in\nall dimensions. In this article, we use a normal approximation theorem to prove\ncentral limit theorems for the number of $k$-faces and for the Euler's\ncharacteristic for soft random simplicial complexes.\n"", ""Law of large numbers for Betti numbers of homogeneous and spatially\n independent random simplicial complexes The Linial-Meshulam complex model is a natural higher-dimensional analog of\nthe Erd\\H{o}s-R\\'enyi graph model. In recent years, Linial and Peled\nestablished a limit theorem for Betti numbers of Linial-Meshulam complexes with\nan appropriate scaling of the underlying parameter. The present paper aims to\nextend that result to more-general random simplicial complex models. We\nintroduce a class of homogeneous and spatially independent random simplicial\ncomplexes, including the Linial-Meshulam complex model and the random clique\ncomplex model as special cases, and we study the asymptotic behavior of their\nBetti numbers. Moreover, we obtain the convergence of the empirical spectral\ndistributions of their Laplacians. A key element in the argument is the local\nweak convergence of simplicial complexes. Inspired by the work of Linial and\nPeled, we establish the local weak limit theorem for homogeneous and spatially\nindependent random simplicial complexes.\n""]","[('simplicial complexes', 0.5944415330886841), ('simplicial complex', 0.5620343685150146), ('random geometric graph', 0.5047833323478699), ('hypergraphs random', 0.5039939284324646), ('simplicial', 0.4867057800292969), ('random hypergraph', 0.443040668964386), ('topology random', 0.43720677495002747), ('random geometric', 0.43413013219833374), ('random clique', 0.43124207854270935), ('random dimensional', 0.43001478910446167)]" 487,487,63,487_sphere packings_bounds sphere packing_sphere packing_packing bound,"['sphere packings', 'bounds sphere packing', 'sphere packing', 'packing bound', 'sphere packing density', 'packing density', 'packing densities', 'packing covering', 'ball packings', 'packing mathbb']","[""Bounds for totally separable translative packings in the plane A packing of translates of a convex domain in the Euclidean plane is said to\nbe totally separable if any two packing elements can be separated by a line\ndisjoint from the interior of every packing element. This notion was introduced\nby G. Fejes T\\'oth and L. Fejes T\\'oth (1973) and has attracted significant\nattention. In this paper we prove an analogue of Oler's inequality for totally\nseparable translative packings of convex domains and then we derive from it\nsome new results. This includes finding the largest density of totally\nseparable translative packings of an arbitrary convex domain and finding the\nsmallest area convex hull of totally separable packings (resp., totally\nseparable soft packings) generated by given number of translates of a convex\ndomain (resp., soft convex domain). Finally, we determine the largest covering\nratio (that is, the largest fraction of the plane covered by the soft disks) of\nan arbitrary totally separable soft disk packing with given soft parameter.\n"", ""Density of triangulated ternary disc packings We consider ternary disc packings of the plane, i.e. the packings using discs\nof three different radii. Packings in which each ''hole'' is bounded by three\npairwise tangent discs are called triangulated. There are 164 pairs $(r,s)$,\n$1{>}r{>}s$, allowing triangulated packings by discs of radii 1, $r$ and $s$.\nIn this paper, we enhance existing methods of dealing with maximal-density\npackings in order to find ternary triangulated packings which maximize the\ndensity among all the packings with the same disc radii. We showed for 16 pairs\nthat the density is maximized by a triangulated ternary packing; for 15 other\npairs, we proved the density to be maximized by a triangulated packing using\nonly two sizes of discs; for 40 pairs, we found non-triangulated packings\nstrictly denser than any triangulated one; finally, we classified the remaining\ncases where our methods are not applicable.\n"", 'On contact numbers of locally separable unit sphere packings The contact number of a packing of finitely many balls in Euclidean $d$-space\nis the number of touching pairs of balls in the packing. A prominent subfamily\nof sphere packings is formed by the so-called totally separable sphere\npackings: here, a packing of balls in Euclidean $d$-space is called totally\nseparable if any two balls can be separated by a hyperplane such that it is\ndisjoint from the interior of each ball in the packing. Bezdek, Szalkai and\nSzalkai (Discrete Math. 339(2): 668-676, 2016) upper bounded the contact\nnumbers of totally separable packings of $n$ unit balls in Euclidean $d$-space\nin terms of $n$ and $d$. In this paper we improve their upper bound and extend\nthat new upper bound to the so-called locally separable packings of unit balls.\nWe call a packing of unit balls a locally separable packing if each unit ball\nof the packing together with the unit balls that are tangent to it form a\ntotally separable packing. In the plane, we prove a crystallization result by\ncharacterizing all locally separable packings of $n$ unit disks having maximum\ncontact number.\n']","[('sphere packings', 0.6722238063812256), ('bounds sphere packing', 0.6599403619766235), ('sphere packing', 0.6526076793670654), ('packing bound', 0.6494789719581604), ('sphere packing density', 0.6379593014717102), ('packing density', 0.6268922686576843), ('packing densities', 0.6107833981513977), ('packing covering', 0.6016293168067932), ('ball packings', 0.5285456776618958), ('packing mathbb', 0.5281727910041809)]" 488,488,62,488_skew braces_skew brace_symmetric skew_skew,"['skew braces', 'skew brace', 'symmetric skew', 'skew', 'theory skew', 'left braces', 'skew left', 'braces', 'brace', 'left brace']","['On two-sided skew braces In order to study two-sided skew braces, we introduce the notion of weakly\ntrivial skew braces. We give a classification of such skew braces and show that\nthey are essential in the study of two-sided skew braces. As an application, we\nobtain new and generalize known results relating the additive and\nmultiplicative group of two-sided skew braces. Further, we show that two a\npriori different notions of prime and semi-prime skew braces, as introduced by\nKonovalov, Smoktunowicz and Vendramin, coincide for two-sided skew braces.\n', ""Central series' and ($n$)-isoclinism of skew left braces The aim of this article is to advance the knowledge on the theory of skew\nleft braces. We introduce a subclass of skew left braces, which we denote by\n$\\mathcal{I}_n$, $n \\ge 1$, such that elements of the annihilator and lower\ncentral series' interact `nicely' with respect to commutation. That allows us\nto define a concept of $n$-isoclinism of skew left braces in $\\mathcal{I}_n$,\nby using a concept of brace commutator words, which we have introduced. We\nprove results on $1$-isoclinism (isoclinism) of skew left braces analogous to\nimportant results in group theory. For any two symmetric $n$-isoclinic skew\nleft braces $A$ and $B$, we prove that, there exist skew left braces $C$ and\n$R$ such that both $A$ and $B$ are $n$-isoclinic to both $C$ and $R$ and (i)\n$A$ and $B$ are quotient skew left braces of $C$; (ii) $A$ and $B$ are sub-skew\nleft braces of $R$. Connections between a skew left brace and the group which\noccurs as a natural semi-direct product of additive and multiplicative groups\nof the skew left brace are investigated, and it is proved that $n$-isoclinism\nis preserved from braces to groups. We also show that various nilpotency\nconcepts on skew left braces are invariant under $n$-isoclinism.\n"", 'Aspects of the Category SKB of Skew Braces We examine the pointed protomodular category SKB of left skew braces. We\nstudy the notion of commutator of ideals in a left skew brace. Notice that in\nthe literature, ""product"" of ideals of skew braces is often considered. We show\nthat Huq=Smith for left skew braces. Finally, we give a set of generators for\nthe commutator of two ideals, and prove that every ideal of a left skew brace\nhas a centralizer.\n']","[('skew braces', 0.7390409708023071), ('skew brace', 0.6907340288162231), ('symmetric skew', 0.5855985283851624), ('skew', 0.5433050394058228), ('theory skew', 0.5334663391113281), ('left braces', 0.5188145637512207), ('skew left', 0.5156097412109375), ('braces', 0.511692464351654), ('brace', 0.4683283269405365), ('left brace', 0.4497099816799164)]" 489,489,62,489_hypersurfaces mean curvature_boundary hypersurfaces_convex hypersurfaces_hypersurfaces hyperbolic,"['hypersurfaces mean curvature', 'boundary hypersurfaces', 'convex hypersurfaces', 'hypersurfaces hyperbolic', 'hypersurfaces hyperbolic space', 'generalized mean curvature', 'hypersurfaces', 'hypersurfaces mean', 'mean curvature prescribed', 'hypersurface']","['Compactness of capillary hypersurfaces with mean curvature prescribed by\n ambient functions We prove a compactness result for capillary hypersurfaces with mean curvature\nprescribed by ambient functions, which generalizes the results of Sch\\""atzle\nand Bellettini to the capillary case. The proof relies on extending the\ndefinition of (unoriented) curvature varifolds with capillary boundary\nintroduced by Wang-Zhang to the context of oriented integral varifolds. We also\ndiscuss the case when the mean curvature of the boundary is prescribed.\n', 'Regularity of minimal surfaces with capillary boundary conditions We prove $\\varepsilon$-regularity theorems for varifolds with capillary\nboundary condition in a Riemannian manifold. These varifolds were first\nintroduced by Kagaya-Tonegawa \\cite{KaTo}. We establish a uniform first\nvariation control for all such varifolds (and free-boundary varifolds\ngenerally) satisfying a sharp density bound and prove that if a capillary\nvarifold has bounded mean curvature and is close to a capillary half-plane with\nangle not equal to $\\tfrac{\\pi}{2}$, then it coincides with a $C^{1,\\alpha}$\nproperly embedded hypersurface. We apply our theorem to deduce regularity at a\ngeneric point along the boundary in the region where the density is strictly\nless than $1$.\n', ""Anisotropic mean curvature type flow and capillary Alexandrov-Fenchel\n inequalities In this paper, an anisotropic volume-preserving mean curvature type flow for\nstar-shaped anisotropic $\\omega_0$-capillary hypersurfaces in the half-space is\nstudied, and the long-time existence and smooth convergence to a capillary\nWulff shape are obtained. If the initial hypersurface is strictly convex, the\nsolution of this flow remains to be strictly convex for all $t>0$ by adopting a\nnew approach applicable to anisotropic capillary setting. In analogy with\nclosed hypersurfaces, if the $\\omega_0$-capillary Wulff shape is a\n$\\theta$-capillary hypersurface with constant contact angle $\\theta$, the\nquermassintegrals for anisotropic capillary hypersurfaces match the mixed\nvolume of two $\\theta$-capillary convex bodies. Thus, generalized\nquermassintegrals for anisotropic capillary hypersurfaces with general Wulff\nshapes (i.e., the $\\omega_0$-capillary Wulff shape has a variable contact\nangle) can be defined, which satisfy certain monotonicity properties along the\nflow. As applications, we establish an anisotropic capillary isoperimetric\ninequality for star-shaped anisotropic capillary hypersurfaces and a family of\nnew Alexandrov-Fenchel inequalities for strictly convex anisotropic capillary\nhypersurfaces. In particular, we provide a flow's method to derive the\nAlexandrov-Fenchel inequalities for two $\\theta$-capillary hypersurfaces,\ndemonstrated in [30] (arXiv:2408.13655) from the view of point in convex\ngeometry.\n""]","[('hypersurfaces mean curvature', 0.6499007940292358), ('boundary hypersurfaces', 0.5924600958824158), ('convex hypersurfaces', 0.5805371999740601), ('hypersurfaces hyperbolic', 0.5671579241752625), ('hypersurfaces hyperbolic space', 0.5535412430763245), ('generalized mean curvature', 0.5297123193740845), ('hypersurfaces', 0.5277754664421082), ('hypersurfaces mean', 0.524685800075531), ('mean curvature prescribed', 0.5164006352424622), ('hypersurface', 0.49543413519859314)]" 490,490,62,490_anosov representations_group representations_representations introduced_representations,"['anosov representations', 'group representations', 'representations introduced', 'representations', 'representations sl', 'representations finitely generated', 'representations finitely', 'representations closed', 'discrete representations', 'relatively hyperbolic groups']","['Reducible Suspensions of Anosov Representations We study through the lens of Anosov representations the dynamical properties\nof reducible suspensions of linear representations of non-elementary hyperbolic\ngroups, which are linear representations preserving and acting weakly\nunipotently on a proper non-zero subspace. We characterize when reducible\nsuspensions are discrete and (almost) faithful, quasi-isometrically embedded,\nand Anosov. Anosov reducible suspensions correspond to points in bounded convex\ndomains in a finite-dimensional real vector space. Stronger characterizations\nof such domains for symmetric Anosov representations allow us to find\ndeformations of Borel Anosov representations which retain some but not all of\nthe Anosov conditions and to compute examples of non-Anosov limits of Anosov\nrepresentations.\n', 'Topological restrictions on relatively Anosov representations We obtain restrictions on which groups can admit relatively Anosov\nrepresentations into specified target Lie groups, by examining the topology of\npossible Bowditch boundaries and how they interact with the Anosov limit maps.\nFor instance, we prove that, up to finite index, any group admitting a\nrelatively Anosov representation into SL(3,R) is a free group or surface group,\nand any group admitting a relatively k-Anosov representation into Sp(2m,R),\nwhere k is an odd integer between 1 and m, is a surface group or a free product\nof nilpotent groups.\n We also obtain a characterization of groups admitting relatively 1-Anosov\nrepresentations into SL(4,R), general bounds on the dimension of the Bowditch\nboundary of groups admitting relatively Anosov representations into SL(d,R),\nstatements relating spheres in the Bowditch boundary to the (non-)existence of\nrelatively Anosov representations, and a characterization of groups of\ncohomological dimension at least d-1 admitting relatively 1-Anosov\nrepresentations into SL(d,R).\n', 'Cusped Hitchin representations and Anosov representations of\n geometrically finite Fuchsian groups We develop a theory of Anosov representation of geometrically finite Fuchsian\ngroups in SL(d,R) and show that cusped Hitchin representations are Borel Anosov\nin this sense. We establish analogues of many properties of traditional Anosov\nrepresentations. In particular, we show that our Anosov representations are\nstable under type-preserving deformations and that their limit maps vary\nanalytically. We also observe that our Anosov representations fit into the\nprevious frameworks of relatively Anosov and relatively dominated\nrepresentations developed by Kapovich-Leeb and Zhu.\n']","[('anosov representations', 0.7431021928787231), ('group representations', 0.5515949130058289), ('representations introduced', 0.5375238060951233), ('representations', 0.5358865857124329), ('representations sl', 0.5277115106582642), ('representations finitely generated', 0.5168331861495972), ('representations finitely', 0.5098429918289185), ('representations closed', 0.5033633708953857), ('discrete representations', 0.49604612588882446), ('relatively hyperbolic groups', 0.4943126440048218)]" 491,491,62,491_random forests_random forest_regression trees_trees forests,"['random forests', 'random forest', 'regression trees', 'trees forests', 'tree forest', 'forests', 'tree models', 'forest', 'regression tree', 'decision trees']","['Exogenous Randomness Empowering Random Forests We offer theoretical and empirical insights into the impact of exogenous\nrandomness on the effectiveness of random forests with tree-building rules\nindependent of training data. We formally introduce the concept of exogenous\nrandomness and identify two types of commonly existing randomness: Type I from\nfeature subsampling, and Type II from tie-breaking in tree-building processes.\nWe develop non-asymptotic expansions for the mean squared error (MSE) for both\nindividual trees and forests and establish sufficient and necessary conditions\nfor their consistency. In the special example of the linear regression model\nwith independent features, our MSE expansions are more explicit, providing more\nunderstanding of the random forests\' mechanisms. It also allows us to derive an\nupper bound on the MSE with explicit consistency rates for trees and forests.\nGuided by our theoretical findings, we conduct simulations to further explore\nhow exogenous randomness enhances random forest performance. Our findings\nunveil that feature subsampling reduces both the bias and variance of random\nforests compared to individual trees, serving as an adaptive mechanism to\nbalance bias and variance. Furthermore, our results reveal an intriguing\nphenomenon: the presence of noise features can act as a ""blessing"" in enhancing\nthe performance of random forests thanks to feature subsampling.\n', 'Minimax Rates for High-Dimensional Random Tessellation Forests Random forests are a popular class of algorithms used for regression and\nclassification. The algorithm introduced by Breiman in 2001 and many of its\nvariants are ensembles of randomized decision trees built from axis-aligned\npartitions of the feature space. One such variant, called Mondrian forests, was\nproposed to handle the online setting and is the first class of random forests\nfor which minimax rates were obtained in arbitrary dimension. However, the\nrestriction to axis-aligned splits fails to capture dependencies between\nfeatures, and random forests that use oblique splits have shown improved\nempirical performance for many tasks. In this work, we show that a large class\nof random forests with general split directions also achieve minimax optimal\nconvergence rates in arbitrary dimension. This class includes STIT forests, a\ngeneralization of Mondrian forests to arbitrary split directions, as well as\nrandom forests derived from Poisson hyperplane tessellations. These are the\nfirst results showing that random forest variants with oblique splits can\nobtain minimax optimality in arbitrary dimension. Our proof technique relies on\nthe novel application of the theory of stationary random tessellations in\nstochastic geometry to statistical learning theory.\n', 'Asymptotic Properties of High-Dimensional Random Forests As a flexible nonparametric learning tool, the random forests algorithm has\nbeen widely applied to various real applications with appealing empirical\nperformance, even in the presence of high-dimensional feature space. Unveiling\nthe underlying mechanisms has led to some important recent theoretical results\non the consistency of the random forests algorithm and its variants. However,\nto our knowledge, almost all existing works concerning random forests\nconsistency in high dimensional setting were established for various modified\nrandom forests models where the splitting rules are independent of the\nresponse; a few exceptions assume simple data generating models with binary\nfeatures. In light of this, in this paper we derive the consistency rates for\nthe random forests algorithm associated with the sample CART splitting\ncriterion, which is the one used in the original version of the algorithm, in a\ngeneral high-dimensional nonparametric regression setting through a\nbias-variance decomposition analysis. Our new theoretical results show that\nrandom forests can indeed adapt to high dimensionality and allow for\ndiscontinuous regression function. Our bias analysis characterizes explicitly\nhow the random forests bias depends on the sample size, tree height, and column\nsubsampling parameter. Some limitations on our current results are also\ndiscussed.\n']","[('random forests', 0.6068018078804016), ('random forest', 0.5975457429885864), ('regression trees', 0.5601415038108826), ('trees forests', 0.5339198112487793), ('tree forest', 0.5095943212509155), ('forests', 0.4905528426170349), ('tree models', 0.4656199514865875), ('forest', 0.4621380567550659), ('regression tree', 0.4558812975883484), ('decision trees', 0.4510056674480438)]" 492,492,62,492_ultrametric spaces_ultrametric space_pseudometric spaces_semimetric spaces,"['ultrametric spaces', 'ultrametric space', 'pseudometric spaces', 'semimetric spaces', 'ultrametrics', 'ultrametric', 'universal spaces', 'metrizable space', 'arbitrary metric space', 'proper metric spaces']","[""Constructions of Urysohn universal ultrametric spaces In this paper, we give new constructions of Urysohn universal ultrametric\nspaces. We first characterize a Urysohn universal ultrametric subspace of the\nspace of all continuous functions whose images contain the zero, from a\nzero-dimensional compact Hausdorff space without isolated points into the space\nof non-negative real numbers equipped with the nearly discrete topology. As a\nconsequence, the whole function space is Urysohn universal, which can be\nconsidered as a non-Archimedean analog of Banach--Mazur theorem. As a more\napplication, we prove that the space of all continuous pseudo-ultrametrics on a\nzero-dimensional compact Hausdorff space with an accumulation point is a\nUrysohn universal ultrametric space. This result can be considered as a variant\nof Wan's construction of Urysohn universal ultrametric space via the\nGromov--Hausdorff ultrametric space.\n"", 'Ultrametric preserving functions and weak similarities of ultrametric\n spaces Let $WS(X, d)$ be the class of ultrametric spaces which are weakly similar to\nultrametric space $(X, d)$. The main results of the paper completely describe\nthe ultrametric spaces $(X, d)$ for which the equality $$ \\rho(x, y) =\nf(d(\\Phi(x), \\Phi(y))) $$ holds for every $(Y, \\rho) \\in WS(X, d)$, every weak\nsimilarity $\\Phi \\colon Y \\to X$, and all $x$, $y \\in Y$ with some ultrametric\n(pseudoultrametric) preserving function $f$ depending on $\\Phi$.\n', 'Characterizations of Urysohn universal ultrametric spaces In this paper, using the existence of infinite equidistant subsets of closed\nballs, we characterize the injectivity of ultrametric spaces for finite\nultrametric spaces, which also gives a characterization of the Urysohn\nuniversal ultrametric spaces. As an application, we find that the operations of\nthe Cartesian product and the hyperspaces preserve the structures of the\nUrysohn universal ultrametric spaces. Namely, let $(X, d)$ be the Urysohn\nuniversal ultrametric space. Then we show that $(X\\times X, d\\times d)$ is\nisometric to $(X, d)$. Next we prove that the hyperspace consisting of all\nnon-empty compact subsets of $(X, d)$ and symmetric products of $(X, d)$ are\nisometric to $(X, d)$. We also establish that every complete ultrametric space\ninjective for finite ultrametric space contains a subspace isometric to $(X,\nd)$.\n']","[('ultrametric spaces', 0.8508307933807373), ('ultrametric space', 0.7994542717933655), ('pseudometric spaces', 0.6059825420379639), ('semimetric spaces', 0.6031386852264404), ('ultrametrics', 0.5941691994667053), ('ultrametric', 0.5572716593742371), ('universal spaces', 0.5096129775047302), ('metrizable space', 0.5065327286720276), ('arbitrary metric space', 0.4727352261543274), ('proper metric spaces', 0.45323482155799866)]" 493,493,62,493_image registration_diffeomorphic image_smooth interpolation_deformation metric,"['image registration', 'diffeomorphic image', 'smooth interpolation', 'deformation metric', 'large deformation', 'diffeomorphic', 'krylov solver', 'registration', 'medical imaging', 'shape matching']","['Fast GPU 3D Diffeomorphic Image Registration 3D image registration is one of the most fundamental and computationally\nexpensive operations in medical image analysis. Here, we present a\nmixed-precision, Gauss--Newton--Krylov solver for diffeomorphic registration of\ntwo images. Our work extends the publicly available CLAIRE library to GPU\narchitectures. Despite the importance of image registration, only a few\nimplementations of large deformation diffeomorphic registration packages\nsupport GPUs. Our contributions are new algorithms to significantly reduce the\nrun time of the two main computational kernels in CLAIRE: calculation of\nderivatives and scattered-data interpolation. We deploy (i) highly-optimized,\nmixed-precision GPU-kernels for the evaluation of scattered-data interpolation,\n(ii) replace Fast-Fourier-Transform (FFT)-based first-order derivatives with\noptimized 8th-order finite differences, and (iii) compare with state-of-the-art\nCPU and GPU implementations. As a highlight, we demonstrate that we can\nregister $256^3$ clinical images in less than 6 seconds on a single NVIDIA\nTesla V100. This amounts to over 20$\\times$ speed-up over the current version\nof CLAIRE and over 30$\\times$ speed-up over existing GPU implementations.\n', 'CLAIRE: Scalable GPU-Accelerated Algorithms for Diffeomorphic Image\n Registration in 3D We present our work on scalable, GPU-accelerated algorithms for diffeomorphic\nimage registration. The associated software package is termed CLAIRE. Image\nregistration is a non-linear inverse problem. It is about computing a spatial\nmapping from one image of the same object or scene to another. In diffeomorphic\nimage registration, the set of admissible spatial transformations is restricted\nto maps that are smooth, one-to-one, and have a smooth inverse. We formulate\ndiffeomorphic image registration as a variational problem governed by transport\nequations. We use an inexact, globalized (Gauss--)Newton--Krylov method for\nnumerical optimization. We consider semi-Lagrangian methods for numerical time\nintegration. Our solver features mixed-precision, hardware-accelerated\ncomputational kernels for optimal computational throughput. We use the\nmessage-passing interface for distributed-memory parallelism and deploy our\ncode on modern high-performance computing architectures. Our solver allows us\nto solve clinically relevant problems in under four seconds on a single GPU. It\ncan also be applied to large-scale 3D imaging applications with data that is\ndiscretized on meshes with billions of voxels. We demonstrate that our\nnumerical framework yields high-fidelity results in only a few seconds, even if\nwe search for an optimal regularization parameter.\n', 'Diffeomorphic Image Registration with An Optimal Control Relaxation and\n Its Implementation Image registration has played an important role in image processing problems,\nespecially in medical imaging applications. It is well known that when the\ndeformation is large, many variational models cannot ensure diffeomorphism. In\nthis paper, we propose a new registration model based on an optimal control\nrelaxation constraint for large deformation images, which can theoretically\nguarantee that the registration mapping is diffeomorphic. We present an\nanalysis of optimal control relaxation for indirectly seeking the diffeomorphic\ntransformation of Jacobian determinant equation and its registration\napplications, including the construction of diffeomorphic transformation as a\nspecial space. We also provide an existence result for the control increment\noptimization problem in the proposed diffeomorphic image registration model\nwith an optimal control relaxation. Furthermore, a fast iterative scheme based\non the augmented Lagrangian multipliers method (ALMM) is analyzed to solve the\ncontrol increment optimization problem, and a convergence analysis is followed.\nFinally, a grid unfolding indicator is given, and a robust solving algorithm\nfor using the deformation correction and backtrack strategy is proposed to\nguarantee that the solution is diffeomorphic. Numerical experiments show that\nthe registration model we proposed can not only get a diffeomorphic mapping\nwhen the deformation is large, but also achieves the state-of-the-art\nperformance in quantitative evaluations in comparing with other classical\nmodels.\n']","[('image registration', 0.5349790453910828), ('diffeomorphic image', 0.42347922921180725), ('smooth interpolation', 0.4148949086666107), ('deformation metric', 0.3672361671924591), ('large deformation', 0.3615803122520447), ('diffeomorphic', 0.3574073612689972), ('krylov solver', 0.353678822517395), ('registration', 0.35043004155158997), ('medical imaging', 0.34712281823158264), ('shape matching', 0.34604841470718384)]" 494,494,62,494_dynamics open quantum_open quantum systems_quantum stochastic_quantum stochastic differential,"['dynamics open quantum', 'open quantum systems', 'quantum stochastic', 'quantum stochastic differential', 'open quantum system', 'open quantum', 'quantum systems', 'quantum master', 'quantum evolution', 'stochastic schr odinger']","['On a tilted Liouville-master equation of open quantum systems A tilted Liouville-master equation in Hilbert space is presented for\nMarkovian open quantum systems. We demonstrate that it is the unraveling of the\ntilted quantum master equation. The latter is widely used in the analysis and\ncalculations of stochastic thermodynamic quantities in quantum stochastic\nthermodynamics.\n', 'Unified analysis of non-Markovian open quantum systems in Gaussian\n environment using superoperator formalism We present perturbative error bounds for the non-Markovian dynamics of\nobservables in open quantum systems interacting with Gaussian environments,\ngoverned by general Liouville dynamics. This extends the work of [Mascherpa et\nal., Phys. Rev. Lett. 118, 100401, 2017], which demonstrated qualitatively\ntighter bounds over the standard Gr\\""onwall-type analysis, where the joint\nsystem-environment evolution is unitary. Our results apply to systems with both\nbosonic and fermionic environments. Our approach utilizes a superoperator\nformalism, which avoids the need for formal coherent state path integral\ncalculations, or the dilation of Lindblad dynamics into an equivalent unitary\nframework with infinitely many degrees of freedom. This enables a unified\ntreatment of a wide range of open quantum systems. These findings provide a\nsolid theoretical basis for various recently developed pseudomode methods in\nsimulating open quantum system dynamics.\n', ""Classical correspondence beyond the Ehrenfest time for open quantum systems with general Lindbladians Quantum and classical systems evolving under the same formal Hamiltonian $H$ may dramatically differ after the Ehrenfest timescale $t_E \\sim \\log(\\hbar^{-1})$, even as $\\hbar \\to 0$. Coupling the system to a Markovian environment results in a Lindblad equation for the quantum evolution. Its classical counterpart is given by the Fokker-Planck equation on phase space, which describes Hamiltonian flow with friction and diffusive noise. The quantum and classical evolutions may be compared via the Wigner-Weyl representation. Due to decoherence, they are conjectured to match closely for times far beyond the Ehrenfest timescale as $\\hbar \\to 0$. We prove a version of this correspondence, bounding the error between the quantum and classical evolutions for any sufficiently regular Hamiltonian $H(x,p)$ and Lindblad functions $L_k(x,p)$. The error is small when the strength of the diffusion $D$ associated to the Lindblad functions satisfies $D \\gg \\hbar^{4/3}$, which allows vanishing noise in the classical limit. Our method uses a time-dependent semiclassical mixture of variably squeezed Gaussian states. The states evolve according to a local harmonic approximation to the Lindblad dynamics. Both the exact quantum trajectory and its classical counterpart can be expressed as perturbations of this semiclassical mixture, with the errors bounded using Duhamel's principle. We present heuristic arguments suggesting the $4/3$ exponent is optimal and defines a boundary in the sense that asymptotically weaker diffusion permits a breakdown of quantum-classical correspondence at the Ehrenfest timescale. In a shorter companion paper, we treat the special case of Hamiltonians that decompose into kinetic and potential energy with linear Lindblad operators, with explicit bounds that can be applied directly to physical systems.""]","[('dynamics open quantum', 0.6719533801078796), ('open quantum systems', 0.6622845530509949), ('quantum stochastic', 0.6370878219604492), ('quantum stochastic differential', 0.6304714679718018), ('open quantum system', 0.618060290813446), ('open quantum', 0.5829629898071289), ('quantum systems', 0.5778173804283142), ('quantum master', 0.5441465377807617), ('quantum evolution', 0.5375780463218689), ('stochastic schr odinger', 0.5318816900253296)]" 495,495,62,495_generalized hypergeometric functions_confluent hypergeometric functions_hypergeometric functions_gauss hypergeometric functions,"['generalized hypergeometric functions', 'confluent hypergeometric functions', 'hypergeometric functions', 'gauss hypergeometric functions', 'hypergeometric identities', 'generalized hypergeometric', 'hypergeometric series', 'identities hypergeometric', 'confluent hypergeometric', 'gaussian hypergeometric']","[""Rodrigues formula and linear independence for values of hypergeometric\n functions with parameters vary In this article, we prove a generalized Rodrigues formula for a wide class of\nholonomic Laurent series, which yields a new linear independence criterion\nconcerning their values at algebraic points. This generalization yields a new\nconstruction of Pad\\'e approximations including those for Gauss hypergeometric\nfunctions. In particular, we obtain a linear independence criterion over a\nnumber field concerning values of Gauss hypergeometric functions, allowing the\nparameters of Gauss hypergeometric functions to vary.\n"", 'Unveiling new perspectives of hypergeometric functions using umbral\n techniques The umbral restyling of hypergeometric functions is shown to be a useful and\nefficient approach in simplifying the associated computational technicalities.\nIn this article, the authors provide a general introduction to the umbral\nversion of Gauss hypergeometric functions and extend the formalism to certain\ngeneralized forms of these functions. It is shown that suggested approach is\nparticularly efficient for evaluating integrals involving hypergeometric\nfunctions and their combination with other special functions.\n', 'On digamma series convertible into hypergeometric series Series containing the digamma function arise when calculating the parametric\nderivatives of the hypergeometric functions and play a role in evaluation of\nFeynman diagrams. As these series are typically non-hypergeometric, a few\ninstances when they are summable in terms of hypergeometric functions are of\nimportance. In this paper, we convert multi-term identities for the generalized\nhypergeometric functions evaluated at unity into identities connecting them to\nthe digamma series via the appropriate limiting process. The resulting formulas\ncan be viewed as hypergeometric expressions for the $1$-norm of the gradient of\nthe generalized hypergeometric function with respect to all its parameters and\nseem to have no direct analogues in the literature.\n']","[('generalized hypergeometric functions', 0.8559032678604126), ('confluent hypergeometric functions', 0.8187122344970703), ('hypergeometric functions', 0.8105894327163696), ('gauss hypergeometric functions', 0.8042767643928528), ('hypergeometric identities', 0.7738474607467651), ('generalized hypergeometric', 0.7711834907531738), ('hypergeometric series', 0.7549129724502563), ('identities hypergeometric', 0.7479950189590454), ('confluent hypergeometric', 0.7308114171028137), ('gaussian hypergeometric', 0.7257722616195679)]" 496,496,62,496_manifold learning_manifold hypothesis_dimensional manifold_manifolds,"['manifold learning', 'manifold hypothesis', 'dimensional manifold', 'manifolds', 'manifolds euclidean', 'manifold', 'riemannian manifolds', 'manifolds particular', 'underlying manifold', 'riemannian manifold']","['Distance Measure Based on an Embedding of the Manifold of K-Component\n Gaussian Mixture Models into the Manifold of Symmetric Positive Definite\n Matrices In this paper, a distance between the Gaussian Mixture Models(GMMs) is\nobtained based on an embedding of the K-component Gaussian Mixture Model into\nthe manifold of the symmetric positive definite matrices. Proof of embedding of\nK-component GMMs into the manifold of symmetric positive definite matrices is\ngiven and shown that it is a submanifold. Then, proved that the manifold of\nGMMs with the pullback of induced metric is isometric to the submanifold with\nthe induced metric. Through this embedding we obtain a general lower bound for\nthe Fisher-Rao metric. This lower bound is a distance measure on the manifold\nof GMMs and we employ it for the similarity measure of GMMs. The effectiveness\nof this framework is demonstrated through an experiment on standard machine\nlearning benchmarks, achieving accuracy of 98%, 92%, and 93.33% on the UIUC,\nKTH-TIPS, and UMD texture recognition datasets respectively.\n', 'Estimation of Local Geometric Structure on Manifolds from Noisy Data A common observation in data-driven applications is that high-dimensional\ndata have a low intrinsic dimension, at least locally. In this work, we\nconsider the problem of point estimation for manifold-valued data. Namely,\ngiven a finite set of noisy samples of $\\mathcal{M}$, a $d$ dimensional\nsubmanifold of $\\mathbb{R}^D$, and a point $r$ near the manifold we aim to\nproject $r$ onto the manifold. Assuming that the data was sampled uniformly\nfrom a tubular neighborhood of a $k$-times smooth boundaryless and compact\nmanifold, we present an algorithm that takes $r$ from this neighborhood and\noutputs $\\hat p_n\\in \\mathbb{R}^D$, and $\\widehat{T_{\\hat p_n}\\mathcal{M}}$ an\nelement in the Grassmannian $Gr(d, D)$. We prove that as the number of samples\n$n\\to\\infty$, the point $\\hat p_n$ converges to $\\mathbf{p}\\in \\mathcal{M}$,\nthe projection of $r$ onto $\\mathcal{M}$, and $\\widehat{T_{\\hat\np_n}\\mathcal{M}}$ converges to $T_{\\mathbf{p}}\\mathcal{M}$ (the tangent space\nat that point) with high probability. Furthermore, we show that $\\hat p_n$\napproaches the manifold with an asymptotic rate of $n^{-\\frac{k}{2k + d}}$, and\nthat $\\hat p_n, \\widehat{T_{\\hat p_n}\\mathcal{M}}$ approach $\\mathbf{p}$ and\n$T_{\\mathbf{p}}\\mathcal{M}$ correspondingly with asymptotic rates of\n$n^{-\\frac{k-1}{2k + d}}$.\n', 'Non-Parametric Estimation of Manifolds from Noisy Data A common observation in data-driven applications is that high dimensional\ndata has a low intrinsic dimension, at least locally. In this work, we consider\nthe problem of estimating a $d$ dimensional sub-manifold of $\\mathbb{R}^D$ from\na finite set of noisy samples. Assuming that the data was sampled uniformly\nfrom a tubular neighborhood of $\\mathcal{M}\\in \\mathcal{C}^k$, a compact\nmanifold without boundary, we present an algorithm that takes a point $r$ from\nthe tubular neighborhood and outputs $\\hat p_n\\in \\mathbb{R}^D$, and\n$\\widehat{T_{\\hat p_n}\\mathcal{M}}$ an element in the Grassmanian $Gr(d, D)$.\nWe prove that as the number of samples $n\\to\\infty$ the point $\\hat p_n$\nconverges to $p\\in \\mathcal{M}$ and $\\widehat{T_{\\hat p_n}\\mathcal{M}}$\nconverges to $T_p\\mathcal{M}$ (the tangent space at that point) with high\nprobability. Furthermore, we show that the estimation yields asymptotic rates\nof convergence of $n^{-\\frac{k}{2k + d}}$ for the point estimation and\n$n^{-\\frac{k-1}{2k + d}}$ for the estimation of the tangent space. These rates\nare known to be optimal for the case of function estimation.\n']","[('manifold learning', 0.699824869632721), ('manifold hypothesis', 0.5947431921958923), ('dimensional manifold', 0.5744516849517822), ('manifolds', 0.5519105195999146), ('manifolds euclidean', 0.5517706274986267), ('manifold', 0.5461164116859436), ('riemannian manifolds', 0.5346787571907043), ('manifolds particular', 0.5331147313117981), ('underlying manifold', 0.5310053825378418), ('riemannian manifold', 0.521573543548584)]" 497,497,62,497_folding_foldings_obtained folding_origami,"['folding', 'foldings', 'obtained folding', 'origami', 'folds', 'paperfolding', 'fold', 'foldable', 'bending', 'folded']","['Flat origami is Turing Complete ""Flat origami"" refers to the folding of flat, zero-curvature paper such that\nthe finished object lies in a plane. Mathematically, flat origami consists of a\ncontinuous, piecewise isometric map $f:P\\subseteq\\mathbb{R}^2\\to\\mathbb{R}^2$\nalong with a layer ordering $\\lambda_f:P\\times P\\to \\{-1,1\\}$ that tracks which\npoints of $P$ are above/below others when folded. The set of crease lines that\na flat origami makes (i.e., the set on which the mapping $f$ is\nnon-differentiable) is called its ""crease pattern."" Flat origami mappings and\ntheir layer orderings can possess surprisingly intricate structure. For\ninstance, determining whether or not a given straight-line planar graph drawn\non $P$ is the crease pattern for some flat origami has been shown to be an\nNP-complete problem, and this result from 1996 led to numerous explorations in\ncomputational aspects of flat origami. In this paper we prove that flat\norigami, when viewed as a computational device, is Turing complete, or more\nspecifically P-complete. We do this by showing that flat origami crease\npatterns with ""optional creases"" (creases that might be folded or remain\nunfolded depending on constraints imposed by other creases or inputs) can be\nconstructed to simulate Rule 110, a one-dimensional cellular automaton that was\nproven to be Turing complete by Matthew Cook in 2004.\n', 'The Folding Mathematics Origami is the art of paper folding, and it borrows its name from two\nJapanese words \\emph{ori} and \\emph{kami}. In Japanese, {ori} means folding,\nand the paper is called {kami}. While origami is just a hobby to most, there is\na lot more to it. If you fold a square sheet of paper into any of the\ntraditional origami model (for example the flapping bird) and unfold it, you\ncan see crease patterns. These crease patterns tell us that there is a lot of\ngeometry hidden behind the folds.\n In this article, we investigate the symbiotic relationship between\nmathematics and origami. The first part of this article explores the utility of\norigami in education. We will see how origami could become an effective way of\nteaching methods of geometry, mainly because of its experiential nature.\nComplex origami patterns cannot be created out of thin air. They usually\ninvolve understanding deep mathematical theories and the ability to apply them\nto paper folding. In the second part of the article, we attempt to provide a\nglimpse of this beautiful connection between origami and mathematics.\n', 'Rigid folding equations of degree-6 origami vertices Rigid origami, with applications ranging from nano-robots to unfolding solar\nsails in space, describes when a material is folded along straight crease line\nsegments while keeping the regions between the creases planar. Prior work has\nfound explicit equations for the folding angles of a flat-foldable degree-4\norigami vertex and some cases of degree-6 vertices. We extend this work to\ngeneralized symmetries of the degree-6 vertex where all sector angles equal\n$60^\\circ$. We enumerate the different viable rigid folding modes of these\ndegree-6 crease patterns and then use $2^{nd}$-order Taylor expansions and\nprior rigid folding techniques to find algebraic folding angle relationships\nbetween the creases. This allows us to explicitly compute the configuration\nspace of these degree-6 vertices, and in the process we uncover new\nexplanations for the effectiveness of Weierstrass substitutions in modeling\nrigid origami. These results expand the toolbox of rigid origami mechanisms\nthat engineers and materials scientists may use in origami-inspired designs.\n']","[('folding', 0.6424164772033691), ('foldings', 0.6208420395851135), ('obtained folding', 0.6089639067649841), ('origami', 0.6063122749328613), ('folds', 0.5653497576713562), ('paperfolding', 0.5633963942527771), ('fold', 0.5131834149360657), ('foldable', 0.49920976161956787), ('bending', 0.4796355366706848), ('folded', 0.4650580585002899)]" 498,498,62,498_collision avoidance constraints_collision avoidance_obstacle avoidance_trajectory planning,"['collision avoidance constraints', 'collision avoidance', 'obstacle avoidance', 'trajectory planning', 'motion planning', 'avoidance constraints', 'planning control', 'collision free', 'control barrier functions', 'obstacle']","['A Differentiable Signed Distance Representation for Continuous Collision\n Avoidance in Optimization-Based Motion Planning This paper proposes a new set of conditions for exactly representing\ncollision avoidance constraints within optimization-based motion planning\nalgorithms. The conditions are continuously differentiable and therefore\nsuitable for use with standard nonlinear optimization solvers. The method\nrepresents convex shapes using a support function representation and is\ntherefore quite general. For collision avoidance involving polyhedral or\nellipsoidal shapes, the proposed method introduces fewer variables and\nconstraints than existing approaches. Additionally the proposed method can be\nused to rigorously ensure continuous collision avoidance as the vehicle\ntransitions between the discrete poses determined by the motion planning\nalgorithm. Numerical examples demonstrate how this can be used to prevent\nproblems of corner cutting and passing through obstacles which can occur when\ncollision avoidance is only enforced at discrete time steps.\n', 'Safety-Critical Planning and Control for Dynamic Obstacle Avoidance\n Using Control Barrier Functions Dynamic obstacle avoidance is a challenging topic for optimal control and\noptimization-based trajectory planning problems. Many existing works use\nControl Barrier Functions (CBFs) to enforce safety constraints for control\nsystems. CBFs are typically formulated based on the distance to obstacles, or\nintegrated with path planning algorithms as a safety enhancement tool. However,\nthese approaches usually require knowledge of the obstacle boundary equations\nor have very slow computational efficiency. In this paper, we propose a\nframework based on model predictive control (MPC) with discrete-time high-order\nCBFs (DHOCBFs) to generate a collision-free trajectory. The DHOCBFs are first\nobtained from convex polytopes generated through grid mapping, without the need\nto know the boundary equations of obstacles. Additionally, a path planning\nalgorithm is incorporated into this framework to ensure the global optimality\nof the generated trajectory. We demonstrate through numerical examples that our\nframework allows a unicycle robot to safely and efficiently navigate tight,\ndynamically changing environments with both convex and nonconvex obstacles. By\ncomparing our method to established CBF-based benchmarks, we demonstrate\nsuperior computing efficiency, length optimality, and feasibility in trajectory\ngeneration and obstacle avoidance.\n', 'Control Barrier Functions in UGVs for Kinematic Obstacle Avoidance: A\n Collision Cone Approach In this paper, we propose a new class of Control Barrier Functions (CBFs) for\nUnmanned Ground Vehicles (UGVs) that help avoid collisions with kinematic\n(non-zero velocity) obstacles. While the current forms of CBFs have been\nsuccessful in guaranteeing safety/collision avoidance with static obstacles,\nextensions for the dynamic case have seen limited success. Moreover, with the\nUGV models like the unicycle or the bicycle, applications of existing CBFs have\nbeen conservative in terms of control, i.e., steering/thrust control has not\nbeen possible under certain scenarios. Drawing inspiration from the classical\nuse of collision cones for obstacle avoidance in trajectory planning, we\nintroduce its novel CBF formulation with theoretical guarantees on safety for\nboth the unicycle and bicycle models. The main idea is to ensure that the\nvelocity of the obstacle w.r.t. the vehicle is always pointing away from the\nvehicle. Accordingly, we construct a constraint that ensures that the velocity\nvector always avoids a cone of vectors pointing at the vehicle. The efficacy of\nthis new control methodology is later verified by Pybullet simulations on\nTurtleBot3 and F1Tenth.\n']","[('collision avoidance constraints', 0.7147361636161804), ('collision avoidance', 0.6281982660293579), ('obstacle avoidance', 0.5917373299598694), ('trajectory planning', 0.5339030623435974), ('motion planning', 0.4889644980430603), ('avoidance constraints', 0.4674803614616394), ('planning control', 0.4570924937725067), ('collision free', 0.43197357654571533), ('control barrier functions', 0.41382378339767456), ('obstacle', 0.4092254936695099)]" 499,499,62,499_waveform inversion fwi_waveform inversion_full waveform inversion_inversion fwi,"['waveform inversion fwi', 'waveform inversion', 'full waveform inversion', 'inversion fwi', 'seismic inversion', 'full waveform', 'nonlinear ill posed', 'inversion', 'waveform', 'alternating direction multipliers']","['Efficient extended-search space full-waveform inversion with unknown\n source signatures Full waveform inversion (FWI) requires an accurate estimation of source\nsignatures. Due to the coupling between the source signatures and the\nsubsurface model, small errors in the former can translate into large errors in\nthe latter. When direct methods are used to solve the forward problem,\nclassical frequency-domain FWI efficiently processes multiple sources for\nsource signature and wavefield estimations once a single Lower-Upper (LU)\ndecomposition of the wave-equation operator has been performed. However, this\nefficient FWI formulation is based on the exact solution of the wave equation\nand hence is highly sensitive to the inaccuracy of the velocity model due to\nthe cycle skipping pathology. Recent extended-space FWI variants tackle this\nsensitivity issue through a relaxation of the wave equation combined with data\nassimilation, allowing the wavefields to closely match the data from the first\ninversion iteration. Then, the subsurface parameters are updated by minimizing\nthe wave-equation violations. When the wavefields and the source signatures are\njointly estimated with this approach, the extended wave equation operator\nbecomes source dependent, hence making direct methods ineffective. In this\npaper, we propose a simple method to bypass this issue and estimate source\nsignatures efficiently during extended FWI. The proposed method replaces each\nsource with a blended source during each data-assimilated wavefield\nreconstruction to make the extended wave equation operator source independent.\nBesides computational efficiency, the additional degrees of freedom introduced\nby spatially distributing the sources allows for a better signature estimation\nat the physical location when the velocity model is rough. Numerical tests on\nthe Marmousi II and 2004 BP salt synthetic models confirm the efficiency and\nthe robustness of the proposed method.\n', 'An extended Gauss-Newton method for full waveform inversion Full waveform inversion (FWI) is a large-scale nonlinear ill-posed problem\nfor which computationally expensive Newton-type methods can become trapped in\nundesirable local minima, particularly when the initial model lacks a\nlow-wavenumber component and the recorded data lacks low-frequency content. A\nmodification to the Gauss-Newton (GN) method is proposed to address these\nissues. The standard GN system for multisource multireceiver FWI is\nreformulated into an equivalent matrix equation form, with the solution\nbecoming a diagonal matrix rather than a vector as in the standard system. The\nsearch direction is transformed from a vector to a matrix by relaxing the\ndiagonality constraint, effectively adding a degree of freedom to the\nsubsurface offset axis. The relaxed system can be explicitly solved with only\nthe inversion of two small matrices that deblur the data residual matrix along\nthe source and receiver dimensions, which simplifies the inversion of the\nHessian matrix. When used to solve the extended source FWI objective function,\nthe Extended GN (EGN) method integrates the benefits of both model and source\nextension. The EGN method effectively combines the computational effectiveness\nof the reduced FWI method with the robustness characteristics of extended\nformulations and offers a promising solution for addressing the challenges of\nFWI. It bridges the gap between these extended formulations and the reduced FWI\nmethod, enhancing inversion robustness while maintaining computational\nefficiency. The robustness and stability of the EGN algorithm for waveform\ninversion are demonstrated numerically.\n', '$\\omega$-FWI: Robust full-waveform inversion with Fourier-based metric Full-waveform inversion is a cutting-edge methodology for recovering\nhigh-resolution subsurface models. However, one of the main conventional\nfull-waveform optimization problems challenges is cycle-skipping, usually\nleading us to an inaccurate local minimum model. A highly investigated track to\nalleviate this challenge involves designing a more global measure of misfit\nbetween the observed and modelled data beyond the sample-to-sample comparison.\nHowever, most of these approaches admit relatively smooth inversion results.\nHere, we introduce a novel misfit function based on the Fourier-based metric.\nThis metric has been successfully applied in molecular physics for solving the\nBoltzmann equation, and we adapt it to full-waveform inversion. This misfit\nfunction exploits the power spectrum information between the modelled and\nobserved data to provide low-wavenumber velocity model updates early, and more\nhigh resolution updates as we approach the solution. Thus, it also can be\nreformulated as a weighted $\\ell_{2}$-norm in a quadratic case, which can be\nseen as a simple extension for conventional full-waveform inversion. Thus,\ndespite its robustness to cycle skipping, it is capable of delivering\nhigh-resolution models synonymous to conventional FWI. Considering its\nfrequency domain utilization, we refer to this inversion method as\n$\\omega$-FWI. Through the synthetic Marmousi model example, this method\nsuccessfully recovers an accurate velocity model, starting from a linearly\nincreasing model even for the case of noisy observed data and the lack of low\nfrequencies below 3 Hz and 5Hz, in which the conventional $\\ell_{2}$-norm\nfull-waveform inversion suffers from cycle skipping.\n']","[('waveform inversion fwi', 0.6693663001060486), ('waveform inversion', 0.6633883118629456), ('full waveform inversion', 0.663212776184082), ('inversion fwi', 0.49878743290901184), ('seismic inversion', 0.4664880931377411), ('full waveform', 0.44185447692871094), ('nonlinear ill posed', 0.3871942162513733), ('inversion', 0.38529232144355774), ('waveform', 0.383637398481369), ('alternating direction multipliers', 0.3421293795108795)]" 500,500,62,500_khovanov homology_homology khovanov_homology knot_homology link,"['khovanov homology', 'homology khovanov', 'homology knot', 'homology link', 'link homology', 'homology coefficients', 'knot floer homology', 'homology', 'link floer homology', 'homology also']","['Khovanov homology detects $T(2,6)$ We show if $L$ is any link in $S^3$ whose Khovanov homology is isomorphic to\nthe Khovanov homology of $T(2,6)$ then $L$ is isotopic to $T(2,6)$. We show\nthis for unreduced Khovanov homology with $\\mathbb{Z}$ coefficients.\n', 'Symplectic annular Khovanov homology and fixed point localizations We introduce a new version of symplectic annular Khovanov homology and\nestablish spectral sequences from (i) the symplectic annular Khovanov homology\nof a knot to the link Floer homology of the lift of the annular axis in the\ndouble branched cover; (ii) the symplectic Khovanov homology of a two-periodic\nknot to the symplectic annular Khovanov homology of its quotient; and (iii) the\nsymplectic Khovanov homology of a strongly invertible knot to the cone of the\naxis-moving map between the symplectic annular Khovanov homology of the two\nresolutions of its quotient.\n', 'An Introduction to Khovanov Homology This paper is an introduction to Khovanov homology, starting with the\nKauffman bracket state summation, emphasizing the Bar-Natan Canopoloy and\ntangle cobordism approach. The paper discusses a simplicial approach to\nKhovanov homology and a quantum model for it so that the graded Euler\ncharacteristic that produces the Jones polynomial from Khovanov homology\nbecomes the trace of a unitary transformation on a Hilbert space associated\nwith the Khovanov Homology.\n']","[('khovanov homology', 0.8069881200790405), ('homology khovanov', 0.7883487343788147), ('homology knot', 0.661383330821991), ('homology link', 0.6424472332000732), ('link homology', 0.6361256837844849), ('homology coefficients', 0.5747525095939636), ('knot floer homology', 0.5669403076171875), ('homology', 0.5521819591522217), ('link floer homology', 0.5354429483413696), ('homology also', 0.5346258282661438)]" 501,501,61,501_dual quaternions_dual quaternion_quaternion matrices_quaternion hermitian,"['dual quaternions', 'dual quaternion', 'quaternion matrices', 'quaternion hermitian', 'quaternion valued', 'quaternions', 'quaternionic', 'quaternion', 'matrices dual', 'hermitian matrices']","['Minimax principle for right eigenvalues of dual quaternion matrices and\n their generalized inverses Dual quaternions can represent rigid body motion in 3D spaces, and have found\nwide applications in robotics, 3D motion modelling and control, and computer\ngraphics. In this paper, we introduce three different right linear independency\nfor a set of dual quaternion vectors, and study some related basic properties\nfor the set of dual quaternion vectors and dual quaternion matrices. We present\na minimax principle for right eigenvalues of dual quaternion Hermitian\nmatrices. Based upon a newly established Cauchy-Schwarz inequality for dual\nquaternion vectors and singular value decomposition of dual quaternion\nmatrices, we propose an important inequality for singular values of dual\nquaternion matrices. We finally introduce the concept of generalized inverse of\ndual quaternion matrices, and present the necessary and sufficient conditions\nfor a dual quaternion matrix to be one of four types of generalized inverses of\nanother dual quaternion matrix.\n', 'Eigenvalues and Singular Values of Dual Quaternion Matrices The poses of $m$ robotics in $n$ time points may be represented by an $m\n\\times n$ dual quaternion matrix. In this paper, we study the spectral theory\nof dual quaternion matrices. We introduce right and left eigenvalues for square\ndual quaternion matrices. If a right eigenvalue is a dual number, then it is\nalso a left eigenvalue. In this case, this dual number is called an eigenvalue\nof that dual quaternion matrix. We show that the right eigenvalues of a dual\nquaternion Hermitian matrix are dual numbers. Thus, they are eigenvalues. An $n\n\\times n$ dual quaternion Hermitian matrix is shown to have exactly $n$\neigenvalues. It is positive semidefinite, or positive definite, if and only if\nall of its eigenvalues are nonnegative, or positive and appreciable, dual\nnumbers, respectively. We present a unitary decomposition of a dual quaternion\nHermitian matrix, and the singular value decomposition for a general dual\nquaternion matrix. The singular values of a dual quaternion matrix are\nnonnegative dual numbers.\n', 'Standard Dual Quaternion Optimization and Its Applications in Hand-Eye\n Calibration and SLAM Several common dual quaternion functions, such as the power function, the\nmagnitude function, the $2$-norm function and the $k$th largest eigenvalue of a\ndual quaternion Hermitian matrix, are standard dual quaternion functions, i.e.,\nthe standard parts of their function values depend upon only the standard parts\nof their dual quaternion variables. Furthermore, the sum, product, minimum,\nmaximum and composite functions of two standard dual functions, the logarithm\nand the exponential of standard unit dual quaternion functions, are still\nstandard dual quaternion functions. On the other hand, the dual quaternion\noptimization problem, where objective and constraint function values are dual\nnumbers but variables are dual quaternions, naturally arises from applications.\nWe show that to solve an equality constrained dual quaternion optimization\nproblem, we only need to solve two quaternion optimization problems. If the\ninvolved dual quaternion functions are all standard, the optimization problem\nis called a standard dual quaternion optimization problem, and some better\nresults hold. Then, we show that the dual quaternion optimization problems\narising from the hand-eye calibration problem and the simultaneous localization\nand mapping (SLAM) problem are equality constrained standard dual quaternion\noptimization problems.\n']","[('dual quaternions', 0.7368823289871216), ('dual quaternion', 0.7323687672615051), ('quaternion matrices', 0.690557599067688), ('quaternion hermitian', 0.6495280861854553), ('quaternion valued', 0.6282325387001038), ('quaternions', 0.5846021175384521), ('quaternionic', 0.5707897543907166), ('quaternion', 0.5636573433876038), ('matrices dual', 0.537486732006073), ('hermitian matrices', 0.5346131324768066)]" 502,502,61,502_valuation rings_transcendental extensions_key polynomials_algebraic extensions,"['valuation rings', 'transcendental extensions', 'key polynomials', 'algebraic extensions', 'valuation ring', 'algebraic extension', 'extensions valued', 'algebraic closure', 'valuation theoretic', 'key polynomial']","['Minimal limit key polynomials In this paper, we extend the theory of minimal limit key polynomials of\nvaluations on the polynomial ring $\\kx$. We use the theory of cuts on ordered\nabelian groups to show that the previous results on bounded sets of key\npolynomials of rank-one valuations, extend to vertically bounded sets of key\npolynomials of valuations of an arbitrary rank. We discuss as well properties\nof minimal limit key polynomials in the vertically unbounded case.\n', ""Invariants of limit key polynomials Let $\\nu$ be a valuation of arbitrary rank on the polynomial ring $K[x]$ with\ncoefficients in a field $K$. We prove comparison theorems between\nMacLane-Vaqui\\'e key polynomials for valuations $\\mu\\le\\nu$ and abstract key\npolynomials for $\\nu$.\n Also, some results on invariants attached to limit key polynomials are\nobtained. In particular, if $\\operatorname{char}(K)=0$ we show that all limit\nkey polynomials of unbounded continuous MacLane chains have numerical character\nequal to one.\n"", ""Key polynomials for simple extensions of valued fields Let $\\iota:K\\hookrightarrow L\\cong K(x)$ be a simple transcendental extension\nof valued fields, where $K$ is equipped with a valuation $\\nu$ of rank 1. That\nis, we assume given a rank 1 valuation $\\nu$ of $K$ and its extension $\\nu'$ to\n$L$. Let $(R_\\nu,M_\\nu,k_\\nu)$ denote the valuation ring of $\\nu$. The purpose\nof this paper is to present a refined version of MacLane's theory of key\npolynomials, similar to those considered by M. Vaqui\\'e, and reminiscent of\nrelated objects studied by Abhyankar and Moh (approximate roots) and T.C. Kuo.\n Namely, we associate to $\\iota$ a countable well ordered set $$\n\\mathbf{Q}=\\{Q_i\\}_{i\\in\\Lambda}\\subset K[x]; $$ the $Q_i$ are called {\\bf key\npolynomials}. Key polynomials $Q_i$ which have no immediate predecessor are\ncalled {\\bf limit key polynomials}. Let $\\beta_i=\\nu'(Q_i)$.\n We give an explicit description of the limit key polynomials (which may be\nviewed as a generalization of the Artin--Schreier polynomials). We also give an\nupper bound on the order type of the set of key polynomials. Namely, we show\nthat if $\\operatorname{char}\\ k_\\nu=0$ then the set of key polynomials has\norder type at most $\\omega$, while in the case $\\operatorname{char}\\ k_\\nu=p>0$\nthis order type is bounded above by $\\omega\\times\\omega$, where $\\omega$ stands\nfor the first infinite ordinal.\n""]","[('valuation rings', 0.5446714758872986), ('transcendental extensions', 0.5413507223129272), ('key polynomials', 0.5391252040863037), ('algebraic extensions', 0.5232682824134827), ('valuation ring', 0.5168200731277466), ('algebraic extension', 0.5034975409507751), ('extensions valued', 0.4968920648097992), ('algebraic closure', 0.4863630533218384), ('valuation theoretic', 0.4825505316257477), ('key polynomial', 0.4605458974838257)]" 503,503,61,503_zero forcing_zero forcing number_graphs zero_graph zero,"['zero forcing', 'zero forcing number', 'graphs zero', 'graph zero', 'graph families', 'forcing sets', 'sets graphs', 'graph size', 'graphs', 'graphs including']","['Characterization of Graphs With Failed Skew Zero Forcing Number of 1 Given a graph $G$, the zero forcing number of $G$, $Z(G)$, is the smallest\ncardinality of any set $S$ of vertices on which repeated applications of the\nforcing rule results in all vertices being in $S$. The forcing rule is: if a\nvertex $v$ is in $S$, and exactly one neighbor $u$ of $v$ is not in $S$, then\n$u$ is added to $S$ in the next iteration. Hence the failed zero forcing number\nof a graph was defined to be the size of the largest set of vertices which\nfails to force all vertices in the graph. A similar property called skew zero\nforcing was defined so that if there is exactly one neighbor $u$ of $v$ is not\nin $S$, then $u$ is added to $S$ in the next iteration. The difference is that\nvertices that are not in $S$ can force other vertices. This leads to the failed\nskew zero forcing number of a graph, which is denoted by $F^{-}(G)$. In this\npaper we provide a complete characterization of all graphs with $F^{-}(G)=1$.\nFetcie, Jacob, and Saavedra showed that the only graphs with a failed zero\nforcing number of $1$ are either: the union of two isolated vertices; $P_3$;\n$K_3$; or $K_4$. In this paper we provide a surprising result: changing the\nforcing rule to a skew-forcing rule results in an infinite number of graphs\nwith $F^{-}(G)=1$.\n', 'The zero forcing span of a graph In zero forcing, the focus is typically on finding the minimum cardinality of\nany zero forcing set in the graph; however, the number of cardinalities between\n$0$ and the number of vertices in the graph for which there are both zero\nforcing sets and sets that fail to be zero forcing sets is not well known. In\nthis paper, we introduce the zero forcing span of a graph, which is the number\nof distinct cardinalities for which there are sets that are zero forcing sets\nand sets that are not. We introduce the span within the context of standard\nzero forcing and skew zero forcing as well as for standard zero forcing on\ndirected graphs. We characterize graphs with high span and low span of each\ntype, and also investigate graphs with special zero forcing polynomials.\n', 'Minimum rank and failed zero forcing number of graphs Let $G$ be a simple, finite, and undirected graph with vertices each given an\ninitial coloring of either blue or white. Zero forcing on graph $G$ is an\niterative process of forcing its white vertices to become blue after a finite\napplication of a specified color-change rule. We say that an initial set $S$ of\nblue vertices of $G$ is a zero forcing set for $G$ under the specified\ncolor-change rule if a finite number of iterations of zero forcing results to\nan updated coloring where all vertices of $G$ are blue. Otherwise, we say that\n$S$ is a failed zero forcing set for $G$ under the specified color-change rule.\nIt is not difficult to see that any subset of a failed zero forcing set is also\nfailed. Hence, our interest lies on the maximum possible cardinality of a\nfailed zero forcing set, which we refer to as the failed zero forcing number of\n$G$. In this paper, we consider two color-change rules $-$ standard and\npositive semidefinite. We compute for the failed zero forcing numbers of\nseveral graph families. Furthermore, under each graph family, we characterize\nthe graphs $G$ for which the failed zero forcing number is equal to the minimum\nrank of $G$.\n']","[('zero forcing', 0.594649076461792), ('zero forcing number', 0.5865803360939026), ('graphs zero', 0.5784080624580383), ('graph zero', 0.5447729229927063), ('graph families', 0.5050793886184692), ('forcing sets', 0.4924146831035614), ('sets graphs', 0.4525030851364136), ('graph size', 0.4465179741382599), ('graphs', 0.4455445408821106), ('graphs including', 0.44362378120422363)]" 504,504,61,504_curve shortening flow_curvature flows_shortening flow_curve shortening,"['curve shortening flow', 'curvature flows', 'shortening flow', 'curve shortening', 'curvature flow', 'inverse curvature flow', 'flow curves', 'preserving curvature', 'convex curves', 'flow curve']","['Non-uniqueness of curve shortening flow We formulate a uniqueness conjecture for curve shortening flow of proper\ncurves on certain symmetric surfaces and give an example of a non-flat metric\non the plane with respect to which curve shortening flow is not unique. That\nis, with respect to a suitably chosen metric, we construct a non-static\nsolution to curve shortening flow starting from a properly embedded geodesic.\n', 'Curve shortening flows on surfaces that are not convex at infinity The behavior of the curve shortening flow has been extensively studied. Gage,\nHamilton, and Grayson proved that, under the curve shortening flow, an embedded\nclosed curve in the Euclidean plane becomes convex after a finite time and then\nshrinks to a point while remaining convex. Moreover, Grayson extended these\nresults to surfaces that are convex at infinity and proved results similar to\nthose for plane curves. In this paper, we study the curve shortening flow on\nsurfaces that are not convex at infinity. Specifically, we consider a warped\nproduct of a unit circle and an open interval with a strictly increasing\nwarping function. In this setting, we can define a graph property for curves\nwithin these warped products. It is known that this graph property is preserved\nalong the curve shortening flow. Similarly to the behavior of the curve\nshortening flow in the plane, we prove that the curve becomes a graph after a\nfinite time under the curve shortening flow.\n', 'Convex Ancient Solutions to Anisotropic Curve Shortening Flow We construct a translating solution to anisotropic curve shortening flow and\nshow that for a given anisotropic factor $g:S^1\\to\\mathbb{R}_+$, and a given\ndirection and speed, this translator is unique. We then construct an ancient\ncompact solution to anisotropic curve shortening flow, and show that this\nsolution, along with the appropriate translating solution, are the unique\nsolutions to anisotropic curve shortening flow that lie in a slab of a given\nwidth and no smaller.\n']","[('curve shortening flow', 0.751459002494812), ('curvature flows', 0.6374607086181641), ('shortening flow', 0.6162655353546143), ('curve shortening', 0.6145198345184326), ('curvature flow', 0.61402827501297), ('inverse curvature flow', 0.6016814708709717), ('flow curves', 0.5711679458618164), ('preserving curvature', 0.5621747374534607), ('convex curves', 0.5593223571777344), ('flow curve', 0.5488513112068176)]" 505,505,61,505_hamiltonicity graphs_hamilton cycles_contains hamilton cycle_hamilton cycle,"['hamiltonicity graphs', 'hamilton cycles', 'contains hamilton cycle', 'hamilton cycle', 'hamiltonian graph', 'hamiltonian cycles', 'random directed graphs', 'random graphs', 'binomial random graph', 'pseudorandom graphs']","['Hamilton Cycles in Random Graphs: a bibliography We provide an annotated bibliography for the study of Hamilton cycles in\nrandom graphs and hypergraphs.\n', 'Finding Hamilton cycles in random intersection graphs The construction of the random intersection graph model is based on a random\nfamily of sets. Such structures, which are derived from intersections of sets,\nappear in a natural manner in many applications. In this article we study the\nproblem of finding a Hamilton cycle in a random intersection graph. To this end\nwe analyse a classical algorithm for finding Hamilton cycles in random graphs\n(algorithm HAM) and study its efficiency on graphs from a family of random\nintersection graphs (denoted here by G(n,m,p)). We prove that the threshold\nfunction for the property of HAM constructing a Hamilton cycle in G(n,m,p) is\nthe same as the threshold function for the minimum degree at least two. Until\nnow, known algorithms for finding Hamilton cycles in G(n,m,p) were designed to\nwork in very small ranges of parameters and, unlike HAM, used the structure of\nthe family of random sets.\n', 'Covering Random Digraphs with Hamilton Cycles A covering of a digraph $D$ by Hamilton cycles is a collection of directed\nHamilton cycles (not necessarily edge-disjoint) that together cover all the\nedges of $D$. We prove that for $1/2 \\geq p\\geq \\frac{\\log^{20} n}{n}$, the\nrandom digraph $D_{n,p}$ typically admits an optimal Hamilton cycle covering.\nSpecifically, the edges of $D_{n,p}$ can be covered by a family of $t$ Hamilton\ncycles, where $t$ is the maximum of the the in-degree and out-degree of the\nvertices in $D_{n,p}$. Notably, $t$ is the best possible bound, and our\nassumption on $p$ is optimal up to a polylogarithmic factor.\n']","[('hamiltonicity graphs', 0.663780152797699), ('hamilton cycles', 0.6352989077568054), ('contains hamilton cycle', 0.6108763217926025), ('hamilton cycle', 0.6044806838035583), ('hamiltonian graph', 0.5914243459701538), ('hamiltonian cycles', 0.5839307904243469), ('random directed graphs', 0.5801255702972412), ('random graphs', 0.5689408183097839), ('binomial random graph', 0.5651730895042419), ('pseudorandom graphs', 0.5614422559738159)]" 506,506,61,506_photoacoustic tomography_quantitative photoacoustic_photoacoustic_reconstruction algorithms,"['photoacoustic tomography', 'quantitative photoacoustic', 'photoacoustic', 'reconstruction algorithms', 'optical tomography', 'image reconstruction', 'diffuse optical tomography', 'tomography', 'compressed sensing', 'imaging modality']","['Analysis for Full Field Photoacoustic Tomography with Variable Sound\n Speed Photoacoustic tomography (PAT) is a non-invasive imaging modality that\nrequires recovering the initial data of the wave equation from certain\nmeasurements of the solution outside the object. In the standard PAT\nmeasurement setup, the used data consist of time-dependent signals measured on\nan observation surface. In contrast, the measured data from the recently\ninvented full-field detection technique provide the solution of the wave\nequation on a spatial domain at a single instant in time. While reconstruction\nusing classical PAT data has been extensively studied, not much is known for\nthe full field PAT problem. In this paper, we build mathematical foundations of\nthe latter problem for variable sound speed and settle its uniqueness and\nstability. Moreover, we introduce an exact inversion method using time-reversal\nand study its convergence. Our results demonstrate the suitability of both the\nfull field approach and the proposed time-reversal technique for high\nresolution photoacoustic imaging.\n', 'Well-posedness for Photoacoustic Tomography with Fabry-Perot Sensors In the mathematical analysis of photoacoustic imaging, it is usually assumed\nthat the acoustic pressure (Dirichlet data) is measured on a detection surface.\nHowever, actual ultrasound detectors gather data of a different type. In this\npaper, we propose a more realistic mathematical model of ultrasound\nmeasurements acquired by the Fabry--Perot sensor. This modeling incorporates\ndirectional response of such sensors. We study the solvability of the resulting\nphotoacoustic tomography problem, concluding that the problem is well-posed\nunder certain assumptions. Numerical reconstructions are implemented using the\nLandweber iterations, after discretization of the governing equations using the\nfinite element method.\n', 'Sampling and resolution in sparse view photoacoustic tomography We investigate resolution in photoacoustic tomography (PAT). Using Shannon\ntheory, we investigate the theoretical resolution limit of sparse view PAT\ntheoretically, and empirically demonstrate that all reconstruction methods used\nexceed this limit.\n']","[('photoacoustic tomography', 0.8082677125930786), ('quantitative photoacoustic', 0.7143515348434448), ('photoacoustic', 0.6356012225151062), ('reconstruction algorithms', 0.5501888394355774), ('optical tomography', 0.5488844513893127), ('image reconstruction', 0.5201607346534729), ('diffuse optical tomography', 0.5072025060653687), ('tomography', 0.5019213557243347), ('compressed sensing', 0.4544423818588257), ('imaging modality', 0.42212849855422974)]" 507,507,61,507_holomorphic vector bundles_holomorphic vector bundle_hermitian vector bundles_hermitian metrics,"['holomorphic vector bundles', 'holomorphic vector bundle', 'hermitian vector bundles', 'hermitian metrics', 'singular hermitian', 'hermitian holomorphic', 'hermitian metric', 'stein manifolds', 'vector bundles', 'metrics holomorphic']","['Optimal $L^2$ extension for holomorphic vector bundles with singular\n hermitian metrics In the present paper, we study the properties of singular Nakano positivity\nof singular hermitian metrics on holomorphic vector bundles, and establish an\noptimal $L^2$ extension theorem for holomorphic vector bundles with singular\nhermitian metrics on weakly pseudoconvex K\\""{a}hler manifolds. As applications,\nwe give a necessary condition for the holding of the equality in optimal $L^2$\nextension theorem, and present singular hermitian holomorphic vector bundle\nversions of some $L^2$ extension theorems with optimal estimate.\n', ""Multiplier Submodule Sheaves and a problem of Lempert In this article, we establish an $L^2$ extension theorem for Nakano\nsemi-positive singular Hermitian metrics on holomorphic vector bundles, and the\nstrong openness and stability properties of the multiplier submodule sheaves\nassociated to Nakano semi-positive singular Hermitian metrics on holomorphic\nvector bundles.\n We solve affirmatively a question of Lempert on the preservation of Nakano\nsemi-positivity under limit of an increasing metrics based on\nDeng-Ning-Wang-Zhou's characterization of Nakano positivity.\n"", 'Nakano positivity of singular Hermitian metrics and vanishing theorems\n of Demailly-Nadel-Nakano type In this article, we propose a definition of Nakano semi-positivity of\nsingular Hermitian metrics on holomorphic vector bundles. By using this\npositivity notion, we establish $L^2$-estimates for holomorphic vector bundles\nwith Nakano positive singular Hermitian metrics. We also show vanishing\ntheorems, which generalize both Nakano type and Demailly-Nadel type vanishing\ntheorems. As applications, we specifically construct globally Nakano\nsemi-positive singular Hermitian metrics for several bundles, and prove\nvanishing theorems associated with them.\n']","[('holomorphic vector bundles', 0.6605112552642822), ('holomorphic vector bundle', 0.6272302269935608), ('hermitian vector bundles', 0.6269044876098633), ('hermitian metrics', 0.5331854820251465), ('singular hermitian', 0.5095834732055664), ('hermitian holomorphic', 0.5083897709846497), ('hermitian metric', 0.5051353573799133), ('stein manifolds', 0.4971466064453125), ('vector bundles', 0.49545687437057495), ('metrics holomorphic', 0.48542648553848267)]" 508,508,61,508_langevin dynamics_underdamped langevin dynamics_overdamped langevin dynamics_langevin equations,"['langevin dynamics', 'underdamped langevin dynamics', 'overdamped langevin dynamics', 'langevin equations', 'underdamped langevin', 'langevin type', 'overdamped langevin', 'stochastic differential equations', 'langevin', 'dynamics brownian']","['Some properties on the reversibility and the linear response theory of\n Langevin dynamics Linear response theory is a fundamental framework studying the macroscopic\nresponse of a physical system to an external perturbation. This paper focuses\non the rigorous mathematical justification of linear response theory for\nLangevin dynamics. We give some equivalent characterizations for reversible\noverdamped/underdamped Langevin dynamics, which is the unperturbed reference\nsystem. Then we clarify sufficient conditions for the smoothness and\nexponential convergence to the invariant measure for the overdamped case. We\nalso clarify those sufficient conditions for the underdamped case, which\ncorresponds to hypoellipticity and hypocoercivity. Based on these, the\nasymptotic dependence of the response function on the small perturbation is\nproved in both finite and infinite time horizons. As applications, Green-Kubo\nrelations and linear response theory for a generalized Langevin dynamics are\nalso proved in a rigorous fashion.\n', 'Quantitative hydrodynamic limits of the Langevin dynamics for gradient\n interface models We study the Langevin dynamics corresponding to the $\\nabla\\phi$ (or\nGinzburg-Landau) interface model with a uniformly convex interaction potential.\nWe interpret these Langevin dynamics as a nonlinear parabolic equation forced\nby white noise, which turns the problem into a nonlinear homogenization\nproblem. Using quantitative homogenization methods, we prove a quantitative\nhydrodynamic limit, obtain the $C^2$ regularity of the surface tension, prove a\nlarge-scale Lipschitz-type estimate for the trajectories of the dynamics, and\nshow that the fluctuation-dissipation relation can be seen as a commutativity\nof homogenization and linearization. Finally, we explain why we believe our\ntechniques can be adapted to the setting of degenerate (non-uniformly) convex\ninteraction potentials.\n', 'Hypocoercivity meets lifts We unify the variational hypocoercivity framework established by D.\nAlbritton, S. Armstrong, J.-C. Mourrat, and M. Novack, with the notion of\nsecond-order lifts of reversible diffusion processes, recently introduced by A.\nEberle and F. L\\""orler. We give an abstract, yet fully constructive,\npresentation of the theory, so that it can be applied to a large class of\nlinear kinetic equations. As this hypocoercivity technique does not twist the\nreference norm, we can recover accurate and sharp convergence rates in various\nmodels. Among those, adaptive Langevin dynamics (ALD) is discussed in full\ndetail and we show that for near-quadratic potentials, with suitable choices of\nparameters, it is a near-optimal second-order lift of the overdamped Langevin\ndynamics. As a further consequence, we observe that the Generalised Langevin\nEquation (GLE) is a also a second-order lift, as the standard (kinetic)\nLangevin dynamics are, of the overdamped Langevin dynamics. Then, convergence\nof (GLE) cannot exceed ballistic speed, i.e. the square root of the rate of the\noverdamped regime. We illustrate this phenomenon with explicit computations in\na benchmark Gaussian case.\n']","[('langevin dynamics', 0.7950067520141602), ('underdamped langevin dynamics', 0.7577980756759644), ('overdamped langevin dynamics', 0.755357563495636), ('langevin equations', 0.7523316740989685), ('underdamped langevin', 0.5530759692192078), ('langevin type', 0.5491297245025635), ('overdamped langevin', 0.5444380044937134), ('stochastic differential equations', 0.5364617705345154), ('langevin', 0.5338810682296753), ('dynamics brownian', 0.5245683193206787)]" 509,509,61,509_mimo broadcast_broadcast channel_broadcast_mimo multiple access,"['mimo broadcast', 'broadcast channel', 'broadcast', 'mimo multiple access', 'multiple access channels', 'fading channels', 'multiple access channel', 'transmit antennas', 'channels', 'channel state information']","['The DoF Region of Two-User MIMO Broadcast Channel with Delayed\n Imperfect-Quality CSIT The channel state information at the transmitter (CSIT) play an important\nrole in the performance of wireless networks. The CSIT model can be delayed and\nimperfect-quality, since the feedback link has a delay and the channel state\ninformation (CSI) feedback has distortion. In this paper, we thus characterize\nthe degrees-of-freedom (DoF) region of the two-user multiple-input\nmultiple-output (MIMO) broadcast channel with delayed imperfect-quality CSIT,\nwhere the antenna configurations can be arbitrary. The converse proof of DoF\nregion is based on the enhancement of physically degraded channel. The\nachievability proof of DoF region is through a novel transmission scheme\ndesign, where the duration of each phase and the amount of transmitted symbols\nare configured based on the imperfect-quality of delayed CSIT. As a result, we\nshow that the DoF region with delayed imperfect-quality CSIT is located between\nthe DoF region with no CSIT and the DoF region with delayed CSIT.\n', 'Achievable DoF Regions of Three-User MIMO Broadcast Channel with Delayed\n CSIT For the two-user multiple-input multiple-output (MIMO) broadcast channel with\ndelayed channel state information at the transmitter (CSIT) and arbitrary\nantenna configurations, all the degrees-of-freedom (DoF) regions are obtained.\nHowever, for the three-user MIMO broadcast channel with delayed CSIT and\narbitrary antenna configurations, the DoF region of order-2 messages is still\nunclear and only a partial achievable DoF region of order-1 messages is\nobtained, where the order-2 messages and order-1 messages are desired by two\nreceivers and one receiver, respectively. In this paper, for the three-user\nMIMO broadcast channel with delayed CSIT and arbitrary antenna configurations,\nwe first design transmission schemes for order-2 messages and order-1 messages.\nNext, we propose to analyze the achievable DoF region of transmission scheme by\ntransformation approach. In particular, we transform the decoding condition of\ntransmission scheme w.r.t. phase duration into the achievable DoF region w.r.t.\nachievable DoF, through achievable DoF tuple expression connecting phase\nduration and achievable DoF. As a result, the DoF region of order-2 messages is\ncharacterized and an achievable DoF region of order-1 messages is completely\nexpressed. Besides, for order-1 messages, we derive the sufficient condition,\nunder which the proposed achievable DoF region is the DoF region.\n', 'The DoF Region of Order-(K-1) Messages for the K-user MIMO Broadcast\n Channel with Delayed CSIT This paper theoretically characterizes the degrees-of-freedom (DoF) region of\norder-$(K-1)$ messages for the $K$-user multiple-input multiple-output (MIMO)\nbroadcast channel with delayed channel state information at the transmitter\n(CSIT) and arbitrary antenna configurations, where the transmitter has $M$\nantennas and the receiver $i=1,2,\\cdots,K$ has $N_i$ antennas. For the\nconverse, we first derive the DoF region of order-$(K-1)$ messages for the\n$K$-user MIMO broadcast channel with no CSIT and arbitrary antenna\nconfigurations with the aid of the proposed Genie-bound, and then establish the\nDoF outer region. For the achievability, we first design a 2-phase transmission\nscheme, and then propose a backward/forward cancellation algorithm for\ndecoding. Specifically, we efficiently derive the achievable DoF region from\nthe designed transmission scheme by transformation approach. The main\nimplication of this paper is that for the order-$(K-1)$ messages of $K$-user\nMIMO broadcast channel, the DoF region with delayed CSIT is larger than the DoF\nregion with no CSIT when $N_2j+1$. This result provides a\nnecessary topological condition for a GKM graph to be a GKM graph of some GKM\nmanifold. We use particular acyclicity arguments to describe the equivariant\ncohomology algebra of an equivariantly formal manifold of dimension $2n$ with\nan $(n-1)$-independent action of $(n-1)$-dimensional torus, under certain\ncolorability assumptions on its GKM graph. This description relates the\nequivariant cohomology algebra to the face algebra of a simplicial poset. Such\nobservation underlines certain similarity between actions of complexity one and\ntorus manifolds.\n', 'Equivariantly formal 2-torus actions of complexity one In this paper we study a specific class of actions of a $2$-torus\n$\\mathbb{Z}_2^k$ on manifolds, namely, the actions of complexity one in general\nposition. We describe the orbit space of equivariantly formal $2$-torus actions\nof complexity one in general position and restricted complexity one actions in\nthe case of small covers. It is observed that the orbit spaces of such actions\nare topological manifolds. If the action is equivariantly formal, we prove that\nthe orbit space is a $\\mathbb{Z}_2$-homology sphere. We study a particular\nsubclass of these $2$-torus actions: restrictions of small covers to a subgroup\nof index 2 in general position. The subgroup of this form exists if and only if\nthe small cover is orientable, and in this case we prove that the orbit space\nof a restricted $2$-torus action is homeomorphic to a sphere.\n']","[('equivariant cohomology', 0.598688006401062), ('gkm manifold', 0.5930532813072205), ('torus manifolds', 0.5598386526107788), ('manifolds', 0.5480840802192688), ('toric manifolds', 0.5283799767494202), ('manifold 2n', 0.5272412300109863), ('manifold', 0.48927244544029236), ('equivariant', 0.48812535405158997), ('manifolds locally', 0.48245057463645935), ('equivariantly formal', 0.4810764491558075)]" 513,513,61,513_anosov flows_anosov flow_anosov diffeomorphisms_flows manifolds,"['anosov flows', 'anosov flow', 'anosov diffeomorphisms', 'flows manifolds', 'flow manifold', 'examples anosov', 'pseudo anosov', 'hyperbolic three manifold', 'anosov', 'flow closed manifold']","['Anomalous Anosov flows revisited This paper is devoted to higher dimensional Anosov flows and consists of two\nparts. In the first part, we investigate fiberwise Anosov flows on affine torus\nbundles which fiber over 3-dimensional Anosov flows. We provide a dichotomy\nresult for such flows --- they are either suspensions of Anosov diffeomorphisms\nor the stable and unstable distributions have equal dimensions.\n In the second part, we give a new surgery type construction of Anosov flows,\nwhich yields non-transitive Anosov flows in all odd dimensions.\n', 'Anosov flows on Dehn surgeries on the figure-eight knot The purpose of this paper is to classify Anosov flows on the 3-manifolds\nobtained by Dehn surgeries on the figure-eight knot. This set of 3-manifolds is\ndenoted by M(r) (r is a ratioanl number), which contains the first class of\nhyperbolic 3-manifolds admitting Anosov flows in history, discovered by\nGoodman. Combining with the classification of Anosov flows on the sol-manifold\nM(0) due to Plante, we have: 1. if r is an integer, up to topological\nequivalence, M(r) exactly carries a unique Anosov flow, which is constructed by\nGoodman by doing a Dehn-Fried-Goodman surgery on a suspension Anosov flow; 2.\nif r is not an integer, M(r) does not carry any Anosov flow. As a consequence\nof the second result, we get infinitely many closed orientable hyperbolic\n3-manifolds which carry taut foliations but does not carry any Anosov flow. The\nfundamental tool in the proofs is the set of branched surfaces built by\nSchwider, which is used to carry essential laminations on M(r).\n', ""Goodman surgery and projectively Anosov flows We introduce a generalization of Goodman surgery to the category of\nprojectively Anosov flows. This construction is performed along a knot that is\nsimultaneously Legendrian and transverse for a supporting bi-contact structure.\nIf the flow is Anosov there is a particular class of supporting bi-contact\nstructures that induce Lorentzian metrics satisfying Barbot's criterion of\nhyperbolicity. Foulon and Hasselblatt construct new contact Anosov flows by\nsurgery from a geodesic flow. We generalize their result showing that in any\ncontact Anosov flow there is a family of Legendrian knots that can be used to\nproduce new contact Anosov flows by surgery. Outside of the realm of Anosov\nflows we generate new examples of projectively Anosov flows on hyperbolic\n3-manifolds. These flows contain an invariant submanifold of genus g>0. We also\ngive some application to contact geometry: we interpret the bi-contact surgery\nin terms of classic contact-Legendrian surgery and admissible-inadmissible\ntransverse surgery and we deduce some (hyper)tightness result for contact and\ntransverse surgeries.\n""]","[('anosov flows', 0.7368488907814026), ('anosov flow', 0.6928591728210449), ('anosov diffeomorphisms', 0.66829913854599), ('flows manifolds', 0.617516040802002), ('flow manifold', 0.5735312700271606), ('examples anosov', 0.5522007346153259), ('pseudo anosov', 0.5506640076637268), ('hyperbolic three manifold', 0.5430340766906738), ('anosov', 0.5287063717842102), ('flow closed manifold', 0.5276111364364624)]" 514,514,61,514_quantum cryptography_quantum secure_efficient quantum_quantum private,"['quantum cryptography', 'quantum secure', 'efficient quantum', 'quantum private', 'based quantum', 'key distribution', 'quantum', 'secret key', 'scheme quantum', 'cryptography']","['Information-Theoretic Secure Key Sharing for Wide-Area Mobile\n Applications With the rapid growth of handheld devices in the internet of things (IoT)\nnetworks, mobile applications have become ubiquitous in everyday life. As\ntechnology is developed, so do also the risks and threats associated with it,\nespecially in the forthcoming quantum era. Existing IoT networks, however, lack\na quantum-resistant secret key sharing scheme to meet confidential message\ntransmission demands in wide-area mobile applications. To address this issue,\nthis article proposes a new scheme, channel reciprocity (CR) based quantum key\ndistribution (QKD) CR-QKD, which accomplishes the goal of secret key sharing by\ncombining emerging techniques of QKD and CR-based key generation (CRKG).\nExploiting laws of quantum physics and properties of wireless channels, the\nproposed scheme is able to ensure the secrecy of the key, even against\ncomputationally unbounded adversaries. The basic mechanism is elaborated for a\nsingle-user case and it is extended into a multi-user case by redesigning a\nmulti-user edge forwarding strategy. In addition, to make CR-QKD more\npractical, some enhancement strategies are studied to reduce the time delay and\nto improve the secret key generation rate in a secure manner. A prototype of\nCR-QKD is demonstrated in a metropolitan area network, where secret keys are\nshared between two remote IoT devices that are roughly fifteen kilometers apart\nfrom each other. The experimental results have verified that CR-QKD allows a\nsecret key rate of 424 bits per second with a retransmission rate of 2.1%.\n', 'High-dimensional coherent one-way quantum key distribution High-dimensional quantum key distribution (QKD) offers secure communication,\nwith secure key rates that surpass those achievable by QKD protocols utilizing\ntwo-dimensional encoding. However, existing high-dimensional QKD protocols\nrequire additional experimental resources, such as multiport interferometers\nand multiple detectors, thus raising the cost of practical high-dimensional\nsystems and limiting their use. Here, we present and analyze a novel protocol\nfor arbitrary-dimensional QKD, that requires only the hardware of a standard\ntwo-dimensional system. We provide security proofs against individual attacks\nand coherent attacks, setting an upper and lower bound on the secure key rates.\nThen, we test the new high-dimensional protocol in a standard two-dimensional\nQKD system over a 40 km fiber link. The new protocol yields a two-fold\nenhancement of the secure key rate compared to the standard two-dimensional\ncoherent one-way protocol, without introducing any hardware modifications to\nthe system. This work, therefore, holds great potential to enhance the\nperformance of already deployed time-bin QKD systems through a software update\nalone. Furthermore, its applications extend across different encoding schemes\nof QKD qudits.\n', 'QKD Based on Time-Entangled Photons and its Key-Rate Promise For secure practical systems, quantum key distribution (QKD) must provide\nhigh key rates over long distances. Time-entanglement-based QKD promises to\nincrease the secret key rate and distribution distances compared to other QKD\nimplementations. This article describes the major steps in QKD protocols,\nfocusing on the nascent QKD technology based on high-dimensional time-bin\nentangled photons. We overview state-of-the-art from the information and coding\ntheory perspective. In particular, we discuss the key rate loss due to\nsingle-photon detector imperfections. We hope the open questions posed and\ndiscussed in this paper will inspire information and coding theorists to\ncontribute to and impact fledgling quantum applications and influence future\nquantum communication systems.\n']","[('quantum cryptography', 0.6806862354278564), ('quantum secure', 0.6574891209602356), ('efficient quantum', 0.5407142043113708), ('quantum private', 0.5154941082000732), ('based quantum', 0.4681846797466278), ('key distribution', 0.46137675642967224), ('quantum', 0.45435941219329834), ('secret key', 0.4535849392414093), ('scheme quantum', 0.44883522391319275), ('cryptography', 0.44430768489837646)]" 515,515,60,515_compact ahler manifolds_ahler manifolds_manifolds compact ahler_compact ahler manifold,"['compact ahler manifolds', 'ahler manifolds', 'manifolds compact ahler', 'compact ahler manifold', 'hyperk ahler manifolds', 'hyper ahler manifolds', 'ahler manifold', 'hyperk ahler manifold', 'compact ahler', 'ahler spaces']","['On the dual positive cones and the algebraicity of a compact K\\""ahler manifold We investigate the algebraicity of compact K\\""ahler manifolds admitting a positive rational Hodge class of bidimension $(1,1)$. We prove that if the dual K\\""ahler cone of a compact K\\""ahler manifold $X$ contains a rational class as an interior point, then its Albanese variety is projective. As a consequence, we answer the Oguiso--Peternell problem for Ricci-flat compact K\\""ahler manifolds. We also study related algebraicity problems for threefolds.', 'Algebraic approximations of compact K\\""ahler manifolds of algebraic\n codimension 1 For every compact K\\""ahler manifold $X$ of algebraic dimension $a(X) = \\dim X\n- 1$, we prove that $X$ has arbitrarily small deformations to some projective\nmanifolds.\n', 'A characterization of uniruled compact K\\""ahler manifolds We adapt Bost\'s algebraicity characterization to the situation of a germ in a\ncompact K\\""ahler manifold. As a consequence, we extend the algebraic\nintegrability criteria of Campana-P\\u{a}un and of Druel to foliations on\ncompact K\\""ahler manifolds. As an application, we prove that a compact K\\""ahler\nmanifold is uniruled if and only if its canonical line bundle is not\npseudoeffective.\n']","[('compact ahler manifolds', 0.7993425726890564), ('ahler manifolds', 0.7858462929725647), ('manifolds compact ahler', 0.7852358222007751), ('compact ahler manifold', 0.7752997279167175), ('hyperk ahler manifolds', 0.7710613012313843), ('hyper ahler manifolds', 0.768036425113678), ('ahler manifold', 0.7560639977455139), ('hyperk ahler manifold', 0.7468293905258179), ('compact ahler', 0.6476287841796875), ('ahler spaces', 0.6470850110054016)]" 516,516,60,516_decoding complexity_access massive mimo_massive mimo_orthogonal multiple access,"['decoding complexity', 'access massive mimo', 'massive mimo', 'orthogonal multiple access', 'fading channels', 'decoding', 'successive interference cancellation', 'unsourced random access', 'interference cancellation', 'random access massive']","[""Unsourced Random Access with a Massive MIMO Receiver Using Multiple\n Stages of Orthogonal Pilots We study the problem of unsourced random access (URA) over Rayleigh\nblock-fading channels with a receiver equipped with multiple antennas. We\nemploy multiple stages of orthogonal pilots, each of which is randomly picked\nfrom a codebook. In the proposed scheme, each user encodes its message using a\npolar code and appends it to the selected pilot sequences to construct its\ntransmitted signal. Accordingly, the received signal consists of superposition\nof the users' signals each composed of multiple orthogonal pilot parts and a\npolar coded part. We use an iterative approach for decoding the transmitted\nmessages along with a suitable successive interference cancellation scheme.\nPerformance of the proposed scheme is illustrated via extensive set of\nsimulation results which show that it significantly outperforms the existing\napproaches for URA over multiple-input multiple-output fading channels.\n"", 'Pilot-Based Unsourced Random Access with a Massive MIMO Receiver in the\n Quasi-Static Fading Regime In this work we treat the unsourced random access problem on a Rayleigh\nblock-fading AWGN channel with multiple receive antennas. Specifically, we\nconsider the slowly fading scenario where the coherence block-length is large\ncompared to the number of active users and the message can be transmitted in\none coherence block. Unsourced random access refers to a form of grant-free\nrandom access where users are considered to be a-priori indistinguishable and\nthe receiver recovers a list of transmitted messages up to permutation. In this\nwork we show that, when the coherence block length is large enough, a\nconventional approach based on the transmission of non-orthogonal pilot\nsequences with subsequent channel estimation and Maximum-Ratio-Combining (MRC)\nprovides a simple energy-efficient solution whose performance can be well\napproximated in closed form. For the finite block-length simulations we use a\nrandomly sub-sampled DFT matrix as pilot matrix, a low-complexity approximate\nmessage passing algorithm for activity detection and a state-of-the-art polar\ncode as single-user error correction code with a successive-cancellation-list\ndecoder. These simulations prove the scalability of the presented approach and\nthe quality of the analysis.\n', 'Design and Analysis of Massive Uncoupled Unsourced Random Access with\n Bayesian Joint Decoding In this paper, we investigate unsourced random access for massive\nmachine-type communications (mMTC) in the sixth-generation (6G) wireless\nnetworks. Firstly, we establish a high-efficiency uncoupled framework for\nmassive unsourced random access without extra parity check bits. Then, we\ndesign a low-complexity Bayesian joint decoding algorithm, including codeword\ndetection and stitching. In particular, we present a Bayesian codeword\ndetection approach by exploiting Bayes-optimal divergence-free orthogonal\napproximate message passing in the case of unknown priors. The output long-term\nchannel statistic information is well leveraged to stitch codewords for\nrecovering the original message. Thus, the spectral efficiency is improved by\navoiding the use of parity bits. Moreover, we analyze the performance of the\nproposed Bayesian joint decoding-based massive uncoupled unsourced random\naccess scheme in terms of computational complexity and error probability of\ndecoding. Furthermore, by asymptotic analysis, we obtain some useful insights\nfor the design of massive unsourced random access. Finally, extensive\nsimulation results confirm the effectiveness of the proposed scheme in 6G\nwireless networks.\n']","[('decoding complexity', 0.49901971220970154), ('access massive mimo', 0.49773862957954407), ('massive mimo', 0.4804563820362091), ('orthogonal multiple access', 0.46978387236595154), ('fading channels', 0.4657641649246216), ('decoding', 0.4574897587299347), ('successive interference cancellation', 0.4413185119628906), ('unsourced random access', 0.42018598318099976), ('interference cancellation', 0.4080773890018463), ('random access massive', 0.404352605342865)]" 517,517,60,517_orbits class_line classes_liebler line classes_family orbits,"['orbits class', 'line classes', 'liebler line classes', 'family orbits', 'orbits points', 'quartic forms', 'projective space mathrm', 'twisted cubic', 'orbits', 'line incidence']","['Incidence matrices for the class $\\mathcal{O}_6$ of lines external to\n the twisted cubic in $\\mathrm{PG}(3,q)$ We consider the structures of the plane-line and point-line incidence\nmatrices of the projective space $\\mathrm{PG}(3,q)$ connected with orbits of\nplanes, points, and lines under the stabilizer group of the twisted cubic. In\nthe literature, lines are partitioned into classes, each of which is a union of\nline orbits. In this paper, for all $q$, even and odd, we determine the\nincidence matrices connected with a family of orbits of the class named\n$\\mathcal{O}_6$. This class contains lines external to the twisted cubic. The\nconsidered family include an essential part of all $\\mathcal{O}_6$ orbits,\nwhose complete classification is an open problem.\n', 'Further results on orbits and incidence matrices for the class\n $\\mathcal{O}_6$ of lines external to the twisted cubic in $\\mathrm{PG}(3,q)$ In the literature, lines of the projective space $\\mathrm{PG}(3,q)$ are\npartitioned into classes, each of which is a union of line orbits under the\nstabilizer group of the twisted cubic. The least studied class is named\n$\\mathcal{O}_6$. This class contains lines external to the twisted cubic which\nare not its chords or axes and do not lie in any of its osculating planes. For\neven and odd $q$, we propose a new family of orbits of $\\mathcal{O}_6$ and\ninvestigate in detail their stabilizer groups and the corresponding submatrices\nof the point-line and plane-line incidence matrices. To obtain these\nsubmatrices, we explored the number of solutions of cubic and quartic equations\nconnected with intersections of lines (including the tangents to the twisted\ncubic), points, and planes in $\\mathrm{PG}(3,q)$.\n', 'Twisted cubic and orbits of lines in $\\mathrm{PG}(3,q)$, II In the projective space $\\mathrm{PG}(3,q)$, we consider the orbits of lines\nunder the stabilizer group of the twisted cubic. In the literature, lines of\n$\\mathrm{PG}(3,q)$ are partitioned into classes, each of which is a union of\nline orbits. In this paper, all classes of lines consisting of a unique orbit\nare found. For the remaining line types, with one exception, it is proved that\nthey consist exactly of two or three orbits; sizes and structures of these\norbits are determined. Also, the subgroups of the stabilizer group of the\ntwisted cubic fixing lines of the orbits are obtained. Problems which remain\nopen for one type of lines are formulated and, for $5\\le q\\le37$ and $q=64$, a\nsolution is provided.\n']","[('orbits class', 0.5249767899513245), ('line classes', 0.4794791638851166), ('liebler line classes', 0.46747949719429016), ('family orbits', 0.4487634003162384), ('orbits points', 0.441826730966568), ('quartic forms', 0.432918518781662), ('projective space mathrm', 0.41721397638320923), ('twisted cubic', 0.40265342593193054), ('orbits', 0.40227988362312317), ('line incidence', 0.39774754643440247)]" 518,518,60,518_graph matching_matching algorithms_matching graph_matching vertices,"['graph matching', 'matching algorithms', 'matching graph', 'matching vertices', 'exact matching', 'matching', 'vertex correspondence', 'matching strategy', 'graph alignment', 'edge correlation']","[""Random Graph Matching with Improved Noise Robustness Graph matching, also known as network alignment, refers to finding a\nbijection between the vertex sets of two given graphs so as to maximally align\ntheir edges. This fundamental computational problem arises frequently in\nmultiple fields such as computer vision and biology. Recently, there has been a\nplethora of work studying efficient algorithms for graph matching under\nprobabilistic models. In this work, we propose a new algorithm for graph\nmatching: Our algorithm associates each vertex with a signature vector using a\nmultistage procedure and then matches a pair of vertices from the two graphs if\ntheir signature vectors are close to each other. We show that, for two\nErd\\H{o}s--R\\'enyi graphs with edge correlation $1-\\alpha$, our algorithm\nrecovers the underlying matching exactly with high probability when $\\alpha \\le\n1 / (\\log \\log n)^C$, where $n$ is the number of vertices in each graph and $C$\ndenotes a positive universal constant. This improves the condition $\\alpha \\le\n1 / (\\log n)^C$ achieved in previous work.\n"", 'The Phantom Alignment Strength Conjecture: Practical use of graph\n matching alignment strength to indicate a meaningful graph match The alignment strength of a graph matching is a quantity that gives the\npractitioner a measure of the correlation of the two graphs, and it can also\ngive the practitioner a sense for whether the graph matching algorithm found\nthe true matching. Unfortunately, when a graph matching algorithm fails to find\nthe truth because of weak signal, there may be ""phantom alignment strength""\nfrom meaningless matchings that, by random noise, have fewer disagreements than\naverage (sometimes substantially fewer); this alignment strength may give the\nmisleading appearance of significance. A practitioner needs to know what level\nof alignment strength may be phantom alignment strength and what level\nindicates that the graph matching algorithm obtained the true matching and is a\nmeaningful measure of the graph correlation. The {\\it Phantom Alignment\nStrength Conjecture} introduced here provides a principled and practical means\nto approach this issue. We provide empirical evidence for the conjecture, and\nexplore its consequences.\n', 'Deep graph matching meets mixed-integer linear programming: Relax at\n your own risk ? Graph matching is an important problem that has received widespread\nattention, especially in the field of computer vision. Recently,\nstate-of-the-art methods seek to incorporate graph matching with deep learning.\nHowever, there is no research to explain what role the graph matching algorithm\nplays in the model. Therefore, we propose an approach integrating a MILP\nformulation of the graph matching problem. This formulation is solved to\noptimal and it provides inherent baseline. Meanwhile, similar approaches are\nderived by releasing the optimal guarantee of the graph matching solver and by\nintroducing a quality level. This quality level controls the quality of the\nsolutions provided by the graph matching solver. In addition, several\nrelaxations of the graph matching problem are put to the test. Our experimental\nevaluation gives several theoretical insights and guides the direction of deep\ngraph matching methods.\n']","[('graph matching', 0.7304831743240356), ('matching algorithms', 0.6561830639839172), ('matching graph', 0.6559106707572937), ('matching vertices', 0.5915506482124329), ('exact matching', 0.5882946848869324), ('matching', 0.5580474138259888), ('vertex correspondence', 0.5313360691070557), ('matching strategy', 0.5212876796722412), ('graph alignment', 0.4946323335170746), ('edge correlation', 0.473112553358078)]" 519,519,60,519_instanton moduli_sasakian manifolds_instantons_instantons also,"['instanton moduli', 'sasakian manifolds', 'instantons', 'instantons also', 'deformed hermitian yang', '_2 manifolds', 'g_2 manifolds', 'instanton', 'g_2 manifold', 'spin manifolds']","['Deformations of Asymptotically Conical $G_2$-Instantons We develop the deformation theory of instantons on asymptotically conical\n$G_2$-manifolds, where an asymptotic connection at infinity is fixed. A\nspinorial approach is adopted to relate the space of deformations to the kernel\nof a twisted Dirac operator on the $G_2$-manifold and to the eigenvalues of a\ntwisted Dirac operator on the nearly K\\""ahler link. This framework is then used\nto calculate the virtual dimension of the moduli spaces of $G_2$-instantons on\nwhich several known examples live. One such example considered is the\n$G_2$-instanton of G\\""unaydin-Nicolai, which lives on $R^7$. As an application\nof the deformation theory, we show how knowledge of the virtual dimension of\nthe moduli space allows us to prove that unobstructed connections in the moduli\nspace are $G_2$-invariant. By classifying such connections we prove a\nuniqueness result for unobstructed $G_2$-instantons on the principal\n$G_2$-bundle over $R^7$.\n', 'Examples of deformed Spin(7)-instantons/Donaldson-Thomas connections We construct examples of deformed Hermitian Yang-Mills connections and\ndeformed Spin(7)-instantons (also called Spin(7) deformed Donaldson-Thomas\nconnections) on the cotangent bundle of $\\mathbb{C}\\mathbb{P}^2$ endowed with\nthe Calabi hyperK\\""ahler structure. Deformed Spin(7)-instantons on cones over\n3-Sasakian 7-manifolds are also constructed. We show that these can be used to\ndistinguish between isometric structures and also between Sp(2) and Spin(7)\nholonomy cones. To the best of our knowledge, these are the first non-trivial\nexamples of deformed Spin(7)-instantons.\n', 'Examples of deformed G_2-instantons/Donaldson-Thomas connections In this note, we provide the first non-trivial examples of deformed\nG_2-instantons, originally called deformed Donaldson-Thomas connections. As a\nconsequence, we see how deformed G_2-instantons can be used to distinguish\nbetween nearly parallel G_2-structures and isometric G_2-structures on\n3-Sasakian 7-manifolds. Our examples give non-trivial deformed G_2-instantons\nwith obstructed deformation theory and situations where the moduli space of\ndeformed G_2-instantons has components of different dimensions. We finally\nstudy the relation between our examples and a Chern-Simons type functional\nwhich has deformed G_2-instantons as critical points.\n']","[('instanton moduli', 0.5707650184631348), ('sasakian manifolds', 0.5348260998725891), ('instantons', 0.5334477424621582), ('instantons also', 0.529183566570282), ('deformed hermitian yang', 0.48007336258888245), ('_2 manifolds', 0.4797575771808624), ('g_2 manifolds', 0.475161075592041), ('instanton', 0.46929964423179626), ('g_2 manifold', 0.4555666744709015), ('spin manifolds', 0.44736602902412415)]" 520,520,60,520_mapping class groups_mapping class group_subgroup mapping class_orientable surface genus,"['mapping class groups', 'mapping class group', 'subgroup mapping class', 'orientable surface genus', 'group closed orientable', 'class group closed', 'subgroup mapping', 'class groups', 'surface genus', 'cyclic covers']","['General primitivity in the mapping class group For $g\\geq 2$, let $\\mathrm{Mod}(S_g)$ be the mapping class group of the\nclosed orientable surface $S_g$ of genus $g$. In this paper, we obtain\nnecessary and sufficient conditions under which a given pseudo-periodic mapping\nclass can be a root of another up to conjugacy. Using this characterization,\nthe canonical decomposition of (non-periodic) mapping classes, and some known\nalgorithms, we give an algorithm for determining the conjugacy classes of roots\nof arbitrary mapping classes. Furthermore, we derive realizable bounds on the\ndegrees of roots of pseudo-periodic mapping classes in $\\mathrm{Mod}(S_g)$, the\nTorelli group, the level-$m$ subgroup of $\\mathrm{Mod}(S_g)$, and the\ncommutator subgroup of $\\mathrm{Mod}(S_2)$. In particular, we show that the\nhighest possible (realizable) degree of a root of a pseudo-periodic mapping\nclass $F$ is $3q(F)(g+1)(g+2)$, where $q(F)$ is a unique positive integer\nassociated with the conjugacy class of $F$. Moreover, this bound is realized by\na root of a power of a Dehn twist about a separating curve of genus $[g/2]$ in\n$S_g$, where $g\\equiv 0,9 \\pmod{12}$. Finally, for $g\\geq 3$, we show that any\npseudo-periodic mapping class having a nontrivial periodic component that is\nnot the hyperelliptic involution, normally generates $\\mathrm{Mod}(S_g)$.\nConsequently, we establish that $\\mathrm{Mod}(S_g)$ is normally generated by a\nroot of bounding pair map or a root of a nontrivial power of a Dehn twist.\n', 'The liftable mapping class group of balanced superelliptic covers The hyperelliptic mapping class group has been studied in various contexts\nwithin topology and algebraic geometry. What makes this study tractable is that\nthere is a surjective map from the hyperelliptic mapping class group to a\nmapping class group of a punctured sphere. The more general family of\nsuperelliptic mapping class groups does not, in general, surject on to a\nmapping class group of a punctured sphere, but on to a finite index subgroup.\nWe call this finite index subgroup the liftable mapping class group. In order\nto initiate the generalization of results on the hyperelliptic mapping class\ngroup to the broader family of superelliptic mapping class groups, we study an\nintermediate family called the balanced superelliptic mapping class group. We\ncompute the index of the liftable mapping class group in the full mapping class\ngroup of the sphere and show that the liftable mapping class group is\nindependent of the degree of the cover. We also build a presentation for the\nliftable mapping class group, compute its abelianization, and show that the\nbalanced superelliptic mapping class group has finite abelianization. Although\nour calculations focus on the subfamily of balanced superelliptic mapping class\ngroups, our techniques can be extended to any superelliptic mapping class\ngroup, even those not within the balanced family.\n', 'Generating the liftable mapping class groups of cyclic covers of spheres For $g\\geq 2$, let $\\mathrm{Mod}(S_g)$ be the mapping class group of closed\norientable surface $S_g$ of genus $g$. In this paper, we derive a finite\ngenerating set for the liftable mapping class groups corresponding to\nfinite-sheeted regular branched cyclic covers of spheres. As an application, we\nprovide an algorithm to derive presentations of these liftable mapping class\ngroups, and the normalizers and centralizers of periodic mapping classes\ncorresponding to these covers. Furthermore, we determine the isomorphism\nclasses of the normalizers of irreducible periodic mapping classes in\n$\\mathrm{Mod}(S_g)$. Moreover, we derive presentations for the liftable mapping\nclass groups corresponding to covers induced by certain reducible periodic\nmapping classes. Consequently, we derive a presentation for the centralizer and\nnormalizer of a reducible periodic mapping class in $\\mathrm{Mod}(S_g)$ of the\nhighest order $2g+2$. As final applications of our results, we recover the\ngenerating sets of the liftable mapping class groups of the hyperelliptic cover\nobtained by Birman-Hilden and the balanced superelliptic cover obtained by\nGhaswala-Winarski.\n']","[('mapping class groups', 0.5341042280197144), ('mapping class group', 0.5215731263160706), ('subgroup mapping class', 0.5110412240028381), ('orientable surface genus', 0.4970936179161072), ('group closed orientable', 0.47015607357025146), ('class group closed', 0.4466570317745209), ('subgroup mapping', 0.4461509585380554), ('class groups', 0.4450928568840027), ('surface genus', 0.4415581226348877), ('cyclic covers', 0.4404545724391937)]" 521,521,59,521_traffic control_automated vehicles cavs_connected automated vehicles_autonomous vehicles cavs,"['traffic control', 'automated vehicles cavs', 'connected automated vehicles', 'autonomous vehicles cavs', 'traffic scenarios', 'connected autonomous vehicles', 'automated vehicles', 'human driven vehicles', 'automated vehicle', 'mixed traffic']","['Mixed platoon control of automated and human-driven vehicles at a\n signalized intersection: dynamical analysis and optimal control The emergence of Connected and Automated Vehicles (CAVs) promises better\ntraffic mobility for future transportation systems. Existing research mostly\nfocused on fully-autonomous scenarios, while the potential of CAV control at a\nmixed traffic intersection where human-driven vehicles (HDVs) also exist has\nbeen less explored. This paper proposes a notion of ""1+n"" mixed platoon,\nconsisting of one leading CAV and n following HDVs, and formulates a\nplatoon-based optimal control framework for CAV control at a signalized\nintersection. Based on the linearized dynamics model of the ""1+n"" mixed\nplatoon, fundamental properties including stability and controllability are\nunder rigorous theoretical analysis. Then, a constrained optimal control\nframework is established, aiming at improving the global traffic efficiency and\nfuel consumption at the intersection via direct control of the CAV. A\nhierarchical event-triggered algorithm is also designed for practical\nimplementation of the optimal control method between adjacent mixed platoons\nwhen approaching the intersection. Extensive numerical simulations at multiple\ntraffic volumes and market penetration rates validate the greater benefits of\nthe mixed platoon based method, compared with traditional trajectory\noptimization methods for one single CAV.\n', 'Decentralized Optimal Coordination of Connected and Automated Vehicles\n for Multiple Traffic Scenarios Connected and automated vehicles (CAVs) provide the most intriguing\nopportunity to optimize energy consumption and travel time. Several approaches\nhave been proposed in the literature that allow CAVs to coordinate in\nsituations where there is a potential conflict, for example, in signalized\nintersections, merging at roadways and roundabouts, to reduce energy\nconsumption and optimize traffic flow. In this paper, we consider the problem\nof coordinating CAVs in a corridor consisting of multiple traffic scenarios. We\nformulate a two-level optimization problem in which we maximize traffic\nthroughput in the upper-level problem, and derive a closed-form analytical\nsolution that yields the optimal control input for each CAV, in terms of fuel\nconsumption, in the low-level problem. We validate the effectiveness of the\nsolution through simulation under 100% CAVpenetration rate. Fuel consumption\nand travel time for the vehicles are significantly reduced compared to a\nbaseline scenario consisting of human-driven vehicles.\n', ""Addressing Mixed Traffic Through Platooning of Vehicles Connected and automated vehicles (CAVs) provide the most intriguing\nopportunity for enabling users to better monitor transportation network\nconditions and make better operating decisions to improve safety and reduce\npollution, energy consumption, and travel delays. While several studies have\nshown the benefits of CAVs in reducing energy and alleviating traffic\ncongestion in specific traffic scenarios, e.g., crossing signal-free\nintersections, merging at roadways and roundabouts, cruising in congested\ntraffic, passing through speed reduction zones, and lane-merging or passing\nmaneuvers, most of these efforts have focused on 100% CAV penetration rates\nwithout considering human-driven vehicles (HDVs). One key question that still\nremains unanswered is ``how can CAVs and HDVs be coordinated safely?'' In this\npaper, we report on an optimal control framework to coordinate CAVs and HDVs at\nany traffic scenario. The idea is to directly control the CAVs to force the\ntrailing HDVs to form platoons. Thus, we indirectly control the HDVs by\ncoordinating the platoon of HDVs led by CAVs.\n""]","[('traffic control', 0.6099854111671448), ('automated vehicles cavs', 0.5983742475509644), ('connected automated vehicles', 0.595649003982544), ('autonomous vehicles cavs', 0.5387541055679321), ('traffic scenarios', 0.5233027338981628), ('connected autonomous vehicles', 0.5194181799888611), ('automated vehicles', 0.5096039772033691), ('human driven vehicles', 0.5037647485733032), ('automated vehicle', 0.5036025047302246), ('mixed traffic', 0.4695597290992737)]" 522,522,59,522_facility location problems_cost optimization_facility location_programming lp relaxation,"['facility location problems', 'cost optimization', 'facility location', 'programming lp relaxation', 'facility', 'facilities', 'location models', 'integer programming', 'location decisions', 'location problems']","[""An O(loglog n)-Approximation for Submodular Facility Location In the Submodular Facility Location problem (SFL) we are given a collection\nof $n$ clients and $m$ facilities in a metric space. A feasible solution\nconsists of an assignment of each client to some facility. For each client, one\nhas to pay the distance to the associated facility. Furthermore, for each\nfacility $f$ to which we assign the subset of clients $S^f$, one has to pay the\nopening cost $g(S^f)$, where $g(\\cdot)$ is a monotone submodular function with\n$g(\\emptyset)=0$.\n SFL is APX-hard since it includes the classical (metric uncapacitated)\nFacility Location problem (with uniform facility costs) as a special case.\nSvitkina and Tardos [SODA'06] gave the current-best $O(\\log n)$ approximation\nalgorithm for SFL. The same authors pose the open problem whether SFL admits a\nconstant approximation and provide such an approximation for a very restricted\nspecial case of the problem.\n We make some progress towards the solution of the above open problem by\npresenting an $O(\\log\\log n)$ approximation. Our approach is rather flexible\nand can be easily extended to generalizations and variants of SFL. In more\ndetail, we achieve the same approximation factor for the practically relevant\ngeneralizations of SFL where the opening cost of each facility $f$ is of the\nform $p_f+g(S^f)$ or $w_f\\cdot g(S^f)$, where $p_f,w_f \\geq 0$ are input\nvalues.\n We also obtain an improved approximation algorithm for the related Universal\nStochastic Facility Location problem. In this problem one is given a classical\n(metric) facility location instance and has to a priori assign each client to\nsome facility. Then a subset of active clients is sampled from some given\ndistribution, and one has to pay (a posteriori) only the connection and opening\ncosts induced by the active clients. The expected opening cost of each facility\n$f$ can be modelled with a submodular function of the set of clients assigned\nto $f$.\n"", 'A row generation method for inverse continuous facility location problem In a single facility location problem, a set of points is given and the goal\nis finding the optimal location of new facility respect to given criteria such\nas minimizing time, cost and distances between the clients and facilities. On\nthe other side, the inverse models try to modify the parameters of the problem\nwith the minimum cost such that a given point becomes optimal. In this paper,\nwe introduce a novel algorithm for the general case of the inverse single\nfacility location problem with variable weights in the plane. The convergence\nand optimality conditions of the algorithm are presented. Then in the special\ncases, the inverse minisum and minimax single facility location problems are\nconsidered and the algorithm tested on some instances. The results indicate the\nefficiency of the algorithm on these instances.\n', ""Inverse single facility location problem in the plane with variable\n coordinates In traditional facility location problems, a set of points is provided, and\nthe objective is to determine the best location for a new facility based on\ncriteria such as minimizing cost, time, and distances between clients and\nfacilities. Conversely, inverse single facility location problems focus on\nadjusting the problem's parameters at minimal cost to make a specific point\noptimal. In this paper, we present an algorithm for the general case of the\ninverse single facility location problem with variable coordinates in a\ntwo-dimensional space. We outline the optimality conditions of this algorithm.\nAdditionally, we examine the specific case namely the inverse minisum single\nfacility location problem and test the algorithm on various instances. The\nresults demonstrate the algorithm's effectiveness in these scenarios.\n""]","[('facility location problems', 0.601440966129303), ('cost optimization', 0.5646630525588989), ('facility location', 0.483258455991745), ('programming lp relaxation', 0.46497368812561035), ('facility', 0.441272109746933), ('facilities', 0.4133220613002777), ('location models', 0.4060271084308624), ('integer programming', 0.4058842658996582), ('location decisions', 0.3922431766986847), ('location problems', 0.39215022325515747)]" 523,523,59,523_liebler sets_cameron liebler sets_liebler line classes_polar spaces,"['liebler sets', 'cameron liebler sets', 'liebler line classes', 'polar spaces', 'sets generators', 'projective spaces', 'dimensional projective space', 'projective subspaces', 'sets projective', 'cameron liebler line']","['On two non-existence results for Cameron-Liebler $k$-sets in\n $\\mathrm{PG}(n,q)$ This paper focuses on non-existence results for Cameron-Liebler $k$-sets. A\nCameron-Liebler $k$-set is a collection of $k$-spaces in $\\mathrm{PG}(n,q)$ or\n$\\mathrm{AG}(n,q)$ admitting a certain parameter $x$, which is dependent on the\nsize of this collection. One of the main research questions remains the\n(non-)existence of Cameron-Liebler $k$-sets with parameter $x$. This paper\nimproves two non-existence results. First we show that the parameter of a\nnon-trivial Cameron-Liebler $k$-set in $\\mathrm{PG}(n,q)$ should be larger than\n$q^{n-\\frac{5k}{2}-1}$, which is an improvement of an earlier known lower\nbound. Secondly, we prove a modular equality on the parameter $x$ of\nCameron-Liebler $k$-sets in $\\mathrm{PG}(n,q)$ with\n$x<\\frac{q^{n-k}-1}{q^{k+1}-1}$, $n\\geq 2k+1$, $n-k+1\\geq 7$ and $n-k$ even. In\nthe affine case we show a similar result for $n-k+1\\geq 3$ and $n-k$ even. This\nis a generalization of earlier known modular equalities in the projective and\naffine case.\n', ""Cameron-Liebler sets of generators in finite classical polar spaces Cameron-Liebler sets were originally defined as collections of lines (`line\nclasses') in $\\mathrm{PG}(3,q)$ sharing certain properties with line classes of\nsymmetric tactical decompositions. While there are many equivalent\ncharacterisations, these objects are defined as sets of lines whose\ncharacteristic vector lies in the image of the transpose of the point-line\nincidence matrix of $\\mathrm{PG}(3,q)$, and so combinatorially they behave like\na union of pairwise disjoint point-pencils. Recently, the concept of a\nCameron-Liebler set has been generalised to several other settings. In this\narticle we introduce Cameron-Liebler sets of generators in finite classical\npolar spaces. For each of the polar spaces we give a list of characterisations\nthat mirrors those for Cameron-Liebler line sets, and also prove some\nclassification results.\n"", 'Cameron-Liebler sets of k-spaces in PG(n,q) Cameron-Liebler sets of k-spaces were introduced recently by Y. Filmus and F.\nIhringer. We list several equivalent definitions for these Cameron-Liebler\nsets, by making a generalization of known results about Cameron-Liebler line\nsets in PG(n, q) and Cameron-Liebler sets of k-spaces in PG(2k + 1, q). We also\npresent a classification result.\n']","[('liebler sets', 0.6231690645217896), ('cameron liebler sets', 0.5839786529541016), ('liebler line classes', 0.48691168427467346), ('polar spaces', 0.43504729866981506), ('sets generators', 0.42141562700271606), ('projective spaces', 0.4131200611591339), ('dimensional projective space', 0.4029794931411743), ('projective subspaces', 0.40208402276039124), ('sets projective', 0.39951062202453613), ('cameron liebler line', 0.37910395860671997)]" 524,524,59,524_stability inverse source_inverse source problems_inverse scattering problems_stability inverse,"['stability inverse source', 'inverse source problems', 'inverse scattering problems', 'stability inverse', 'inverse boundary value', 'inverse boundary', 'inverse scattering', 'stability estimates', 'inverse obstacle', 'frequency inverse']","['Increasing stability for inverse acoustic source problems in the time\n domain This paper is concerned with inverse source problems for the acoustic wave\nequation in the full space R^3, where the source term is compactly supported in\nboth time and spatial variables. The main goal is to investigate increasing\nstability for the wave equation in terms of the interval length of given\nparameters (e.g., bandwith of the temporal component of the source function).\nWe establish increasing stability estimates of the L^2 -norm of the source\nfunction by using only the Dirichlet boundary data. Our method relies on the\nHuygens principle, the Fourier transform and explicit bounds for the\ncontinuation of analytic functions.\n', 'Increasing stability for inverse acoustic source problems In this paper, we show the increasing stability of the inverse source\nproblems for the acoustic wave equation in the full space R3.The goal is to\nunderstand increasing stability for wave equation in the time domain. If the\ntime and spatial variables of the source term can be separated with compact\nsupport, the increasing stability estimates of the $L^2$-norm of the acoustic\nsource function can be established. The stability estimates consist of two\nparts: the Lipschitz type data discrepancy and the high time tail of the source\nfunctions. As the time increases, the latter decreases and thus becomes\nnegligible.\n', 'Increasing stability for the inverse source problems in electrodynamics We are concerned with increasing stability in the inverse source problems for\nthe time-dependent Maxwell equations in R^3 , where the source term is\ncompactly supported in both time and spatial variables. By using the Fourier\ntransform, sharp bounds of the analytic continuation and the Huygens principle,\nincreasing stability estimates of the L^2 -norm of the source function are\nobtained. The main goal of this paper is to understand increasing stability for\nthe Maxwell equations in the time domain.\n']","[('stability inverse source', 0.5718381404876709), ('inverse source problems', 0.5328972339630127), ('inverse scattering problems', 0.5155634880065918), ('stability inverse', 0.5016095042228699), ('inverse boundary value', 0.4957756996154785), ('inverse boundary', 0.4864320456981659), ('inverse scattering', 0.4766538739204407), ('stability estimates', 0.46886521577835083), ('inverse obstacle', 0.4461193382740021), ('frequency inverse', 0.4458314776420593)]" 525,525,59,525_extreme value distribution_generalized extreme value_extreme value theory_extreme value analysis,"['extreme value distribution', 'generalized extreme value', 'extreme value theory', 'extreme value analysis', 'generalized extreme', 'extreme value', 'distribution estimators', 'heavy tailed distributions', 'multivariate extremes', 'distribution estimator']","['Smooth tail index estimation Both parametric distribution functions appearing in extreme value theory -\nthe generalized extreme value distribution and the generalized Pareto\ndistribution - have log-concave densities if the extreme value index gamma is\nin [-1,0]. Replacing the order statistics in tail index estimators by their\ncorresponding quantiles from the distribution function that is based on the\nestimated log-concave density leads to novel smooth quantile and tail index\nestimators. These new estimators aim at estimating the tail index especially in\nsmall samples. Acting as a smoother of the empirical distribution function, the\nlog-concave distribution function estimator reduces estimation variability to a\nmuch greater extent than it introduces bias. As a consequence, Monte Carlo\nsimulations demonstrate that the smoothed version of the estimators are well\nsuperior to their non-smoothed counterparts, in terms of mean squared error.\n', 'On tail inference in iid settings with nonnegative extreme value index In extreme value inference it is a fundamental problem how the target value\nis required to be extreme by the extreme value theory. In iid settings this\nstudy both theoretically and numerically compares tail estimators, which are\nbased on either or both of the extreme value theory and the nonparametric\nsmoothing. This study considers tail probability estimation and mean excess\nfunction estimation.\n This study assumes that the extreme value index of the underlying\ndistribution is nonnegative. Specifically, the Hall class or the Weibull class\nof distributions is supposed in order to obtain the convergence rates of the\nestimators. This study investigates the nonparametric kernel type estimators,\nthe fitting estimators to the generalized Pareto distribution and the plug-in\nestimators of the Hall distribution, which was proposed by Hall and Weissman\n(1997). In simulation studies the mean squared errors of the estimators in some\nfinite sample cases are compared.\n', 'Parametric and nonparametric probability distribution estimators of\n sample maximum Extreme value theory has constructed asymptotic properties of the sample\nmaximum. This study concerns probability distribution estimation of the sample\nmaximum. The traditional approach is parametric fitting to the limiting\ndistribution -- the generalized extreme value distribution; however, the model\nin non-limiting cases is misspecified to a certain extent. We propose a plug-in\ntype of nonparametric estimator that does not need model specification.\nAsymptotic properties of the distribution estimator are derived. The simulation\nstudy numerically investigates the relative performance in finite-sample cases.\n This study assumes that the underlying distribution of the original sample\nbelongs to one of the Hall class, the Weibull class or the bounded class, whose\ntypes of the limiting distributions are all different: the Frechet, Gumbel or\nWeibull. It is proven that the convergence rate of the parametric fitting\nestimator depends on both the extreme value index and the second-order\nparameter and gets slower as the extreme value index tends to zero. On the\nother hand, the rate of the nonparametric estimator is proven to be independent\nof the extreme value index under certain conditions. The numerical performances\nof the parametric fitting estimator and the nonparametric estimator are\ncompared, which shows that the nonparametric estimator performs better,\nespecially for the extreme value index close to zero. Finally, we report two\nreal case studies: the Potomac River peak stream flow (cfs) data and the Danish\nFire Insurance data.\n']","[('extreme value distribution', 0.7152676582336426), ('generalized extreme value', 0.6565033793449402), ('extreme value theory', 0.6266049146652222), ('extreme value analysis', 0.6093490719795227), ('generalized extreme', 0.5796033143997192), ('extreme value', 0.5416560173034668), ('distribution estimators', 0.5403727293014526), ('heavy tailed distributions', 0.5129364728927612), ('multivariate extremes', 0.5124903917312622), ('distribution estimator', 0.5022273659706116)]" 526,526,59,526_fading distribution_fading models_fading channels_fading parameters,"['fading distribution', 'fading models', 'fading channels', 'fading parameters', 'fading channel', 'arbitrary fading', 'nakagami fading', 'fading', 'mu fading', 'ftr fading']","['A Comprehensive Analysis of 5G Heterogeneous Cellular Systems operating\n over $\\kappa$-$\\mu$ Shadowed Fading Channels Emerging cellular technologies such as those proposed for use in 5G\ncommunications will accommodate a wide range of usage scenarios with diverse\nlink requirements. This will include the necessity to operate over a versatile\nset of wireless channels ranging from indoor to outdoor, from line-of-sight\n(LOS) to non-LOS, and from circularly symmetric scattering to environments\nwhich promote the clustering of scattered multipath waves. Unfortunately, many\nof the conventional fading models adopted in the literature to develop network\nmodels lack the flexibility to account for such disparate signal propagation\nmechanisms. To bridge the gap between theory and practical channels, we\nconsider $\\kappa$-$\\mu$ shadowed fading, which contains as special cases, the\nmajority of the linear fading models proposed in the open literature, including\nRayleigh, Rician, Nakagami-m, Nakagami-q, One-sided Gaussian, $\\kappa$-$\\mu$,\n$\\eta$-$\\mu$, and Rician shadowed to name but a few. In particular, we apply an\northogonal expansion to represent the $\\kappa$-$\\mu$ shadowed fading\ndistribution as a simplified series expression. Then using the series\nexpressions with stochastic geometry, we propose an analytic framework to\nevaluate the average of an arbitrary function of the SINR over $\\kappa$-$\\mu$\nshadowed fading channels. Using the proposed method, we evaluate the spectral\nefficiency, moments of the SINR, bit error probability and outage probability\nof a $K$-tier HetNet with $K$ classes of BSs, differing in terms of the\ntransmit power, BS density, shadowing characteristics and small-scale fading.\nBuilding upon these results, we provide important new insights into the network\nperformance of these emerging wireless applications while considering a diverse\nrange of fading conditions and link qualities.\n', 'The {\\kappa}-{\\mu} Shadowed Fading Model with Integer Fading Parameters We show that the popular and general {\\kappa}-{\\mu} shad- owed fading model\nwith integer fading parameters {\\mu} and m can be represented as a mixture of\nsquared Nakagami (or Gamma) distributions. Thus, its PDF and CDF can be\nexpressed in closed-form in terms of a finite number of elementary functions\n(powers and exponentials). The main implications arising from such connection\nare then discussed, which can be summarized as: (1) the performance evaluation\nof communication systems operating in {\\kappa}-{\\mu} shadowed fading becomes as\nsimple as if a Nakagami fading channel was assumed; (2) the {\\kappa}-{\\mu}\nshadowed distribution can be used to approximate the {\\kappa}-{\\mu}\ndistribution us- ing a closed-form representation in terms of elementary\nfunctions, by choosing a sufficiently large value of m; and (3) restricting the\nparameters {\\mu} and m to take integer values has limited impact in practice\nwhen fitting the {\\kappa}-{\\mu} shadowed fading model to field measurements. As\nan application example, the average channel capacity of communication systems\noperating under {\\kappa}-{\\mu} shadowed fading is obtained in closed-form.\n', 'The Multi-cluster Fluctuating Two-Ray Fading Model We introduce a new class of fading channels, built as the superposition of\ntwo fluctuating specular components with random phases, plus a clustering of\nscattered waves: the Multi-cluster Fluctuating Two-Ray (MFTR) fading channel.\nThe MFTR model emerges as a natural generalization of both the fluctuating\ntwo-ray (FTR) and the $\\kappa$-$\\mu$ shadowed fading models through a more\ngeneral yet equally mathematically tractable model. This generalization enables\nthe presence of additional multipath clusters in the purely ray-based FTR\nmodel, and the convenience of the new underlying fading channel model is\ndiscussed in depth. Then, we derive all the chief probability functions of the\nMFTR model (e.g., probability density function (PDF), cumulative density\nfunction (CDF), and moment generation function) in closed-form, having {a\nmathematical complexity similar to} other fading models in the\nstate-of-the-art. We also provide two additional analytical formulations for\nthe PDF and the CDF: (i) in terms of a continuous mixture of $\\kappa$-$\\mu$\nshadowed distributions, and (ii) as an infinite discrete mixture of Gamma\ndistributions. Such expressions enable to conduct performance analysis under\nMFTR fading by directly leveraging readily available results for the\n$\\kappa$-$\\mu$ shadowed or Nakagami-$m$ cases, respectively. The performance of\nwireless communications systems undergoing MFTR fading is exemplified in terms\nof a classical benchmarking metric like the outage probability, both in exact\nand asymptotic forms, and the amount of fading.\n']","[('fading distribution', 0.6712777018547058), ('fading models', 0.661210834980011), ('fading channels', 0.6384114027023315), ('fading parameters', 0.635501503944397), ('fading channel', 0.6275188326835632), ('arbitrary fading', 0.6077556610107422), ('nakagami fading', 0.48504239320755005), ('fading', 0.47777217626571655), ('mu fading', 0.44885388016700745), ('ftr fading', 0.4028159976005554)]" 527,527,59,527_reductive algebraic groups_connected reductive subgroup_reductive algebraic group_connected reductive group,"['reductive algebraic groups', 'connected reductive subgroup', 'reductive algebraic group', 'connected reductive group', 'reductive groups', 'reductive subgroup', 'reductive group', 'reductive groups let', 'split reductive groups', 'connected reductive algebraic']","['Jordan classes and Lusztig strata in disconnected reductive groups Let $G$ be a non-connected reductive algebraic group over an algebraically\nclosed field $\\mathbb{K}$ and let $D$ be a connected component of $G$. We\ninvestigate Jordan classes of $D$ and we obtain a description of the regular\npart of the closure of a Jordan class in terms of induction of\n$G^{\\circ}$-orbits. We use this result to show that Lusztig strata in a\nnon-connected reductive algebraic group are locally closed.\n', 'Complete reducibility in bad characteristic Let $G$ be a simple algebraic group of exceptional type over an algebraically\nclosed field of characteristic $p > 0$. This paper continues a long-standing\neffort to classify the connected reductive subgroups of $G$. Having previously\ncompleted the classification when $p$ is sufficiently large, we focus here on\nthe case that $p$ is bad for $G$. We classify the connected reductive subgroups\nof $G$ which are not $G$-completely reducible, whose simple components have\nrank at least $3$. For each such subgroup $X$, we determine the action of $X$\non the adjoint module $L(G)$ and on a minimal non-trivial $G$-module, and the\nconnected centraliser of $X$ in $G$. As corollaries we obtain information on:\nsubgroups which are maximal among connected reductive subgroups; products of\ncommuting $G$-completely reducible subgroups; subgroups with trivial connected\ncentraliser; and subgroups which act indecomposably on an adjoint or minimal\nmodule for $G$.\n', ""Complete reducibility of subgroups of reductive algebraic groups over\n nonperfect fields IV: An $F_4$ example Let $k$ be a nonperfect separably closed field. Let $G$ be a connected\nreductive algebraic group defined over $k$. We study rationality problems for\nSerre's notion of complete reducibility of subgroups of $G$. In particular, we\npresent the first example of a connected nonabelian $k$-subgroup $H$ of $G$\nthat is $G$-completely reducible but not $G$-completely reducible over $k$, and\nthe first example of a connected nonabelian $k$-subgroup $H'$ of $G$ that is\n$G$-completely reducible over $k$ but not $G$-completely reducible. This is\nnew: all previously known such examples are for finite (or non-connected) $H$\nand $H'$ only.\n""]","[('reductive algebraic groups', 0.6985800862312317), ('connected reductive subgroup', 0.6702807545661926), ('reductive algebraic group', 0.6694273352622986), ('connected reductive group', 0.6497764587402344), ('reductive groups', 0.6456801295280457), ('reductive subgroup', 0.6451141834259033), ('reductive group', 0.6098848581314087), ('reductive groups let', 0.6022993922233582), ('split reductive groups', 0.5917857885360718), ('connected reductive algebraic', 0.5614116191864014)]" 528,528,59,528_mmwave mimo_hybrid massive mimo_mmwave communications_mmwave systems,"['mmwave mimo', 'hybrid massive mimo', 'mmwave communications', 'mmwave systems', 'millimeter wave mmwave', 'massive mimo systems', 'massive mimo', 'millimeter wave massive', 'millimeter wave', 'hybrid beamforming']","['Partially-Connected Hybrid Beamforming for Spectral Efficiency\n Maximization via a Weighted MMSE Equivalence Hybrid beamforming (HBF) is an attractive technology for practical massive\nmultiple-input and multiple-output (MIMO) millimeter wave (mmWave) systems.\nCompared with the fully-connected HBF architecture, the partially-connected one\ncan further reduce the hardware cost and power consumption. However, the\nspecial block diagonal structure of its analog beamforming matrix brings\nadditional design challenges. In this paper, we develop effective HBF\nalgorithms for spectral efficiency maximization (SEM) in mmWave massive MIMO\nsystems with the partially-connected architecture. One main contribution is\nthat we prove the equivalence of the SEM problem and a matrix weighted sum mean\nsquare error minimization (WMMSE) problem, which leads to a convenient\nalgorithmic approach to directly tackle the SEM problem. Specifically, we\ndecompose the equivalent WMMSE problem into the hybrid precoding and hybrid\ncombining subproblems, for which both the optimal digital precoder and combiner\nhave closed-form solutions. For the more challenging analog precoder and\ncombiner, we propose an element iteration based algorithm and a manifold\noptimization based algorithm. Finally, the hybrid precoder and combiner are\nalternatively updated. The overall HBF algorithms are proved to monotonously\nincrease the spectral efficiency and converge. Furthermore, we also propose\nmodified algorithms with reduced computational complexity and finite-resolution\nphase shifters. Simulation results demonstrate that the proposed HBF algorithms\nachieve significant performance gains over conventional algorithms.\n', 'Beamspace Precoding and Beam Selection for Wideband Millimeter-Wave MIMO\n Relying on Lens Antenna Arrays Millimeter-wave (mmWave) multiple-input multiple-out (MIMO) systems relying\non lens antenna arrays are capable of achieving a high antenna-gain at a\nconsiderably reduced number of radio frequency (RF) chains via beam selection.\nHowever, the traditional beam selection network suffers from significant\nperformance loss in wideband systems due to the effect of beam squint. In this\npaper, we propose a phase shifter-aided beam selection network, which enables a\nsingle RF chain to support multiple focused-energy beams, for mitigating the\nbeam squint in wideband mmWave MIMO systems. Based on this architecture, we\nadditionally design an efficient transmit precoder (TPC) for maximizing the\nachievable sum-rate, which is composed of beam selection and beamspace\nprecoding. Specifically, we decouple the design problems of beamspace precoding\nand beam selection by exploiting the fact that the beam selection matrix has a\nlimited number of candidates. For the beamspace precoding design, we propose a\nsuccessive interference cancellation (SIC)-based method, which decomposes the\nassociated optimization problem into a series of subproblems and solves them\nsuccessively. For the beam selection design, we propose an energy-max beam\nselection method for avoiding the high complexity of exhaustive search, and\nderive the number of required beams for striking an attractive trade-off\nbetween the hardware cost and system performance. Our simulation results show\nthat the proposed beamspace precoding and beam selection methods achieve both a\nhigher sum-rate and a higher energy efficiency than its conventional\ncounterparts.\n', 'Practical Hybrid Beamforming for Millimeter Wave Massive MIMO Full\n Duplex with Limited Dynamic Range Full Duplex (FD) radio has emerged as a promising solution to increase the\ndata rates by up to a factor of two via simultaneous transmission and reception\nin the same frequency band. This paper studies a novel hybrid beamforming\n(HYBF) design to maximize the weighted sum-rate (WSR) in a single-cell\nmillimeter wave (mmWave) massive multiple-input-multiple-output (mMIMO) FD\nsystem. Motivated by practical considerations, we assume that the multi-antenna\nusers and hybrid FD base station (BS) suffer from the limited dynamic range\n(LDR) noise due to non-ideal hardware and an impairment aware HYBF approach is\nadopted by integrating the traditional LDR noise model in the mmWave band. In\ncontrast to the conventional HYBF schemes, our design also considers the joint\nsum-power and the practical per-antenna power constraints. A novel\ninterference, self-interference (SI) and LDR noise aware optimal power\nallocation scheme for the uplink (UL) users and FD BS is also presented to\nsatisfy the joint constraints. The maximum achievable gain of a multi-user\nmmWave FD system over a fully digital half duplex (HD) system with different\nLDR noise levels and numbers of the radio-frequency (RF) chains is\ninvestigated. Simulation results show that our design outperforms the HD system\nwith only a few RF chains at any LDR noise level. The advantage of having\namplitude control at the analog stage is also examined, and additional gain for\nthe mmWave FD system becomes evident when the number of RF chains at the hybrid\nFD BS is small.\n']","[('mmwave mimo', 0.5896348357200623), ('hybrid massive mimo', 0.5877441167831421), ('mmwave communications', 0.5753423571586609), ('mmwave systems', 0.5725988745689392), ('millimeter wave mmwave', 0.5672420263290405), ('massive mimo systems', 0.5625055432319641), ('massive mimo', 0.5482810735702515), ('millimeter wave massive', 0.5427452325820923), ('millimeter wave', 0.5364566445350647), ('hybrid beamforming', 0.520703136920929)]" 529,529,58,529_vector approximate message_generalized approximate message_compressed sensing_approximate message passing,"['vector approximate message', 'generalized approximate message', 'compressed sensing', 'approximate message passing', 'optimal orthogonal', 'signal estimation', 'sensing matrices', 'signal recovery', 'vector approximate', 'message passing algorithms']","[""Memory AMP Approximate message passing (AMP) is a low-cost iterative\nparameter-estimation technique for certain high-dimensional linear systems with\nnon-Gaussian distributions. AMP only applies to independent identically\ndistributed (IID) transform matrices, but may become unreliable (e.g., perform\npoorly or even diverge) for other matrix ensembles, especially for\nill-conditioned ones. To solve this issue, orthogonal/vector AMP (OAMP/VAMP)\nwas proposed for general right-unitarily-invariant matrices. However, the\nBayes-optimal OAMP/VAMP (BO-OAMP/VAMP) requires a high-complexity linear\nminimum mean square error (MMSE) estimator. This prevents OAMP/VAMP from being\nused in large-scale systems.\n To address the drawbacks of AMP and BO-OAMP/VAMP, this paper offers a memory\nAMP (MAMP) framework based on the orthogonality principle, which ensures that\nestimation errors in MAMP are asymptotically IID Gaussian. To realize the\nrequired orthogonality for MAMP, we provide an orthogonalization procedure for\nthe local memory estimators. In addition, we propose a Bayes-optimal MAMP\n(BO-MAMP), in which a long-memory matched filter is used for interference\nsuppression. The complexity of BO-MAMP is comparable to AMP. To asymptotically\ncharacterize the performance of BO-MAMP, a state evolution is derived. The\nrelaxation parameters and damping vector in BO-MAMP are optimized based on\nstate evolution. Most crucially, the state evolution of the optimized BO-MAMP\nconverges to the same fixed point as that of the high-complexity BO-OAMP/VAMP\nfor all right-unitarily-invariant matrices, and achieves the Bayes optimal MSE\npredicted by the replica method if its state evolution has a unique fixed\npoint. Finally, simulations are provided to verify the theoretical results'\nvalidity and accuracy.\n"", 'A Concise Tutorial on Approximate Message Passing High-dimensional signal recovery of standard linear regression is a key\nchallenge in many engineering fields, such as, communications, compressed\nsensing, and image processing. The approximate message passing (AMP) algorithm\nproposed by Donoho \\textit{et al} is a computational efficient method to such\nproblems, which can attain Bayes-optimal performance in independent identical\ndistributed (IID) sub-Gaussian random matrices region. A significant feature of\nAMP is that the dynamical behavior of AMP can be fully predicted by a scalar\nequation termed station evolution (SE). Although AMP is optimal in IID\nsub-Gaussian random matrices, AMP may fail to converge when measurement matrix\nis beyond IID sub-Gaussian. To extend the region of random measurement matrix,\nan expectation propagation (EP)-related algorithm orthogonal AMP (OAMP) was\nproposed, which shares the same algorithm with EP, expectation consistent (EC),\nand vector AMP (VAMP). This paper aims at giving a review for those algorithms.\nWe begin with the worst case, i.e., least absolute shrinkage and selection\noperator (LASSO) inference problem, and then give the detailed derivation of\nAMP derived from message passing. Also, in the Bayes-optimal setting, we give\nthe Bayes-optimal AMP which has a slight difference from AMP for LASSO. In\naddition, we review some AMP-related algorithms: OAMP, VAMP, and Memory AMP\n(MAMP), which can be applied to more general random matrices.\n', 'Memory Approximate Message Passing Approximate message passing (AMP) is a low-cost iterative\nparameter-estimation technique for certain high-dimensional linear systems with\nnon-Gaussian distributions. However, AMP only applies to independent\nidentically distributed (IID) transform matrices, but may become unreliable for\nother matrix ensembles, especially for ill-conditioned ones. To handle this\ndifficulty, orthogonal/vector AMP (OAMP/VAMP) was proposed for general\nright-unitarily-invariant matrices. However, the Bayes-optimal OAMP/VAMP\nrequires high-complexity linear minimum mean square error estimator. To solve\nthe disadvantages of AMP and OAMP/VAMP, this paper proposes a memory AMP\n(MAMP), in which a long-memory matched filter is proposed for interference\nsuppression. The complexity of MAMP is comparable to AMP. The asymptotic\nGaussianity of estimation errors in MAMP is guaranteed by the orthogonality\nprinciple. A state evolution is derived to asymptotically characterize the\nperformance of MAMP. Based on the state evolution, the relaxation parameters\nand damping vector in MAMP are optimized. For all right-unitarily-invariant\nmatrices, the optimized MAMP converges to OAMP/VAMP, and thus is Bayes-optimal\nif it has a unique fixed point. Finally, simulations are provided to verify the\nvalidity and accuracy of the theoretical results.\n']","[('vector approximate message', 0.5316614508628845), ('generalized approximate message', 0.4936504364013672), ('compressed sensing', 0.48419004678726196), ('approximate message passing', 0.47763141989707947), ('optimal orthogonal', 0.44967764616012573), ('signal estimation', 0.4291739761829376), ('sensing matrices', 0.4233035743236542), ('signal recovery', 0.419937402009964), ('vector approximate', 0.4159371852874756), ('message passing algorithms', 0.40895000100135803)]" 530,530,58,530_hilbert schemes points_hilbert scheme points_points hilbert scheme_hilbert schemes,"['hilbert schemes points', 'hilbert scheme points', 'points hilbert scheme', 'hilbert schemes', 'hilbert scheme', 'punctual hilbert schemes', 'schemes points', 'schemes points mathbb', 'scheme points', 'points hilbert']","['Irrational components of the Hilbert scheme of points We construct irrational irreducible components of the Hilbert scheme of\npoints of affine n-dimensional space, for n at least 12. We start with\nirrational components of the Hilbert scheme of curves in P^3 and use methods\ndeveloped by Jelisiejew to relate these to irreducible components of the\nHilbert schemes of points of A^n. The result solves Problem XX of [J.\nJelisiejew, Open problems in deformations of Artinian algebras, Hilbert schemes\nand around, arXiv:2307.08777, 2023].\n', 'Unexpected but recurrent phenomena for Quot and Hilbert schemes of\n points We investigate some aspects of the geometry of two classical generalisations\nof the Hilbert schemes of points. Precisely, we show that parity conjecture for\n$\\text{Quot}_r^d\\mathbb{A}^3$ already fails for $d=8$ and $r=2$ and that lots\nof the elementary components of the nested Hilbert schemes of points on smooth\nquasi-projective varieties of dimension at least 4 are generically non-reduced.\nWe also deduce that nested Hilbert schemes of points on smooth surfaces have\ngenerically non-reduced components. Finally, we give an infinite family of\nelementary components of the classical Hilbert schemes of points.\n', 'Hilbert schemes of points and Fulton-MacPherson compactifications We relate Hilbert schemes of points and Fulton-MacPherson compactifications\nby an interpolating stability condition. We then derive wall-crossings formulas\nand some applications for the enumerative geometry of Hilbert schemes.\n']","[('hilbert schemes points', 0.8351036906242371), ('hilbert scheme points', 0.8229315280914307), ('points hilbert scheme', 0.8010462522506714), ('hilbert schemes', 0.789676308631897), ('hilbert scheme', 0.7458274960517883), ('punctual hilbert schemes', 0.730219841003418), ('schemes points', 0.6911960244178772), ('schemes points mathbb', 0.6519202589988708), ('scheme points', 0.6036329865455627), ('points hilbert', 0.5883411169052124)]" 531,531,58,531_supersymmetric field theory_supersymmetric field_supersymmetric_supersymmetries,"['supersymmetric field theory', 'supersymmetric field', 'supersymmetric', 'supersymmetries', 'cal supersymmetric', 'supergravity', 'supersymmetry', 'mathcal superconformal', 'superconformal', 'mathcal super yang']","['$\\mathcal{N}=3$ conformal superspace in four dimensions We develop a superspace formulation for ${\\cal N}=3$ conformal supergravity\nin four spacetime dimensions as a gauge theory of the superconformal group\n$\\mathsf{SU}(2,2|3)$. Upon imposing certain covariant constraints, the algebra\nof conformally covariant derivatives $\\nabla_A =\n(\\nabla_a,\\nabla_\\alpha^i,\\bar{\\nabla}_i^{\\dot \\alpha})$ is shown to be\ndetermined in terms of a single primary chiral spinor superfield, the\nsuper-Weyl spinor $W_\\alpha$ of dimension $+1/2$ and its conjugate. Associated\nwith $W_\\alpha$ is its primary descendant $B^i{}_j$ of dimension $+2$, the\nsuper-Bach tensor, which determines the equation of motion for conformal\nsupergravity. As an application of this construction, we present two different\nbut equivalent action principles for ${\\cal N}=3$ conformal supergravity. We\ndescribe the model for linearised $\\mathcal{N}=3$ conformal supergravity in an\narbitrary conformally flat background and demonstrate that it possesses\n$\\mathsf{U}(1)$ duality invariance. Additionally, upon degauging certain local\nsymmetries, our superspace geometry is shown to reduce to the $\\mathsf{U}(3)$\nsuperspace constructed by Howe more than four decades ago. Further degauging\nproves to lead to a new superspace formalism, called $\\mathsf{SU}(3) $\nsuperspace, which can also be used to describe ${\\mathcal N}=3$ conformal\nsupergravity. Our conformal superspace setting opens up the possibility to\nformulate the dynamics of the off-shell ${\\mathcal N}=3$ super Yang-Mills\ntheory coupled to conformal supergravity.\n', ""Superspace approaches to $\\mathcal{N}=1$ supergravity The superspace formalism for $\\mathcal{N}=1$ supergravity in four dimensions\nis a powerful geometric setting to engineer off-shell supergravity-matter\ntheories, including higher-derivative couplings. This review provides a unified\ndescription of the three superspace approaches to $\\mathcal{N}=1$ conformal\nsupergravity: (i) conformal superspace; (ii) $\\mathsf{U}(1)$ superspace; and\n(iii) the Grimm-Wess-Zumino formalism. The prepotential formulation for the\nlatter is discussed. We briefly describe the known off-shell formulations for\nPoincar\\'e and anti-de Sitter supergravity theories as conformal supergravity\ncoupled to certain compensators. As simple applications of the formalism, we\npresent the superfield equations of motion for various off-shell formulations\nfor pure Poincar\\'e and anti-de Sitter supergravity, and show that every\nsolution of these equations is also a solution of the equations of motion for\nconformal supergravity.\n"", 'Covariant superspace approaches to ${\\cal N}=2$ supergravity We provide a unified description of the three covariant superspace approaches\nto ${\\cal N}=2$ conformal supergravity in four dimensions: (i) conformal\nsuperspace; (ii) $\\mathsf{U}(2)$ superspace; and (iii) $\\mathsf{SU}(2)$\nsuperspace. Each of them can be used to formulate general supergravity-matter\nsystems, although conformal superspace has the largest structure group and is\nintimately related to the superconformal tensor calculus. We review the\nstructure of covariant projective multiplets and demonstrate how they are used\nto describe pure and matter-coupled supergravity, including locally\nsuperconformal off-shell sigma models. Higher-derivative invariants,\ntopological invariants and super-Weyl anomalies are also briefly discussed.\n']","[('supersymmetric field theory', 0.6267067790031433), ('supersymmetric field', 0.5848659873008728), ('supersymmetric', 0.5704357624053955), ('supersymmetries', 0.5678916573524475), ('cal supersymmetric', 0.5578714609146118), ('supergravity', 0.5469289422035217), ('supersymmetry', 0.5445941686630249), ('mathcal superconformal', 0.519738495349884), ('superconformal', 0.4867018759250641), ('mathcal super yang', 0.4832058548927307)]" 532,532,58,532_bundles moduli space_moduli vector bundles_bundles moduli_bundle moduli,"['bundles moduli space', 'moduli vector bundles', 'bundles moduli', 'bundle moduli', 'stable bundles', 'bundles curves', 'moduli spaces stable', 'stable vector bundles', 'moduli space stable', 'bundles surfaces']","[""Positivity of the Poincar\\'e bundle on the moduli space of vector\n bundles and its applications We prove that the normalized Poincar\\'e bundle on the moduli space of stable\nrank $r$ vector bundles with a fixed determinant on a smooth projective curve\n$X$ induces a family of nef vector bundles on the moduli space. Two\napplications follow. We show that when the genus of $X$ is large, the derived\ncategory of $X$ is embedded into the derived category of the moduli space for\narbitrary rank and coprime degree, which extends the results of Narasimhan,\nFonarev-Kuznetsov, and Belmans-Mukhopadhyay. As the second application, we\nconstruct a family of ACM bundles on the moduli space. A key ingredient of our\nproof is the investigation of birational geometry of the moduli spaces of\nparabolic bundles.\n"", 'Universal Chern classes on the moduli of bundles The goal of this paper is to construct universal cohomology classes on the\nmoduli space of stable bundles over a curve when it is not a fine moduli space,\ni.e. when the rank and degree are not coprime. More precisely, we show that\ncertain Chern classes of the universal bundle on the product of the curve with\nthe moduli stack of bundles lift to the product of the curve with the moduli\nspace of stable bundles.\n', 'Projectivity of good moduli spaces of vector bundles on stacky curves Moduli of vector bundles on stacky curves behave similarly to moduli of\nvector bundles on curves, except there are additional numerical invariants\ngiving many different notions of stability. We apply the existence criterion\nfor good moduli spaces of stacks to show that the moduli stack of semistable\nvector bundles on a stacky curve has a proper good moduli space. We\nmoduli-theoretically prove that a natural determinantal line bundle on this\nmoduli space is ample, thus proving this moduli space is projective. Our\nmethods give effective bounds for when a power of this line bundle is\nbasepoint-free. As a special case, we obtain new and effective constructions of\nmoduli spaces of parabolic bundles.\n']","[('bundles moduli space', 0.7735928893089294), ('moduli vector bundles', 0.7666133642196655), ('bundles moduli', 0.762732744216919), ('bundle moduli', 0.716746985912323), ('stable bundles', 0.6936160326004028), ('bundles curves', 0.6801590323448181), ('moduli spaces stable', 0.6781517267227173), ('stable vector bundles', 0.6686015129089355), ('moduli space stable', 0.646569550037384), ('bundles surfaces', 0.6398494839668274)]" 533,533,58,533_steiner triple systems_steiner triple system_steiner quadruple system_steiner quadruple,"['steiner triple systems', 'steiner triple system', 'steiner quadruple system', 'steiner quadruple', 'steiner systems', 'steiner triple', 'steiner system', 'steiner', 'triple systems', 'triple system']","['Almost all Steiner triple systems have perfect matchings We show that for any n divisible by 3, almost all order-n Steiner triple\nsystems have a perfect matching (also known as a parallel class or resolution\nclass). In fact, we prove a general upper bound on the number of perfect\nmatchings in a Steiner triple system and show that almost all Steiner triple\nsystems essentially attain this maximum. We accomplish this via a general\ntheorem comparing a uniformly random Steiner triple system to the outcome of\nthe triangle removal process, which we hope will be useful for other problems.\nOur methods can also be adapted to other types of designs; for example, we\nsketch a proof of the theorem that almost all Latin squares have transversals.\n', 'Extensions of Steiner Triple Systems In this article we study extensions of Steiner triple systems by means of the\nassociated Steiner loops. We recognize that the set of Veblen points of a\nSteiner triple system corresponds to the center of the Steiner loop. We\ninvestigate extensions of Steiner loops, focusing in particular on the case of\nSchreier extensions, which provide a powerful method for constructing Steiner\ntriple systems containing Veblen points.\n', 'The number of the non-full-rank Steiner triple systems The $p$-rank of a Steiner triple system $B$ is the dimension of the linear\nspan of the set of characteristic vectors of blocks of $B$, over GF$(p)$. We\nderive a formula for the number of different Steiner triple systems of order\n$v$ and given $2$-rank $r_2$, $r_20$. When $\\alpha=\\infty$,\nthese inequalities can be seen as quadratic generalizations of the classical\nBernstein and Bennett inequalities for sparse bounded random vectors. To\nestablish this quadratic generalization, we also develop new Bersntein-type and\nBennett-type inequalities for linear forms of sparse $\\alpha$-subexponential\nrandom variables that go beyond the bounded case $(\\alpha=\\infty)$. Our proof\nrelies on a novel combinatorial method for estimating the moments of both\nrandom linear forms and quadratic forms.\n We present two key applications of these new sparse Hanson-Wright\ninequalities: (1) A local law and complete eigenvector delocalization for\nsparse $\\alpha$-subexponential Hermitian random matrices, generalizing the\nresult of He et al. (2019) beyond sparse Bernoulli random matrices. To the best\nof our knowledge, this is the first local law and complete delocalization\nresult for sparse $\\alpha$-subexponeitial random matrices down to the\nnear-optimal sparsity $p\\geq \\frac{\\mathrm{polylog}(n)}{n}$ when $\\alpha\\in\n(0,2)$ as well as for unbounded sparse sub-gaussian random matrices down to the\noptimal sparsity $p\\gtrsim \\frac{\\log n}{n}.$ (2) Concentration of the\nEuclidean norm for the linear transformation of a sparse\n$\\alpha$-subexponential random vector, improving on the results of G\\""otze et\nal. (2021) for sparse sub-exponential random vectors.\n', 'A note on the improved sparse Hanson-Wright inequalities In this paper, we establish sparse Hanson-Wright inequalities for quadratic forms of sparse $\\alpha$-sub-exponential random vectors where $\\alpha \\in (0,2]$. When only considering the regime $0 < \\alpha \\leq 1$, we derive a sharper sparse Hanson-Wright inequality that achieves optimality in certain special cases. These results generalize some classical Hanson-Wright inequalities without sparse structure.']","[('hanson wright inequality', 0.6652339100837708), ('wright inequality', 0.5363143086433411), ('matrix concentration inequalities', 0.535497784614563), ('inequalities gaussian', 0.5314407348632812), ('concentration inequality', 0.46162497997283936), ('moment inequalities', 0.4512241780757904), ('concentration inequalities', 0.43929582834243774), ('deviation inequality', 0.41865620017051697), ('norm concentration', 0.41285794973373413), ('sub gaussian', 0.41162869334220886)]" 539,539,57,539_inventory management_inventory models_inventory control_stochastic demand,"['inventory management', 'inventory models', 'inventory control', 'stochastic demand', 'inventory systems', 'inventory', 'stochastic dynamic programming', 'inventory levels', 'initial inventory', 'demand process']","['Asymptotically Optimal Inventory Control for Assemble-to-Order Systems We consider Assemble-to-Order (ATO) inventory systems with a general Bill of\nMaterials and general deterministic lead times. Unsatisfied demands are always\nbacklogged. We apply a four-step asymptotic framework to develop inventory\npolicies for minimizing the long-run average expected total inventory cost. Our\napproach features a multi-stage Stochastic Program (SP) to establish a lower\nbound on the inventory cost and determine parameter values for inventory\ncontrol. Our replenishment policy deviates from the conventional constant base\nstock policies to accommodate non-identical lead times. Our component\nallocation policy differentiates demands based on backlog costs, Bill of\nMaterials, and component availabilities. We prove that our policy is\nasymptotically optimal on the diffusion scale, that is, as the longest lead\ntime grows, the percentage difference between the average cost under our policy\nand its lower bound converges to zero. In developing these results, we\nformulate a broad Stochastic Tracking Model and prove general convergence\nresults from which the asymptotic optimality of our policy follows as\nspecialized corollaries.\n', 'Inventory Management Under Stochastic Demand: A Simulation-Optimization\n Approach This study presents a comprehensive approach to optimizing inventory\nmanagement under stochastic demand by leveraging Monte Carlo Simulation (MCS)\nwith grid search and Bayesian optimization. By using a business case of\nhistorical demand data and through the comparison of periodic review (p, Q) and\ncontinuous review (r, Q) inventory policies, it demonstrates that the (r, Q)\npolicy significantly increases expected profit by dynamically managing\ninventory levels based on daily demand and lead time considerations. The\nintegration of random and conditional sampling techniques highlights critical\nperiods of high demand, providing deeper insights into demand patterns. While\nconditional sampling reduces execution time, it yields slightly lower profits\ncompared to random sampling. Though Bayesian optimization marginally\noutperforms grid search in identifying optimal reorder quantities and points,\nhowever, given the stochastic nature of the algorithm, this can change with\nmultiple runs. This study accentuates the effectiveness of advanced simulation\nand optimization techniques in addressing complex inventory challenges,\nultimately supporting more informed and profitable inventory management\ndecisions. The simulation model and optimization framework are open-source and\nwritten in Python, promoting transparency and enabling other researchers and\npractitioners to replicate and build upon this work. This contributes to the\nadvancement of knowledge and the development of more effective inventory\nmanagement solutions.\n', 'Exploiting random lead times for significant inventory cost savings We study the classical single-item inventory system in which unsatisfied\ndemands are backlogged. Replenishment lead times are random, independent\nidentically distributed, causing orders to cross in time. We develop a new\ninventory policy to exploit implications of lead time randomness and order\ncrossover, and evaluate its performance by asymptotic analysis and simulations.\nOur policy does not follow the basic principle of Constant Base Stock (CBS)\npolicy, or more generally, (s,S) and (r,Q) policies, which is to keep the\ninventory position within a fixed range. Instead, it uses the current inventory\nlevel (= inventory-on-hand minus backlog) to set a dynamic target for inventory\nin-transit, and place orders to follow this target. Our policy includes CBS\npolicy as a special case, under a particular choice of a policy parameter. We\nshow that our policy can significantly reduce the average inventory cost\ncompared with CBS policy. Specifically, we prove that if the lead time is\nexponentially distributed, then under our policy, with properly chosen policy\nparameters, the expected (absolute) inventory level scales as $o(\\sqrt{r})$, as\nthe demand rate $r\\to\\infty$. In comparison, it is known to scale as\n$\\Theta(\\sqrt{r})$ under CBS policy. In particular, this means that, as\n$r\\to\\infty$, the average inventory cost under our policy vanishes in\ncomparison with that under CBS policy. Furthermore, our simulations show that\nthe advantage of our policy remains to be substantial under non-exponential\nlead time distributions, and may even be greater than under exponential\ndistribution. We also use simulations to compare GBS to an optimal policy for\nsome cases where computing the optimal cost is tractable. The results show that\nour policy removes a majority of excess costs of CBS policy over the minimum\ncost, leading to much smaller optimality gaps.\n']","[('inventory management', 0.6054854393005371), ('inventory models', 0.5932982563972473), ('inventory control', 0.5823553800582886), ('stochastic demand', 0.5450937747955322), ('inventory systems', 0.544512152671814), ('inventory', 0.511051595211029), ('stochastic dynamic programming', 0.47663700580596924), ('inventory levels', 0.45930203795433044), ('initial inventory', 0.4562068581581116), ('demand process', 0.44768646359443665)]" 540,540,56,540_quantum relative entropy_quantum entropy_entropy quantum_quantum information theory,"['quantum relative entropy', 'quantum entropy', 'entropy quantum', 'quantum information theory', 'information quantum', 'quantum information', 'von neumann entropy', 'enyi divergences', 'enyi divergence', 'inequality quantum']","[""The strong converse exponent of discriminating infinite-dimensional\n quantum states The sandwiched R\\'enyi divergences of two finite-dimensional density\noperators quantify their asymptotic distinguishability in the strong converse\ndomain. This establishes the sandwiched R\\'enyi divergences as the\noperationally relevant ones among the infinitely many quantum extensions of the\nclassical R\\'enyi divergences for R\\'enyi parameter $\\alpha>1$. The known proof\nof this goes by showing that the sandwiched R\\'enyi divergence coincides with\nthe regularized measured R\\'enyi divergence, which in turn is proved by\nasymptotic pinching, a fundamentally finite-dimensional technique. Thus, while\nthe notion of the sandwiched R\\'enyi divergences was extended recently to\ndensity operators on an infinite-dimensional Hilbert space (even for states of\na von Neumann algebra), these quantities were so far lacking an operational\ninterpretation similar to the finite-dimensional case, and it has also been\nopen whether they coincide with the regularized measured R\\'enyi divergences.\nIn this paper we fill this gap by answering both questions in the positive for\ndensity operators on an infinite-dimensional Hilbert space, using a simple\nfinite-dimensional approximation technique.\n We also initiate the study of the sandwiched R\\'enyi divergences, and the\nrelated problem of the strong converse exponent, for pairs of positive\nsemi-definite operators that are not necessarily trace-class. This is\ninteresting from the purely mathematical point of view of extending the concept\nof R\\'enyi (and other) divergences to settings beyond the standard one of\npositive trace-class operators (positive normal functionals in the von Neumann\nalgebra setting). In this spirit, we also discuss the definition and some\nproperties of the more general family of R\\'enyi $(\\alpha,z)$-divergences of\npositive semi-definite operators on an infinite-dimensional separable Hilbert\nspace.\n"", ""Quantum R\\'enyi divergences and the strong converse exponent of state\n discrimination in operator algebras The sandwiched R\\'enyi $\\alpha$-divergences of two finite-dimensional quantum\nstates play a distinguished role among the many quantum versions of R\\'enyi\ndivergences as the tight quantifiers of the trade-off between the two error\nprobabilities in the strong converse domain of state discrimination. In this\npaper we show the same for the sandwiched R\\'enyi divergences of two normal\nstates on an injective von Neumann algebra, thereby establishing the\noperational significance of these quantities. Moreover, we show that in this\nsetting, again similarly to the finite-dimensional case, the sandwiched R\\'enyi\ndivergences coincide with the regularized measured R\\'enyi divergences, another\ndistinctive feature of the former quantities. Our main tool is an approximation\ntheorem (martingale convergence) for the sandwiched R\\'enyi divergences, which\nmay be used for the extension of various further results from the\nfinite-dimensional to the von Neumann algebra setting.\n We also initiate the study of the sandwiched R\\'enyi divergences of pairs of\nstates on a $C^*$-algebra, and show that the above operational interpretation,\nas well as the equality to the regularized measured R\\'enyi divergence, holds\nmore generally for pairs of states on a nuclear $C^*$-algebra.\n"", ""Optimized quantum f-divergences The quantum relative entropy is a measure of the distinguishability of two\nquantum states, and it is a unifying concept in quantum information theory:\nmany information measures such as entropy, conditional entropy, mutual\ninformation, and entanglement measures can be realized from it. As such, there\nhas been broad interest in generalizing the notion to further understand its\nmost basic properties, one of which is the data processing inequality. The\nquantum f-divergence of Petz is one generalization of the quantum relative\nentropy, and it also leads to other relative entropies, such as the Petz--Renyi\nrelative entropies. In this contribution, I introduce the optimized quantum\nf-divergence as a related generalization of quantum relative entropy. I prove\nthat it satisfies the data processing inequality, and the method of proof\nrelies upon the operator Jensen inequality, similar to Petz's original\napproach. Interestingly, the sandwiched Renyi relative entropies are particular\nexamples of the optimized f-divergence. Thus, one benefit of this approach is\nthat there is now a single, unified approach for establishing the data\nprocessing inequality for both the Petz--Renyi and sandwiched Renyi relative\nentropies, for the full range of parameters for which it is known to hold.\n""]","[('quantum relative entropy', 0.6298792362213135), ('quantum entropy', 0.5938050746917725), ('entropy quantum', 0.5891563892364502), ('quantum information theory', 0.5836425423622131), ('information quantum', 0.5596954822540283), ('quantum information', 0.5519769787788391), ('von neumann entropy', 0.5374349355697632), ('enyi divergences', 0.516111433506012), ('enyi divergence', 0.48102372884750366), ('inequality quantum', 0.4718809723854065)]" 541,541,56,541_cancer cells_cancer cell_tumor cells_tumour cells,"['cancer cells', 'cancer cell', 'tumor cells', 'tumour cells', 'tumor growth', 'cancer treatment', 'tumour growth', 'cancer', 'breast cancer', 'chemotherapy']","[""Evaluation of Entropy and Fractal Dimension as Biomarkers for Tumor\n Growth and Treatment Response using Cellular Automata Cell-based models provide a helpful approach for simulating complex systems\nthat exhibit adaptive, resilient qualities, such as cancer. Their focus on\nindividual cell interactions makes them a particularly appropriate strategy to\nstudy the effects of cancer therapies, which often are designed to disrupt\nsingle-cell dynamics. In this work, we also propose them as viable methods for\nstudying the time evolution of cancer imaging biomarkers (IBM). We propose a\ncellular automata model for tumor growth and three different therapies:\nchemotherapy, radiotherapy, and immunotherapy, following well-established\nmodeling procedures documented in the literature. The model generates a\nsequence of tumor images, from which time series of two biomarkers: entropy and\nfractal dimension, is obtained. Our model shows that the fractal dimension\nincreased faster at the onset of cancer cell dissemination, while entropy was\nmore responsive to changes induced in the tumor by the different therapy\nmodalities. These observations suggest that the predictive value of the\nproposed biomarkers could vary considerably with time. Thus, it is important to\nassess their use at different stages of cancer and for different imaging\nmodalities. Another observation derived from the results was that both\nbiomarkers varied slowly when the applied therapy attacked cancer cells in a\nscattered fashion along the automatons' area, leaving multiple independent\nclusters of cells at the end of the treatment. Thus, patterns of change of\nsimulated biomarkers time series could reflect on essential qualities of the\nspatial action of a given cancer intervention.\n"", 'Mathematical modeling of tumor-immune system interactions: the effect of\n rituximab on breast cancer immune response tBregs are a newly discovered subcategory of B regulatory cells, which are\ngenerated by breast cancer, resulting in the increase of Tregs and therefore in\nthe death of NK cells. In this study, we use a mathematical and computational\napproach to investigate the complex interactions between the aforementioned\ncells as well as CD8$^+$ T cells, CD4$^+$ T cells and B cells. Furthermore, we\nuse data fitting to prove that the functional response regarding the lysis of\nbreast cancer cells by NK cells has a ratio-dependent form. Additionally, we\ninclude in our model the concentration of rituximab - a monoclonal antibody\nthat has been suggested as a potential breast cancer therapy - and test its\neffect, when the standard, as well as experimental dosages, are administered.\n', 'A mathematical model of Breast cancer (ER+) with excess estrogen: Mixed\n treatments using Ketogenic diet, endocrine therapy and Immunotherapy Breast Cancer is a major public health problem and the most common diagnosed\nmalignancy in woman. There have been significant developments in clinical\napproaches and theoretical experimental to understand the interactions of\ncancer cells dynamics with the immune system, also developments on analytical\nand computational models to help provide insights into clinical observations\nfor a better understanding of cancer cells, but more are needed, especially at\nthe genetic and molecular levels mathematically. Treatments such as\nimmunotherapy, chemotherapy, hormone therapy, radiotherapy, and gene therapy\nare the main strategies in the fight against breast cancer. The present study\naims at investigating the effects of estrogen derived from recent models, but\nthis time combined with immunotherapy as a way to treat or inhibit the cancer\ngrowth by a mathematical model of breast cancer in situ, governed by a\nsimplified model of nonlinear-coupled ordinary differential equations, that\ncombines important interactions between natural cells, tumor cells, immune\ncells, ketogenic diet in the presence of an anticancer drug. Another\ncontribution was to introduce the inhibition effect epsilon for new results and\nconclusions, A qualitative study was performed and biological interpretations\nwere included to understand the conditions of stability in a realistic way.\n']","[('cancer cells', 0.48255226016044617), ('cancer cell', 0.47458213567733765), ('tumor cells', 0.46554940938949585), ('tumour cells', 0.4489360451698303), ('tumor growth', 0.4363931119441986), ('cancer treatment', 0.414428174495697), ('tumour growth', 0.4009222686290741), ('cancer', 0.37375637888908386), ('breast cancer', 0.3737190067768097), ('chemotherapy', 0.34050825238227844)]" 542,542,56,542_stochastic schr odinger_nonlinear schr odinger_schr odinger equations_critical nonlinear schr,"['stochastic schr odinger', 'nonlinear schr odinger', 'schr odinger equations', 'critical nonlinear schr', 'stochastic schr', 'odinger equations', 'nonlinear schr', 'stochastic nonlinear', 'critical nonlinear', 'fractional nonlinear schr']","['Qualitative quasi-invariance of low regularity Gaussian measures for the\n 1d quintic nonlinear Schr\\""odinger equation We consider the 1d quintic nonlinear Schr\\""odinger equation (NLS) on the\ntorus with initial data distributed according to the Gaussian measures with\ncovariance operator $(1-\\Delta)^{-s}$, and denoted $\\mu_s$. For the full range\n$s>\\frac{9}{10}$, we prove that these Gaussian measures are quasi-invariant\nalong the flow of (NLS), meaning that the law of the solution at any time is\nabsolutely continuous with respect to the initial Gaussian measure. Moreover,\nthe condition $s>\\frac{9}{10}$ corresponds to the threshold where the Sobolev\nspace $H^{\\frac{2}{5}+}(\\mathbb{T})$ is of $\\mu_s$-full measure (it is of zero\n$\\mu_s$-measure otherwise). This is the lower regularity Sobolev space where we\ncurrently know that (NLS) is globally well-posed, thanks to a work by LI-WU-XU.\nThe present work extends the known threshold $s>\\frac{3}{2}$ for the\nquasi-invariance down to $s>\\frac{9}{10}$, but we do not obtain here\nquantitative results on the Radon-Nikodym derivatives. Our approach is based on\na work of Sun-Tzvetkov, combining a Poincar\\\'e-Dulac normal form reduction with\nenergy estimates. However, our main tool to obtain these energy estimates\ndiffers: we use the Bou\\\'e-Dupuis variational formula instead of Wiener Chaos.\n', 'Transport of low regularity Gaussian measures for the 1d quintic\n nonlinear Schr\\""odinger equation We consider the 1d nonlinear Schr\\""odinger equation (NLS) on the torus with\ninitial data distributed according to the Gaussian measure with covariance\noperator $(1 - \\Delta)^{-s}$, where $\\Delta$ is the Laplace operator. We prove\nthat the Gaussian measures are quasi-invariant along the flow of (NLS) for the\nfull range $s > \\frac{3}{2}$. This improves a previous result obtained by\nPlanchon, Tzvetkov and Visciglia (in 2019), where the quasi-invariance is\nproven for $s=2k$, for all integers $k\\geq 1$. In our approach, to prove the\nquasi-invariance, we directly establish an explicit formula for the\nRadon-Nikodym derivative $G_s(t,.)$ of the transported measures, which is\nobtained as the limit of truncated Radon-Nikodym derivatives $G_{s,N}(t,.)$ for\ntransported measures associated with a truncated system. We also prove that the\nRadon-Nikodym derivatives belong to $L^p$, $p>1$, with respect to\n$H^1(\\mathbb{T})$-cutoff Gaussian measures, relying on the introduction of\nweighted Gaussian measures produced by a normal form reduction, following a\nrecent work by Sun and Tzvetkov (in 2023). Additionally, we prove that the\ntruncated densities $G_{s,N}(t,.)$ converges to $G_s(t,.)$ in $L^p$ (with\nrespect to the $H^1(\\mathbb{T})$-cutoff Gaussian measures).\n', 'Global well-posedness of the energy-critical stochastic nonlinear Schr\\""odinger equation on the three-dimensional torus We study the Cauchy problem of the defocusing energy-critical stochastic nonlinear Schr\\""odinger equation (SNLS) on the three dimensional torus, forced by an additive noise. We adapt the atomic spaces framework in the context of the energy-critical nonlinear Schr\\""odinger equation, and employ probabilistic perturbation arguments in the context of stochastic PDEs, establishing the global well-posedness of the defocusing energy-critical quintic SNLS in the energy space. It is the first global well-posedness result for the periodic SNLS in a critical space.']","[('stochastic schr odinger', 0.6600659489631653), ('nonlinear schr odinger', 0.6388644576072693), ('schr odinger equations', 0.6111624836921692), ('critical nonlinear schr', 0.6095843315124512), ('stochastic schr', 0.5337492227554321), ('odinger equations', 0.5288882851600647), ('nonlinear schr', 0.5247098803520203), ('stochastic nonlinear', 0.5168464779853821), ('critical nonlinear', 0.46555382013320923), ('fractional nonlinear schr', 0.45550036430358887)]" 543,543,56,543_graph ramsey_ramsey properties_ramsey_randomly perturbed graphs,"['graph ramsey', 'ramsey properties', 'ramsey', 'randomly perturbed graphs', 'dense random graphs', 'number random graphs', 'random graphs', 'chromatic number', 'random graph g_', 'binomial random graph']","['Resolution of the Kohayakawa-Kreuter conjecture A graph $G$ is said to be Ramsey for a tuple of graphs $(H_1,\\dots,H_r)$ if\nevery $r$-coloring of the edges of $G$ contains a monochromatic copy of $H_i$\nin color $i$, for some $i$. A fundamental question at the intersection of\nRamsey theory and the theory of random graphs is to determine the threshold at\nwhich the binomial random graph $G_{n,p}$ becomes a.a.s. Ramsey for a fixed\ntuple $(H_1,\\dots,H_r)$, and a famous conjecture of Kohayakawa and Kreuter\npredicts this threshold. Earlier work of Mousset-Nenadov-Samotij,\nBowtell-Hancock-Hyde, and Kuperwasser-Samotij-Wigderson has reduced this\nprobabilistic problem to a deterministic graph decomposition conjecture. In\nthis paper, we resolve this deterministic problem, thus proving the\nKohayakawa-Kreuter conjecture. Along the way, we prove a number of novel graph\ndecomposition results which may be of independent interest.\n', 'On the Kohayakawa-Kreuter conjecture Let us say that a graph $G$ is Ramsey for a tuple $(H_1,\\dots,H_r)$ of graphs\nif every $r$-coloring of the edges of $G$ contains a monochromatic copy of\n$H_i$ in color $i$, for some $i \\in [r]$. A famous conjecture of Kohayakawa and\nKreuter, extending seminal work of R\\""odl and Ruci\\\'nski, predicts the\nthreshold at which the binomial random graph $G_{n,p}$ becomes Ramsey for\n$(H_1,\\dots,H_r)$ asymptotically almost surely. In this paper, we resolve the\nKohayakawa-Kreuter conjecture for almost all tuples of graphs. Moreover, we\nreduce its validity to the truth of a certain deterministic statement, which is\na clear necessary condition for the conjecture to hold. All of our results\nactually hold in greater generality, when one replaces the graphs\n$H_1,\\dots,H_r$ by finite families $\\mathcal{H}_1,\\dots,\\mathcal{H}_r$.\nAdditionally, we pose a natural (deterministic) graph-partitioning conjecture,\nwhich we believe to be of independent interest, and whose resolution would\nimply the Kohayakawa-Kreuter conjecture.\n', 'Ramsey games near the critical threshold A well-known result of R\\""odl and Ruci\\\'nski states that for any graph $H$\nthere exists a constant $C$ such that if $p \\geq C n^{- 1/m_2(H)}$, then the\nrandom graph $G_{n,p}$ is a.a.s. $H$-Ramsey, that is, any $2$-colouring of its\nedges contains a monochromatic copy of $H$. Aside from a few simple exceptions,\nthe corresponding $0$-statement also holds, that is, there exists $c>0$ such\nthat whenever $p\\leq cn^{-1/m_2(H)}$ the random graph $G_{n,p}$ is a.a.s. not\n$H$-Ramsey.\n We show that near this threshold, even when $G_{n,p}$ is not $H$-Ramsey, it\nis often extremely close to being $H$-Ramsey. More precisely, we prove that for\nany constant $c > 0$ and any strictly $2$-balanced graph $H$, if $p \\geq c\nn^{-1/m_2(H)}$, then the random graph $G_{n,p}$ a.a.s. has the property that\nevery $2$-edge-colouring without monochromatic copies of $H$ cannot be extended\nto an $H$-free colouring after $\\omega(1)$ extra random edges are added. This\ngeneralises a result by Friedgut, Kohayakawa, R\\""odl, Ruci\\\'nski and Tetali,\nwho in 2002 proved the same statement for triangles, and addresses a question\nraised by those authors. We also extend a result of theirs on the three-colour\ncase and show that these theorems need not hold when $H$ is not strictly\n$2$-balanced.\n']","[('graph ramsey', 0.6972663998603821), ('ramsey properties', 0.6678486466407776), ('ramsey', 0.531890332698822), ('randomly perturbed graphs', 0.5170877575874329), ('dense random graphs', 0.511830747127533), ('number random graphs', 0.5048694610595703), ('random graphs', 0.5014710426330566), ('chromatic number', 0.48348918557167053), ('random graph g_', 0.4770886301994324), ('binomial random graph', 0.46288537979125977)]" 544,544,56,544_truncated moment_moment solutions_generalized moment_moment matrices,"['truncated moment', 'moment solutions', 'generalized moment', 'moment matrices', 'moment sequences', 'moment problems', 'moment functional', 'dimensional moment', 'truncated matrix', 'moment matrix']","['Generalized truncated moment problems with unbounded sets This paper studies generalized truncated moment problems with unbounded sets.\nFirst, we study geometric properties of the truncated moment cone and its dual\ncone of nonnegative polynomials. By the technique of homogenization, we give a\nconvergent hierarchy of Moment-SOS relaxations for approximating these cones.\nWith them, we give a Moment-SOS method for solving generalized truncated moment\nproblems with unbounded sets. Finitely atomic representing measures, or\ncertificates for their nonexistence, can be obtained by the proposed method.\nNumerical experiments and applications are also given.\n', 'The strong truncated Hamburger moment problem with and without gaps The strong truncated Hamburger moment problem (STHMP) of degree\n$(-2k_1,2k_2)$ asks to find necessary and sufficient conditions for the\nexistence of a positive Borel measure, supported on $\\mathbb{R}\\setminus\n\\{0\\}$, such that $\\beta_i=\\int x^id\\mu\\; (-2k_1\\leq i\\leq 2k_2)$. Using the\nsolution of the truncated Hamburger moment problem and the properties of Hankel\nmatrices we solve the STHMP. Then, using the equivalence with the STHMP of\ndegree $(-2k,2k)$, we obtain the solution of the 2-dimensional truncated moment\nproblem (TMP) of degree $2k$ with variety $xy=1$, first solved by Curto and\nFialkow. Our addition to their result is the fact previously known only for\n$k=2$, that the existence of a measure is equivalent to the existence of a flat\nextension of the moment matrix. Further on, we solve the STHMP of degree\n$(-2k_1,2k_2)$ with one missing moment in the sequence, i.e., $\\beta_{-2k_1+1}$\nor $\\beta_{2k_2-1}$, which also gives the solution of the TMP with variety\n$x^2y=1$ as a special case, first studied by Fialkow.\n', 'On the Matricial Truncated Moment Problem. II We continue the study of truncated matrix-valued moment problems begun in\narXiv:2310.00957. Let $q\\in\\mathbb{N}$. Suppose that\n$(\\mathcal{X},\\mathfrak{X})$ is a measurable space and $\\mathcal{E}$ is a\nfinite-dimensional vector space of measurable mappings of $\\mathscr{X}$ into\n$\\mathcal{H}_q$, the Hermitian $q\\times q$ matrices. A linear functional\n$\\Lambda$ on $\\mathcal{E}$ is called a moment functional if there exists a\npositive $\\mathcal{H}_q$-valued measure $\\mu$ on $(\\mathcal{X},\\mathfrak{X})$\nsuch that $\\Lambda(F)=\\int_\\mathcal{X} \\langle F, \\mathrm{d}\\mu\\rangle$ for\n$F\\in \\mathcal{E}$.\n In this paper a number of special topics on the truncated matricial moment\nproblem are treated. We restate a result from (Mourrain and Schm\\""udgen, 2016)\nto obtain a matricial version of the flat extension theorem. Assuming that\n$\\mathcal{X}$ is a compact space and all elements of $ \\mathcal{E}$ are\ncontinuous on $\\mathcal{X}$ we characterize moment functionals in terms of\npositivity and obtain an ordered maximal mass representing measure for each\nmoment functional. The set of masses of representing measures at a fixed point\nand some related sets are studied. The class of commutative matrix moment\nfunctionals is investigated. We generalize the apolar scalar product for\nhomogeneous polynomials to the matrix case and apply this to the matricial\ntruncated moment problem.\n']","[('truncated moment', 0.5787633657455444), ('moment solutions', 0.49732154607772827), ('generalized moment', 0.48193612694740295), ('moment matrices', 0.4804365634918213), ('moment sequences', 0.4724515974521637), ('moment problems', 0.4640355110168457), ('moment functional', 0.45624157786369324), ('dimensional moment', 0.43664488196372986), ('truncated matrix', 0.4317488372325897), ('moment matrix', 0.4175755977630615)]" 545,545,56,545_geodesic ray transform_geodesic ray_riemannian geodesics_ray transforms,"['geodesic ray transform', 'geodesic ray', 'riemannian geodesics', 'ray transforms', 'sub riemannian geodesics', 'transform tensors', 'manifolds geodesic', 'geodesic flows', 'ray transform', 'geodesic vector']","['The Light Ray transform in Stationary and Static Lorentzian geometries Given a Lorentzian manifold, the light ray transform of a function is its\nintegrals along null geodesics. This paper is concerned with the injectivity of\nthe light ray transform on functions and tensors, up to the natural gauge for\nthe problem. First, we study the injectivity of the light ray transform of a\nscalar function on a globally hyperbolic stationary Lorentzian manifold and\nprove injectivity holds if either a convex foliation condition is satisfied on\na Cauchy surface on the manifold or the manifold is real analytic and null\ngeodesics do not have cut points. Next, we consider the light ray transform on\ntensor fields of arbitrary rank in the more restrictive class of static\nLorentzian manifolds and show that if the geodesic ray transform on tensors\ndefined on the spatial part of the manifold is injective up to the natural\ngauge, then the light ray transform on tensors is also injective up to its\nnatural gauge. Finally, we provide applications of our results to some inverse\nproblems about recovery of coefficients for hyperbolic partial differential\nequations from boundary data.\n', ""The tensorial X-ray transform on asymptotically conic spaces In this paper we show the invertibility of the geodesic X-ray transform on\none forms and 2-tensors on asymptotically conic manifolds, up to the natural\nobstruction, allowing existence of certain kinds of conjugate points. We use\nthe 1-cusp pseudodifferential operator algebra and its semiclassical foliation\nversion introduced and used by Vasy and Zachos, who showed the same type\ninvertibility on functions.\n The complication of the invertibility of the tensorial X-ray transform,\ncompared with X-ray transform on functions, is caused by the natural kernel of\nthe transform consisting of `potential tensors'. We overcome this by arranging\na modified solenoidal gauge condition, under which we have the invertibility of\nthe X-ray transform.\n"", 'On mixed and transverse ray transforms on orientable surfaces The geodesic ray transform, the mixed ray transform and the transverse ray\ntransform of a tensor field on a manifold can all be seen as what we call\nmixing ray transforms, compositions of the geodesic ray transform and an\ninvertible linear map on tensor fields. We show that the characterization of\nthe kernel and the stability of a mixing ray transform can be reduced to the\nsame properties of any other mixing ray transform. Our approach applies to\nvarious geometries and ray transforms, including the light ray transform. In\nparticular, we extend studies in de Hoop--Saksala--Zhai (2019) from compact\nsimple surfaces to orientable surfaces with solenoidally injective geodesic ray\ntransform. Our proofs are based on algebraic arguments.\n']","[('geodesic ray transform', 0.7036567330360413), ('geodesic ray', 0.5782729983329773), ('riemannian geodesics', 0.5392959117889404), ('ray transforms', 0.5378016233444214), ('sub riemannian geodesics', 0.5313126444816589), ('transform tensors', 0.5156800150871277), ('manifolds geodesic', 0.5092257857322693), ('geodesic flows', 0.5022864937782288), ('ray transform', 0.5006166100502014), ('geodesic vector', 0.48018917441368103)]" 546,546,56,546_reduced order modeling_reduced order models_parametric order reduction_order reduction parametric,"['reduced order modeling', 'reduced order models', 'parametric order reduction', 'order reduction parametric', 'reduced models', 'second order systems', 'reduced order', 'order models', 'order reduction', 'optimal reduced']","['A Unifying Framework for Interpolatory $\\mathcal{L}_2$-optimal\n Reduced-order Modeling We develop a unifying framework for interpolatory $\\mathcal{L}_2$-optimal\nreduced-order modeling for a wide classes of problems ranging from stationary\nmodels to parametric dynamical systems. We first show that the framework\nnaturally covers the well-known interpolatory necessary conditions for\n$\\mathcal{H}_2$-optimal model order reduction and leads to the interpolatory\nconditions for $\\mathcal{H}_2 \\otimes \\mathcal{L}_2$-optimal model order\nreduction of multi-input/multi-output parametric dynamical systems. Moreover,\nwe derive novel interpolatory optimality conditions for rational discrete\nleast-squares minimization and for $\\mathcal{L}_2$-optimal model order\nreduction of a class of parametric stationary models. We show that bitangential\nHermite interpolation appears as the main tool for optimality across different\ndomains. The theoretical results are illustrated on two numerical examples.\n', 'Balanced truncation for parametric linear systems using interpolation of\n Gramians: a comparison of algebraic and geometric approaches When balanced truncation is used for model order reduction, one has to solve\na pair of Lyapunov equations for two Gramians and uses them to construct a\nreduced-order model. Although advances in solving such equations have been\nmade, it is still the most expensive step of this reduction method. Parametric\nmodel order reduction aims to determine reduced-order models for\nparameter-dependent systems. Popular techniques for parametric model order\nreduction rely on interpolation. Nevertheless, the interpolation of Gramians is\nrarely mentioned, most probably due to the fact that Gramians are symmetric\npositive semidefinite matrices, a property that should be preserved by the\ninterpolation method. In this contribution, we propose and compare two\napproaches for Gramian interpolation. In the first approach, the interpolated\nGramian is computed as a linear combination of the data Gramians with positive\ncoefficients. Even though positive semidefiniteness is guaranteed in this\nmethod, the rank of the interpolated Gramian can be significantly larger than\nthat of the data Gramians. The second approach aims to tackle this issue by\nperforming the interpolation on the manifold of fixed-rank positive\nsemidefinite matrices. The results of the interpolation step are then used to\nconstruct parametric reduced-order models, which are compared numerically on\ntwo benchmark problems.\n', 'Generalizations of data-driven balancing: what to sample for different\n balancing-based reduced models The Quadrature-based Balanced Truncation (QuadBT) framework of\narXiv:2104.01006 is a ""non-intrusive"" reformulation of balanced truncation; a\nclassical projection-based model-order reduction technique for linear systems.\nQuadBT is non-intrusive in the sense that it builds approximate balanced\nreduced-order models entirely from system response data (e.g., transfer\nfunction measurements) without the need to reference an explicit state-space\nrealization of the underlying full-order model. In this work, we generalize and\nextend QuadBT to other types of balanced truncation model reduction. Namely, we\ndevelop non-intrusive implementations for balanced stochastic truncation,\npositive-real balanced truncation, and bounded-real balanced truncation. We\nshow that the data-driven construction of these balanced reduced-order models\nrequires sampling certain spectral factors associated with the system of\ninterest. Numerical examples are included in each case to validate our\napproach.\n']","[('reduced order modeling', 0.684229850769043), ('reduced order models', 0.6758138537406921), ('parametric order reduction', 0.614983081817627), ('order reduction parametric', 0.5838462114334106), ('reduced models', 0.5313328504562378), ('second order systems', 0.5039570927619934), ('reduced order', 0.47840091586112976), ('order models', 0.46832191944122314), ('order reduction', 0.46217080950737), ('optimal reduced', 0.43097180128097534)]" 547,547,56,547_port hamiltonian systems_port hamiltonian structure_port hamiltonian_hamiltonian systems,"['port hamiltonian systems', 'port hamiltonian structure', 'port hamiltonian', 'hamiltonian systems', 'hamiltonian systems one', 'hamiltonian system', 'hamiltonian structure', 'hamiltonian type', 'hamiltonian', 'dissipative hamiltonian']","['On Energy Conversion in Port-Hamiltonian Systems We study port-Hamiltonian systems with two external ports, and the strategies\nand limitations for conversion of energy from one port into the other. It turns\nout that, apart from the cyclo-passivity of port-Hamiltonian systems, this is\nrelated to the internal connection structure of port-Hamiltonian systems. A\nsource of motivation for energy conversion is provided by thermodynamics, in\nparticular the Carnot theory of conversion of thermal into mechanical energy.\nThis is extended to general port-Hamiltonian systems which are satisfying\nstructural conditions on their topology; thus generalizing the Carnot-Clausius\ntheory of heat engines. In particular, the operation of Carnot cycles is\nextended, which is illustrated by the example of a precursor to the Stirling\nengine, as well as an electromagnetic actuator. Furthermore, alternative energy\nconversion control schemes such as energy-routers are discussed.\n', 'Linear port-Hamiltonian systems are generically controllable The new concept of relative generic subsets is introduced. It is shown that\nthe set of controllable linear finite-dimensional port-Hamiltonian systems is a\nrelative generic subset of the set of all linear finite-dimensional\nport-Hamiltonian systems. This implies that a random, continuously distributed\nport-Hamiltonian system is almost surely controllable.\n', 'Port-Hamiltonian systems and monotonicity The relationships between port-Hamiltonian systems modeling and the notion of\nmonotonicity are explored. The earlier introduced notion of incrementally\nport-Hamiltonian systems is extended to maximal cyclically monotone relations,\ntogether with their generating functions. This gives rise to new classes of\nincrementally port-Hamiltonian systems, with examples stemming from physical\nsystems modeling as well as from convex optimization. An in-depth treatment is\ngiven of the composition of maximal monotone and maximal cyclically monotone\nrelations, where in the latter case the resulting maximal cyclically monotone\nrelation is shown to be computable through the use of generating functions.\nFurthermore, connections are discussed with incremental versions of passivity,\nand it is shown how incrementally port-Hamiltonian systems with strictly convex\nHamiltonians are (maximal) equilibrium independent passive. Finally, the\nresults on compositionality of monotone relations are employed for a convex\noptimization approach to the computation of the equilibrium of interconnected\nincrementally port-Hamiltonian systems.\n']","[('port hamiltonian systems', 0.8495932817459106), ('port hamiltonian structure', 0.7872862815856934), ('port hamiltonian', 0.7712743878364563), ('hamiltonian systems', 0.6562238931655884), ('hamiltonian systems one', 0.6273617744445801), ('hamiltonian system', 0.5814061164855957), ('hamiltonian structure', 0.5699095726013184), ('hamiltonian type', 0.5518908500671387), ('hamiltonian', 0.5290038585662842), ('dissipative hamiltonian', 0.5201601982116699)]" 548,548,56,548_machine scheduling_scheduling problems_scheduling_job scheduling,"['machine scheduling', 'scheduling problems', 'scheduling', 'job scheduling', 'scheduling non', 'parallel machines', 'integer linear programming', 'linear programming', 'batch processing', 'schedules']","['Malleable scheduling beyond identical machines In malleable job scheduling, jobs can be executed simultaneously on multiple\nmachines with the processing time depending on the number of allocated\nmachines. In this setting, jobs are required to be executed non-preemptively\nand in unison, in the sense that they occupy, during their execution, the same\ntime interval over all the machines of the allocated set. In this work, we\nstudy generalizations of malleable job scheduling inspired by standard\nscheduling on unrelated machines. Specifically, we introduce a general model of\nmalleable job scheduling, where each machine has a (possibly different) speed\nfor each job, and the processing time of a job $j$ on a set of allocated\nmachines $S$ depends on the total speed of $S$ with respect to $j$. For\nmachines with unrelated speeds, we show that the optimal makespan cannot be\napproximated within a factor less than $\\frac{e}{e-1}$, unless $P = NP$. On the\npositive side, we present polynomial-time algorithms with approximation ratios\n$\\frac{2e}{e-1}$ for machines with unrelated speeds, $3$ for machines with\nuniform speeds, and $7/3$ for restricted assignments on identical machines. Our\nalgorithms are based on deterministic LP rounding. They result in sparse\nschedules, in the sense that each machine shares at most one job with other\nmachines. We also prove lower bounds on the integrality gap of $1+\\varphi$ for\nunrelated speeds ($\\varphi$ is the golden ratio) and $2$ for uniform speeds and\nrestricted assignments. To indicate the generality of our approach, we show\nthat it also yields constant factor approximation algorithms for a variant\nwhere we determine the effective speed of a set of allocated machines based on\nthe $L_p$ norm of their speeds.\n', 'EPTAS for load balancing problem on parallel machines with a\n non-renewable resource The problem considered is the non-preemptive scheduling of independent jobs\nthat consume a resource (which is non-renewable and replenished regularly) on\nparallel uniformly related machines. The input defines the speed of machines,\nsize of jobs, the quantity of resource required by the jobs, the replenished\nquantities, and replenishment dates of the resource. Every job can start\nprocessing only after the required quantity of the resource is allocated to the\njob. The objective function is the minimization of the convex combination of\nthe makespan and an objective that is equivalent to the $l_p$-norm of the\nvector of loads of the machines. We present an EPTAS for this problem. Prior to\nour work only a PTAS was known in this non-renewable resource settings and this\nPTAS was only for the special case of our problem of makespan minimization on\nidentical machines.\n', 'Approximate and Robust Bounded Job Start Scheduling for Royal Mail\n Delivery Offices Motivated by mail delivery scheduling problems arising in Royal Mail, we\nstudy a generalization of the fundamental makespan scheduling P||Cmax problem\nwhich we call the bounded job start scheduling problem. Given a set of jobs,\neach specified by an integer processing time p_j, that have to be executed\nnon-preemptively by a set of m parallel identical machines, the objective is to\ncompute a minimum makespan schedule subject to an upper bound g<=m on the\nnumber of jobs that may simultaneously begin per unit of time. With perfect\ninput knowledge, we show that Longest Processing Time First (LPT) algorithm is\ntightly 2-approximate. After proving that the problem is strongly NP-hard even\nwhen g=1, we elaborate on improving the 2-approximation ratio for this case. We\ndistinguish the classes of long and short instances satisfying p_j>=m and\np_jKc networks operate in the chaotic regime. Here, we show that\nfor linear networks, which are the least canalizing and most unstable, the\nphase transition from order to chaos already happens at an average in-degree of\nKc=1. Consistently, we also show that unstable networks exhibit a large number\nof attractors with very long limit cycles while stable and critical networks\nexhibit fewer attractors with shorter limit cycles. Additionally, we present\ntheoretical results to quantify important dynamical properties of linear\nnetworks. First, we present a formula for the proportion of attractor states in\nlinear systems. Second, we show that the expected number of fixed points in\nlinear systems is 2, while general Boolean networks possess on average one\nfixed point. Third, we present a formula to quantify the number of bijective\nlinear Boolean networks and provide a lower bound for the percentage of this\ntype of network.\n', 'Non-deterministic updates of Boolean networks Boolean networks are discrete dynamical systems where each automaton has its\nown Boolean function for computing its state according to the configuration of\nthe network. The updating mode then determines how the configuration of the\nnetwork evolves over time. Many of updating modes from the literature,\nincluding synchronous and asynchronous modes, can be defined as the composition\nof elementary deterministic configuration updates, i.e., by functions mapping\nconfigurations of the network. Nevertheless, alternative dynamics have been\nintroduced using ad-hoc auxiliary objects, such as that resulting from binary\nprojections of Memory Boolean networks, or that resulting from additional\npseudo-states for Most Permissive Boolean networks. One may wonder whether\nthese latter dynamics can still be classified as updating modes of finite\nBoolean networks, or belong to a different class of dynamical systems. In this\npaper, we study the extension of updating modes to the composition of\nnon-deterministic updates, i.e., mapping sets of finite configurations. We show\nthat the above dynamics can be expressed in this framework, enabling a better\nunderstanding of them as updating modes of Boolean networks. More generally, we\nargue that non-deterministic updates pave the way to a unifying framework for\nexpressing complex updating modes, some of them enabling transitions that\ncannot be computed with elementary and non-elementary deterministic updates.\n', 'Modular Construction of Boolean Networks Boolean networks have been used in a variety of settings, as models for\ngeneral complex systems as well as models of specific systems in diverse\nfields, such as biology, engineering, and computer science. Traditionally,\ntheir properties as dynamical systems have been studied through simulation\nstudies, due to a lack of mathematical structure. This paper uses a common\nmathematical technique to identify a class of Boolean networks with a ""simple""\nstructure and describes an algorithm to construct arbitrary extensions of a\ncollection of simple Boolean networks. In this way, all Boolean networks can be\nobtained from a collection of simple Boolean networks as building blocks. The\npaper furthermore provides a formula for the number of extensions of given\nsimple networks and, in some cases, provides a parametrization of those\nextensions. This has potential applications to the construction of networks\nwith particular properties, for instance in synthetic biology, and can also be\napplied to develop efficient control algorithms for Boolean network models.\n']","[('boolean network', 0.7214975953102112), ('boolean networks', 0.6995376944541931), ('networks finite', 0.5776644945144653), ('control networks', 0.5206179022789001), ('boolean functions', 0.5199163556098938), ('network finite', 0.49974173307418823), ('network models', 0.4717377722263336), ('network structure', 0.471189022064209), ('monotone boolean', 0.45400115847587585), ('boolean', 0.45288169384002686)]" 555,555,55,555_volterra integral equations_volterra integral_solving volterra_volterra equations,"['volterra integral equations', 'volterra integral', 'solving volterra', 'volterra equations', 'fredholm integral equations', 'volterra integro differential', 'singular integral equations', 'integral equations first', 'integral equations', 'integro differential equations']","['A sparse spectral method for Volterra integral equations using\n orthogonal polynomials on the triangle We introduce and analyse a sparse spectral method for the solution of\nVolterra integral equations using bivariate orthogonal polynomials on a\ntriangle domain. The sparsity of the Volterra operator on a weighted Jacobi\nbasis is used to achieve high efficiency and exponential convergence. The\ndiscussion is followed by a demonstration of the method on example Volterra\nintegral equations of the first and second kind with known analytic solutions\nas well as an application-oriented numerical experiment. We prove convergence\nfor both first and second kind problems, where the former builds on connections\nwith Toeplitz operators.\n', ""Relation between two Sinc-collocation methods for Volterra integral equations of the second kind and further improvement Two different Sinc-collocation methods for Volterra integral equations of the second kind have been independently proposed by Stenger and Rashidinia--Zarebnia. However, their relation remains unexplored. This study theoretically examines the solutions of these two methods, and reveals that they are not generally equivalent, despite coinciding at the collocation points. Strictly speaking, Stenger's method assumes that the kernel of the integral is a function of a single variable, but this study theoretically justifies the use of his method in general cases, i.e., the kernel is a function of two variables. Then, this study rigorously proves that both methods can attain the same, root-exponential convergence. In addition to the contribution, this study improves Stenger's method to attain significantly higher, almost exponential convergence. Numerical examples supporting the theoretical results are also provided."", ""Numerical solution of locally loaded Volterra integral equations Volterra's integral equations with local and nonlocal loads represent the\nnovel class of integral equations that have attracted considerable attention in\nrecent years. These equations are a generalisation of the classic Volterra\nintegral equations, which were first introduced by Vito Volterra in the late\n19th century. The loaded Volterra integral equations are characterised by the\npresence of a load which complicates the process of their theoretical and\nnumerical study. Sometimes these equation are called the equations with\n``frozen'' argument. The present work is devoted to the study of Volterra\nequations with locally loaded integral operators. The existence and uniquness\ntheorems are proved. Among the main contributions is the collocation method for\napproximate solution of such equations based on the piecewise linear\napproximation. To confirm the convergence of the method, a number of numerical\nresults for solving model problems are provided.\n""]","[('volterra integral equations', 0.728187620639801), ('volterra integral', 0.6280444860458374), ('solving volterra', 0.5922694802284241), ('volterra equations', 0.5860403180122375), ('fredholm integral equations', 0.5344144701957703), ('volterra integro differential', 0.5234792232513428), ('singular integral equations', 0.520072340965271), ('integral equations first', 0.4759313464164734), ('integral equations', 0.4719547629356384), ('integro differential equations', 0.46335193514823914)]" 556,556,55,556_quantum metric_compact quantum_metric spectral_spectral metric,"['quantum metric', 'compact quantum', 'metric spectral', 'spectral metric', 'quantum groups', 'convergence quantum', 'algebras quantum', 'space quantum', 'spectral triples', 'quantum limits']","['External products of spectral metric spaces In this paper, we present a characterization of compact quantum metric spaces\nin terms of finite dimensional approximations. This characterization naturally\nleads to the introduction of a matrix analogue of a compact quantum metric\nspace. As an application, we show that matrix compact quantum metric spaces are\nstable under minimal tensor products and more specifically that matrix spectral\nmetric spaces are stable under the external product operation on unital\nspectral triples. We present several noncommutative examples of matrix compact\nquantum metric spaces.\n', 'Inductive limits of compact quantum metric spaces A compact quantum metric space is a unital $C^*$-algebra equipped with a\nLip-norm. Let $\\{(A_n, L_n)\\}$ be a sequence of compact quantum metric spaces,\nand let $\\phi_n:A_n\\to A_{n+1}$ be a unital $^*$-homomorphism preserving\nLipschitz elements for $n\\geq 1$. We show that there exists a compact quantum\nmetric space structure on the inductive limit $\\varinjlim(A_n,\\phi_n)$ by means\nof the inverse limit of the state spaces $\\{\\mathcal{S}(A_n)\\}$. We also give\nsome sufficient conditions that two inductive limits of compact quantum metric\nspaces are Lipschitz isomorphic.\n', ""Dynamics of compact quantum metric spaces We provide a detailed study of actions of the integers on compact quantum\nmetric spaces, which includes general criteria ensuring that the associated\ncrossed product algebra is again a compact quantum metric space in a natural\nway. We moreover provide a flexible set of assumptions ensuring that a\ncontinuous family of *-automorphisms of a compact quantum metric space, yields\na field of crossed product algebras which varies continuously in Rieffel's\nquantum Gromov-Hausdorff distance. Lastly we show how our results apply to\ncontinuous families of Lip-isometric actions on compact quantum metric spaces\nand to families of diffeomorphisms of compact Riemannian manifolds which vary\ncontinuously in the Whitney C^1-topology.\n""]","[('quantum metric', 0.6420822143554688), ('compact quantum', 0.6407660841941833), ('metric spectral', 0.5221912860870361), ('spectral metric', 0.5211588144302368), ('quantum groups', 0.49257588386535645), ('convergence quantum', 0.48332858085632324), ('algebras quantum', 0.4693385064601898), ('space quantum', 0.4656340479850769), ('spectral triples', 0.4516122341156006), ('quantum limits', 0.4487766623497009)]" 557,557,55,557_polynomial lattice rules_lattice rules_lattice rule_lattice based,"['polynomial lattice rules', 'lattice rules', 'lattice rule', 'lattice based', 'polynomial lattice', 'rank lattices', 'lattice', 'rank lattice', 'lattice point sets', 'randomized algorithms']","['The analysis of vertex modified lattice rules in a non-periodic Sobolev\n space In a series of papers, in 1993, 1994 & 1996, Sloan & Niederreiter introduced\na modification of lattice rules for non-periodic functions, called ""vertex\nmodified lattice rules""\', and a particular breed called ""optimal vertex\nmodified lattice rules"". In the 1994 paper, Niederreiter & Sloan concentrate\nexplicitly on Fibonacci lattice rules, which are a particular good choice of\n2-dimensional lattice rules. Error bounds in this series of papers were given\nrelated to the star discrepancy.\n In this paper we pose the problem in terms of the so-called unanchored\nSobolev space, which is a reproducing kernel Hilbert space often studied\nnowadays in which functions have $L_2$-integrable mixed first derivatives. It\nis known constructively that randomly shifted lattice rules, as well as\ndeterministic tent-transformed lattice rules and deterministic fully\nsymmetrized lattice rules can achieve close to $O(N^{-1})$ convergence in this\nspace, see Sloan, Kuo & Joe (2002) and Dick, Nuyens & Pillichshammer (2014)\nrespectively.\n We derive a break down of the worst-case error of vertex modified lattice\nrules in the unanchored Sobolev space in terms of the worst-case error in a\nKorobov space, a multilinear space and some additional ""mixture term"". For the\n1-dimensional case this worst-case error is obvious and gives an explicit\nexpression for the trapezoidal rule. In the 2-dimensional case this mixture\nterm also takes on an explicit form for which we derive upper and lower bounds.\nFor this case we prove that there exist lattice rules with a nice worst-case\nerror bound with the additional mixture term of the form $N^{-1} \\log^2(N)$.\n', 'Construction-free median quasi-Monte Carlo rules for function spaces\n with unspecified smoothness and general weights We study quasi-Monte Carlo (QMC) integration of smooth functions defined over\nthe multi-dimensional unit cube. Inspired by a recent work of Pan and Owen, we\nstudy a new construction-free median QMC rule which can exploit the smoothness\nand the weights of function spaces adaptively. For weighted Korobov spaces, we\ndraw a sample of $r$ independent generating vectors of rank-1 lattice rules,\ncompute the integral estimate for each, and approximate the true integral by\nthe median of these $r$ estimates. For weighted Sobolev spaces, we use the same\napproach but with the rank-1 lattice rules replaced by high-order polynomial\nlattice rules. A major advantage over the existing approaches is that we do not\nneed to construct good generating vectors by a computer search algorithm, while\nour median QMC rule achieves almost the optimal worst-case error rate for the\nrespective function space with any smoothness and weights, with a probability\nthat converges to 1 exponentially fast as $r$ increases. Numerical experiments\nillustrate and support our theoretical findings.\n', 'Stability of lattice rules and polynomial lattice rules constructed by\n the component-by-component algorithm We study quasi-Monte Carlo (QMC) methods for numerical integration of\nmultivariate functions defined over the high-dimensional unit cube. Lattice\nrules and polynomial lattice rules, which are special classes of QMC methods,\nhave been intensively studied and the so-called component-by-component (CBC)\nalgorithm has been well-established to construct rules which achieve the almost\noptimal rate of convergence with good tractability properties for given\nsmoothness and set of weights. Since the CBC algorithm constructs rules for\ngiven smoothness and weights, not much is known when such rules are used for\nfunction classes with different smoothness and/or weights.\n In this paper we prove that a lattice rule constructed by the CBC algorithm\nfor the weighted Korobov space with given smoothness and weights achieves the\nalmost optimal rate of convergence with good tractability properties for\ngeneral classes of smoothness and weights which satisfy some summability\nconditions. Such a stability result also can be shown for polynomial lattice\nrules in weighted Walsh spaces. We further give bounds on the weighted star\ndiscrepancy and discuss the tractability properties for these QMC rules. The\nresults are comparable to those obtained for Halton, Sobol and Niederreiter\nsequences.\n']","[('polynomial lattice rules', 0.5674009919166565), ('lattice rules', 0.5508448481559753), ('lattice rule', 0.5407083034515381), ('lattice based', 0.47958654165267944), ('polynomial lattice', 0.4355095326900482), ('rank lattices', 0.4335857927799225), ('lattice', 0.42821910977363586), ('rank lattice', 0.4151711165904999), ('lattice point sets', 0.3885737657546997), ('randomized algorithms', 0.3856908679008484)]" 558,558,55,558_millimeter wave_beam training_wave mmwave terahertz_beam training overhead,"['millimeter wave', 'beam training', 'wave mmwave terahertz', 'beam training overhead', 'mmwave terahertz', 'mmwave communications', 'millimeter wave mmwave', 'mmwave terahertz thz', 'mmwave communication', 'terahertz communication']","['Radar Aided 6G Beam Prediction: Deep Learning Algorithms and Real-World\n Demonstration This paper presents the first machine learning based real-world demonstration\nfor radar-aided beam prediction in a practical vehicular communication\nscenario. Leveraging radar sensory data at the communication terminals provides\nimportant awareness about the transmitter/receiver locations and the\nsurrounding environment. This awareness could be utilized to reduce or even\neliminate the beam training overhead in millimeter wave (mmWave) and\nsub-terahertz (THz) MIMO communication systems, which enables a wide range of\nhighly-mobile low-latency applications. In this paper, we develop deep learning\nbased radar-aided beam prediction approaches for mmWave/sub-THz systems. The\ndeveloped solutions leverage domain knowledge for radar signal processing to\nextract the relevant features fed to the learning models. This optimizes their\nperformance, complexity, and inference time. The proposed radar-aided beam\nprediction solutions are evaluated using the large-scale real-world dataset\nDeepSense 6G, which comprises co-existing mmWave beam training and radar\nmeasurements. In addition to completely eliminating the radar/communication\ncalibration overhead, the experimental results showed that the proposed\nalgorithms are able to achieve around $90\\%$ top-5 beam prediction accuracy\nwhile saving $93\\%$ of the beam training overhead. This highlights a promising\ndirection for addressing the beam management overhead challenges in mmWave/THz\ncommunication systems.\n', 'LiDAR Aided Future Beam Prediction in Real-World Millimeter Wave V2I\n Communications This paper presents the first large-scale real-world evaluation for using\nLiDAR data to guide the mmWave beam prediction task. A machine learning (ML)\nmodel that leverages the LiDAR sensory data to predict the current and future\nbeams was developed. Based on the large-scale real-world dataset, DeepSense 6G,\nthis model was evaluated in a vehicle-to-infrastructure communication scenario\nwith highly-mobile vehicles. The experimental results show that the developed\nLiDAR-aided beam prediction and tracking model can predict the optimal beam in\n$95\\%$ of the cases and with more than $90\\%$ reduction in the beam training\noverhead. The LiDAR-aided beam tracking achieves comparable accuracy\nperformance to a baseline solution that has perfect knowledge of the previous\noptimal beams, without requiring any knowledge about the previous optimal beam\ninformation and without any need for beam calibration. This highlights a\npromising solution for the critical beam alignment challenges in mmWave and\nterahertz communication systems.\n', 'Computer Vision Aided Beam Tracking in A Real-World Millimeter Wave\n Deployment Millimeter-wave (mmWave) and terahertz (THz) communications require\nbeamforming to acquire adequate receive signal-to-noise ratio (SNR). To find\nthe optimal beam, current beam management solutions perform beam training over\na large number of beams in pre-defined codebooks. The beam training overhead\nincreases the access latency and can become infeasible for high-mobility\napplications. To reduce or even eliminate this beam training overhead, we\npropose to utilize the visual data, captured for example by cameras at the base\nstations, to guide the beam tracking/refining process. We propose a machine\nlearning (ML) framework, based on an encoder-decoder architecture, that can\npredict the future beams using the previously obtained visual sensing\ninformation. Our proposed approach is evaluated on a large-scale real-world\ndataset, where it achieves an accuracy of $64.47\\%$ (and a normalized receive\npower of $97.66\\%$) in predicting the future beam. This is achieved while\nrequiring less than $1\\%$ of the beam training overhead of a corresponding\nbaseline solution that uses a sequence of previous beams to predict the future\none. This high performance and low overhead obtained on the real-world dataset\ndemonstrate the potential of the proposed vision-aided beam tracking approach\nin real-world applications.\n']","[('millimeter wave', 0.4696437120437622), ('beam training', 0.43816253542900085), ('wave mmwave terahertz', 0.43346068263053894), ('beam training overhead', 0.431839257478714), ('mmwave terahertz', 0.42110270261764526), ('mmwave communications', 0.4063487648963928), ('millimeter wave mmwave', 0.40585818886756897), ('mmwave terahertz thz', 0.3938080668449402), ('mmwave communication', 0.38885363936424255), ('terahertz communication', 0.38171449303627014)]" 559,559,55,559_5g nr_5g_sensing 6g_positioning accuracy,"['5g nr', '5g', 'sensing 6g', 'positioning accuracy', 'indoor localization', '5g mmwave', 'localization accuracy', 'localization sensing', 'cellular network', 'mmwave communication']","['Angle-based SLAM on 5G mmWave Systems: Design, Implementation, and\n Measurement Simultaneous localization and mapping (SLAM) is a key technology that\nprovides user equipment (UE) tracking and environment mapping services,\nenabling the deep integration of sensing and communication. The millimeter-wave\n(mmWave) communication, with its larger bandwidths and antenna arrays,\ninherently facilitates more accurate delay and angle measurements than sub-6\nGHz communication, thereby providing opportunities for SLAM. However, none of\nthe existing works have realized the SLAM function under the 5G New Radio (NR)\nstandard due to specification and hardware constraints. In this study, we\ninvestigate how 5G mmWave communication systems can achieve situational\nawareness without changing the transceiver architecture and 5G NR standard. We\nimplement 28 GHz mmWave transceivers that deploy OFDM-based 5G NR waveform with\n160 MHz channel bandwidth, and we realize beam management following the 5G NR.\nFurthermore, we develop an efficient successive cancellation-based angle\nextraction approach to obtain angles of arrival and departure from the\nreference signal received power measurements. On the basis of angle\nmeasurements, we propose an angle-only SLAM algorithm to track UE and map\nfeatures in the radio environment. Thorough experiments and ray tracing-based\ncomputer simulations verify that the proposed angle-based SLAM can achieve\nsub-meter level localization and mapping accuracy with a single base station\nand without the requirement of strict time synchronization. Our experiments\nalso reveal many propagation properties critical to the success of SLAM in 5G\nmmWave communication systems.\n', '5G NR Positioning Enhancements in 3GPP Release-18 New radio (NR) positioning in the Third Generation Partnership Project (3GPP)\nRelease 18 (Rel-18) enables 5G-advanced networks to achieve ultra-high accuracy\npositioning without dependence on global navigation satellite systems (GNSS)\nwith key enablers such as the carrier phase positioning technique, standardized\nfor the first time in a cellular communications standard and setting a new\nbaseline for future generations. In addition, Rel-18 NR supports positioning\nfunctionalities for reduced capability (RedCap) user equipment and bandwidth\naggregation for positioning measurements. Moreover, the low power solutions are\ndesigned for low power high accuracy positioning use cases. Lastly,\nsidelink-based positioning is introduced in Rel-18. This article constitutes a\ncomprehensive treatment of the Rel-18 NR positioning enhancements crucial for\nthe development of next-generation networks.\n', ""Dynamic Selective Positioning for High-Precision Accuracy in 5G NR V2X\n Networks The capability to achieve high-precision positioning accuracy has been\nconsidered as one of the most critical requirements for vehicle-to-everything\n(V2X) services in the fifth-generation (5G) cellular networks. The\nnon-line-of-sight (NLOS) connectivity, coverage, reliability requirements, the\nminimum number of available anchors, and bandwidth limitations are among the\nmain challenges to achieve high accuracy in V2X services. This work provides an\noverview of the potential solutions to provide the new radio (NR) V2X users\n(UEs) with high positioning accuracy in the future 3GPP releases. In\nparticular, we propose a novel selective positioning solution to dynamically\nswitch between different positioning technologies to improve the overall\npositioning accuracy in NR V2X services, taking into account the locations of\nV2X UEs and the accuracy of the collected measurements. Furthermore, we use\nhigh-fidelity system-level simulations to evaluate the performance gains of\nfusing the positioning measurements from different technologies in NR V2X\nservices. Our numerical results show that the proposed hybridized schemes\nachieve a positioning error $\\boldsymbol{\\leq}$ 3 m with $\\boldsymbol{\\approx}$\n76\\% availability compared to $\\boldsymbol{\\approx}$ 55\\% availability when\ntraditional positioning methods are used. The numerical results also reveal a\npotential gain of $\\boldsymbol{\\approx}$ 56\\% after leveraging the road-side\nunits (RSUs) to improve the tail of the UE's positioning error distribution,\ni.e., worst-case scenarios, in NR V2X services.\n""]","[('5g nr', 0.537726640701294), ('5g', 0.4851677417755127), ('sensing 6g', 0.4771285951137543), ('positioning accuracy', 0.47452059388160706), ('indoor localization', 0.4533942937850952), ('5g mmwave', 0.44704243540763855), ('localization accuracy', 0.4158201813697815), ('localization sensing', 0.41502076387405396), ('cellular network', 0.4006536304950714), ('mmwave communication', 0.35750389099121094)]" 560,560,55,560_porous medium equations_solutions porous medium_porous medium type_solutions porous,"['porous medium equations', 'solutions porous medium', 'porous medium type', 'solutions porous', 'equations porous', 'weak solutions', 'existence weak solutions', 'boundary solutions', 'nonnegative weak solutions', 'medium type equations']","['Regularity theory for fully nonlinear equations of porous medium-type In this paper, we establish the regularity results for nonnegative viscosity\nsolutions to fully nonlinear equations of porous medium-type in bounded domains\nwith the zero Dirichlet boundary condition, to be precise, we prove the global\n$C^{2,\\alpha}$-estimates of viscosity solutions. In many PDE problems, the\n$C^{2,\\alpha}$-estimates have been obtained through Schauder-type estimates.\nHowever, the Schauder-type estimates are not applicable to the porous\nmedium-type equations. We provide techniques for handling porous medium-type\nequations so that the global $C^{2,\\alpha}$-estimates can be established.\n', 'Higher integrability in the obstacle problem for the fast diffusion\n equation We prove local higher integrability of the spatial gradient for solutions to\nobstacle problems of porous medium type in the fast diffusion case $m<1$. The\nresult holds for the natural range of exponents that is known from other\nregularity results for porous medium type equations. We also cover the case of\nsigned solutions.\n', 'Continuity up to the boundary for obstacle problems to porous medium\n type equations We show that signed weak solutions to obstacle problems for porous medium\ntype equations with Cauchy-Dirichlet boundary data are continuous up to the\nparabolic boundary, provided that the obstacle and boundary data are\ncontinuous. This result seems to be new even for signed solutions to the\n(obstacle free) Cauchy-Dirichlet problem to the singular porous medium\nequation, which is retrieved as a special case.\n']","[('porous medium equations', 0.7135329246520996), ('solutions porous medium', 0.6617616415023804), ('porous medium type', 0.5655531287193298), ('solutions porous', 0.5587399005889893), ('equations porous', 0.5571248531341553), ('weak solutions', 0.5431632995605469), ('existence weak solutions', 0.5338497757911682), ('boundary solutions', 0.5326562523841858), ('nonnegative weak solutions', 0.5198605060577393), ('medium type equations', 0.5070761442184448)]" 561,561,55,561_ridge regression_ridge regularization_ridge estimator_prediction risk,"['ridge regression', 'ridge regularization', 'ridge estimator', 'prediction risk', 'generalized cross validation', 'ridge', 'regularization', 'sample prediction', 'random matrix theory', 'regularization parameter']","['Subsample Ridge Ensembles: Equivalences and Generalized Cross-Validation We study subsampling-based ridge ensembles in the proportional asymptotics\nregime, where the feature size grows proportionally with the sample size such\nthat their ratio converges to a constant. By analyzing the squared prediction\nrisk of ridge ensembles as a function of the explicit penalty $\\lambda$ and the\nlimiting subsample aspect ratio $\\phi_s$ (the ratio of the feature size to the\nsubsample size), we characterize contours in the $(\\lambda, \\phi_s)$-plane at\nany achievable risk. As a consequence, we prove that the risk of the optimal\nfull ridgeless ensemble (fitted on all possible subsamples) matches that of the\noptimal ridge predictor. In addition, we prove strong uniform consistency of\ngeneralized cross-validation (GCV) over the subsample sizes for estimating the\nprediction risk of ridge ensembles. This allows for GCV-based tuning of full\nridgeless ensembles without sample splitting and yields a predictor whose risk\nmatches optimal ridge risk.\n', 'Asymptotically free sketched ridge ensembles: Risks, cross-validation,\n and tuning We employ random matrix theory to establish consistency of generalized cross\nvalidation (GCV) for estimating prediction risks of sketched ridge regression\nensembles, enabling efficient and consistent tuning of regularization and\nsketching parameters. Our results hold for a broad class of asymptotically free\nsketches under very mild data assumptions. For squared prediction risk, we\nprovide a decomposition into an unsketched equivalent implicit ridge bias and a\nsketching-based variance, and prove that the risk can be globally optimized by\nonly tuning sketch size in infinite ensembles. For general subquadratic\nprediction risk functionals, we extend GCV to construct consistent risk\nestimators, and thereby obtain distributional convergence of the GCV-corrected\npredictions in Wasserstein-2 metric. This in particular allows construction of\nprediction intervals with asymptotically correct coverage conditional on the\ntraining data. We also propose an ""ensemble trick"" whereby the risk for\nunsketched ridge regression can be efficiently estimated via GCV using small\nsketched ridge ensembles. We empirically validate our theoretical results using\nboth synthetic and real large-scale datasets with practical sketches including\nCountSketch and subsampled randomized discrete cosine transforms.\n', ""The distribution of Ridgeless least squares interpolators The Ridgeless minimum $\\ell_2$-norm interpolator in overparametrized linear\nregression has attracted considerable attention in recent years. While it seems\nto defy the conventional wisdom that overfitting leads to poor prediction,\nrecent research reveals that its norm minimizing property induces an `implicit\nregularization' that helps prediction in spite of interpolation. This renders\nthe Ridgeless interpolator a theoretically tractable proxy that offers useful\ninsights into the mechanisms of modern machine learning methods.\n This paper takes a different perspective that aims at understanding the\nprecise stochastic behavior of the Ridgeless interpolator as a statistical\nestimator. Specifically, we characterize the distribution of the Ridgeless\ninterpolator in high dimensions, in terms of a Ridge estimator in an associated\nGaussian sequence model with positive regularization, which plays the role of\nthe prescribed implicit regularization in the context of prediction risk. Our\ndistributional characterizations hold for general random designs and extend\nuniformly to positively regularized Ridge estimators. As a demonstration of the\nanalytic power of these characterizations, we derive approximate formulae for a\ngeneral class of weighted $\\ell_q$ risks for Ridge(less) estimators that were\npreviously available only for $\\ell_2$. Our theory also provides certain\nfurther conceptual reconciliation with the conventional wisdom: given any data\ncovariance, a certain amount of regularization in Ridge regression remains\nbeneficial for `most' signals across various statistical tasks including\nprediction, estimation and inference, as long as the noise level is\nnon-trivial. Surprisingly, optimal tuning can be achieved simultaneously for\nall the designated statistical tasks by a single generalized or $k$-fold\ncross-validation scheme, despite being designed specifically for tuning\nprediction risk.\n""]","[('ridge regression', 0.5725917220115662), ('ridge regularization', 0.5664570331573486), ('ridge estimator', 0.5568039417266846), ('prediction risk', 0.4053715467453003), ('generalized cross validation', 0.4016422629356384), ('ridge', 0.3963067829608917), ('regularization', 0.3800205588340759), ('sample prediction', 0.37578052282333374), ('random matrix theory', 0.3738304674625397), ('regularization parameter', 0.3645648658275604)]" 562,562,55,562_valued convex_valuation theory_convex bodies_finite convex,"['valued convex', 'valuation theory', 'convex bodies', 'finite convex', 'convex functions', 'valuations', 'convex geometry', 'valuation', 'finite valued', 'space valuations']","['Smooth valuations on convex functions We construct valuations on the space of finite-valued convex functions using\nintegration of differential forms over the differential cycle associated to a\nconvex function. We describe the kernel of this procedure and show that the\nintersection of this space of smooth valuations with the space of all\ncontinuous dually epi-translation invariant valuations on convex functions is\ndense in the latter. As an application, we obtain a description of\n1-homogeneous, continuous, dually epi-translation invariant valuations that are\ninvariant with respect to a compact subgroup operating transitively on the unit\nsphere.\n', 'From valuations on convex bodies to convex functions A geometric framework relating valuations on convex bodies to valuations on\nconvex functions is introduced. It is shown that a classical result by McMullen\ncan be used to obtain a characterization of continuous, epi-translation\ninvariant, and n-epi-homogeneous valuations on convex functions, which was\npreviously established by Colesanti, Ludwig, and Mussnig. Following an approach\nby Goodey and Weil, a new characterization of 1-epi-homogeneous valuations is\nobtained.\n', 'The support of dually epi-translation invariant valuations on convex\n functions We study dually epi-translation invariant valuations on cones of convex\nfunctions containing the space of finite-valued convex functions. The existence\nof a homogeneous decomposition is used to associate a distribution to every\nvaluation of this type similar to the Goodey-Weil embedding for translation\ninvariant valuations on convex bodies. The relation between the valuation and\nits associated distribution is used to establish a notion of support for\nvaluations. As an application, we show that there are no $\\mathrm{SL}(n)$ or\ntranslation invariant valuations except constant valuations in this class and\nwe discuss which valuations on finite-valued convex functions can be extended\nto larger cones. In addition, we examine some topological properties of spaces\nof valuations with compact support.\n']","[('valued convex', 0.5761333107948303), ('valuation theory', 0.5334601998329163), ('convex bodies', 0.5064535140991211), ('finite convex', 0.4982152581214905), ('convex functions', 0.4798067510128021), ('valuations', 0.46919432282447815), ('convex geometry', 0.46209731698036194), ('valuation', 0.4608435332775116), ('finite valued', 0.4474365711212158), ('space valuations', 0.42639774084091187)]" 563,563,55,563_steiner trees_steiner tree_minimum spanning tree_spanning trees,"['steiner trees', 'steiner tree', 'minimum spanning tree', 'spanning trees', 'spanning tree', 'steiner', 'minimum spanning', 'weighted tree', 'adjacency', 'shortest paths']","['The Central Spanning Tree Problem Spanning trees are an important primitive in many data analysis tasks, when a\ndata set needs to be summarized in terms of its ""skeleton"", or when a\ntree-shaped graph over all observations is required for downstream processing.\nPopular definitions of spanning trees include the minimum spanning tree and the\noptimum distance spanning tree, a.k.a. the minimum routing cost tree. When\nsearching for the shortest spanning tree but admitting additional branching\npoints, even shorter spanning trees can be realized: Steiner trees.\nUnfortunately, both minimum spanning and Steiner trees are not robust with\nrespect to noise in the observations; that is, small perturbations of the\noriginal data set often lead to drastic changes in the associated spanning\ntrees. In response, we make two contributions when the data lies in a Euclidean\nspace: on the theoretical side, we introduce a new optimization problem, the\n""(branched) central spanning tree"", which subsumes all previously mentioned\ndefinitions as special cases. On the practical side, we show empirically that\nthe (branched) central spanning tree is more robust to noise in the data, and\nas such is better suited to summarize a data set in terms of its skeleton. We\nalso propose a heuristic to address the NP-hard optimization problem, and\nillustrate its use on single cell RNA expression data from biology and 3D point\nclouds of plants.\n', 'Local Search for Weighted Tree Augmentation and Steiner Tree We present a technique that allows for improving on some relative greedy\nprocedures by well-chosen (non-oblivious) local search algorithms. Relative\ngreedy procedures are a particular type of greedy algorithm that start with a\nsimple, though weak, solution, and iteratively replace parts of this starting\nsolution by stronger components. Some well-known applications of relative\ngreedy algorithms include approximation algorithms for Steiner Tree and, more\nrecently, for connectivity augmentation problems.\n The main application of our technique leads to a\n$(1.5+\\epsilon)$-approximation for Weighted Tree Augmentation, improving on a\nrecent relative greedy based method with approximation factor $1+\\ln 2 +\n\\epsilon\\approx 1.69$. Furthermore, we show how our local search technique can\nbe applied to Steiner Tree, leading to an alternative way to obtain the\ncurrently best known approximation factor of $\\ln 4 + \\epsilon$. Contrary to\nprior methods, our approach is purely combinatorial without the need to solve\nan LP. Nevertheless, the solution value can still be bounded in terms of the\nwell-known hypergraphic LP, leading to an alternative, and arguably simpler,\ntechnique to bound its integrality gap by $\\ln 4$.\n', 'Lower bounds for the integrality gap of the bi-directed cut formulation\n of the Steiner Tree Problem In this work, we study the metric Steiner Tree problem on graphs focusing on\ncomputing lower bounds for the integrality gap of the bi-directed cut (BCR)\nformulation and introducing a novel formulation, the Complete Metric (CM)\nmodel, specifically designed to address the weakness of the BCR formulation on\nmetric instances. A key contribution of our work is extending the Gap problem,\npreviously explored in the context of the Traveling Salesman problems, to the\nmetric Steiner Tree problem. To tackle the Gap problem for Steiner Tree\ninstances, we first establish several structural properties of the CM\nformulation. We then classify the isomorphism classes of the vertices within\nthe CM polytope, revealing a correspondence between the vertices of the BCR and\nCM polytopes. Computationally, we exploit these structural properties to design\ntwo complementary heuristics for finding nontrivial small metric Steiner\ninstances with a large integrality gap. We present several vertices for graphs\nwith a number of nodes <=10, which realize the best-known lower bounds on the\nintegrality gap for the CM and the BCR formulations. We conclude the paper by\npresenting two new conjectures on the integrality gap of the BCR and CM\nformulations for small graphs.\n']","[('steiner trees', 0.6721805930137634), ('steiner tree', 0.6232283115386963), ('minimum spanning tree', 0.5395301580429077), ('spanning trees', 0.5295649170875549), ('spanning tree', 0.4824182093143463), ('steiner', 0.4669835567474365), ('minimum spanning', 0.46320265531539917), ('weighted tree', 0.4368390142917633), ('adjacency', 0.4254823625087738), ('shortest paths', 0.41221946477890015)]" 564,564,55,564_selmer groups elliptic_selmer groups_supersingular elliptic curves_groups elliptic curves,"['selmer groups elliptic', 'selmer groups', 'supersingular elliptic curves', 'groups elliptic curves', 'selmer group', 'theory elliptic curves', 'groups elliptic', 'elliptic curves', 'iwasawa invariants', 'elliptic curves let']","['$\\Lambda$-submodules of finite index of anticyclotomic plus and minus\n Selmer groups of elliptic curves Let $p$ be an odd prime and $K$ an imaginary quadratic field where $p$\nsplits. Under appropriate hypotheses, Bertolini showed that the Selmer group of\na $p$-ordinary elliptic curve over the anticyclotomic $\\mathbb Z_p$-extension\nof $K$ does not admit any proper $\\Lambda$-submodule of finite index, where\n$\\Lambda$ is a suitable Iwasawa algebra. We generalize this result to the plus\nand minus Selmer groups (in the sense of Kobayashi) of $p$-supersingular\nelliptic curves. In particular, in our setting the plus/minus Selmer groups\nhave $\\Lambda$-corank one, so they are not $\\Lambda$-cotorsion. As an\napplication of our main theorem, we prove results in the vein of\nGreenberg-Vatsal on Iwasawa invariants of $p$-congruent elliptic curves,\nextending to the supersingular case results for $p$-ordinary elliptic curves\ndue to Hatley-Lei.\n', 'On the signed Selmer groups for motives at non-ordinary primes in\n $\\mathbb{Z}_p^2$-extensions Generalizing the work of Kobayashi and the second author for elliptic curves\nwith supersingular reduction at the prime $p$, B\\""uy\\""ukboduk and Lei\nconstructed multi-signed Selmer groups over the cyclotomic\n$\\mathbb{Z}_p$-extension of a number field $F$ for more general non-ordinary\nmotives. In particular, their construction applies to abelian varieties over\n$F$ with good supersingular reduction at all the primes of $F$ above $p$. In\nthis article, we scrutinize the case in which $F$ is imaginary quadratic, and\nprove a control theorem (that generalizes Kim\'s control theorem for elliptic\ncurves) of multi-signed Selmer groups of non-ordinary motives over the maximal\nabelian pro-$p$ extension of $F$ that is unramified outside $p$, which is the\n$\\mathbb{Z}_p^2$-extension of $F$. We apply it to derive a sufficient condition\nwhen these multi-signed Selmer groups are cotorsion over the corresponding\ntwo-variable Iwasawa algebra. Furthermore, we compare the Iwasawa\n$\\mu$-invariants of multi-signed Selmer groups over the\n$\\mathbb{Z}_p^2$-extension for two such representations which are congruent\nmodulo $p$.\n', 'Conjecture A and $\\mu$-invariant for Selmer groups of supersingular\n elliptic curves Let $p$ be an odd prime and let $E$ be an elliptic curve defined over a\nnumber field $F$ with good reduction at primes above $p$. In this survey\narticle, we give an overview of some of the important results proven for the\nfine Selmer group and the signed Selmer groups over cyclotomic towers as well\nas the signed Selmer groups over $\\mathbb{Z}_p^2$-extensions of an imaginary\nquadratic field where $p$ splits completely. We only discuss the algebraic\naspects of these objects through Iwasawa theory. We also attempt to give some\nof the recent results implying the vanishing of the $\\mu$-invariant under the\nhypothesis of Conjecture A. Moreover, we draw an analogy between the classical\nSelmer group in the ordinary reduction case and that of the signed Selmer\ngroups of Kobayashi in the supersingular reduction case. We highlight\nproperties of signed Selmer groups (when $E$ has good supersingular reduction)\nwhich are completely analogous to the classical Selmer group (when $E$ has good\nordinary reduction). In this survey paper, we do not present any proofs,\nhowever we have tried to give references of the discussed results for the\ninterested reader.\n']","[('selmer groups elliptic', 0.7022711634635925), ('selmer groups', 0.6084024906158447), ('supersingular elliptic curves', 0.5808296799659729), ('groups elliptic curves', 0.575124204158783), ('selmer group', 0.5607745051383972), ('theory elliptic curves', 0.5601499080657959), ('groups elliptic', 0.4996313154697418), ('elliptic curves', 0.49871039390563965), ('iwasawa invariants', 0.4869324564933777), ('elliptic curves let', 0.482587605714798)]" 565,565,54,565_convex quadratic programming_mixed integer convex_integer convex_convex hull,"['convex quadratic programming', 'mixed integer convex', 'integer convex', 'convex hull', 'convex relaxations', 'integer nonlinear optimization', 'polyhedral relaxations', 'general linear programming', 'optimization formulations', 'linear programming']","[""Outer Approximation With Conic Certificates For Mixed-Integer Convex\n Problems A mixed-integer convex (MI-convex) optimization problem is one that becomes\nconvex when all integrality constraints are relaxed. We present a\nbranch-and-bound LP outer approximation algorithm for an MI-convex problem\ntransformed to MI-conic form. The polyhedral relaxations are refined with\n$\\mathcal{K}^*$ cuts derived from conic certificates for continuous primal-dual\nconic subproblems. Under the assumption that all subproblems are well-posed,\nthe algorithm detects infeasibility or unboundedness or returns an optimal\nsolution in finite time. Using properties of the conic certificates, we show\nthat the $\\mathcal{K}^*$ cuts imply certain practically-relevant guarantees\nabout the quality of the polyhedral relaxations, and demonstrate how to\nmaintain helpful guarantees when the LP solver uses a positive feasibility\ntolerance. We discuss how to disaggregate $\\mathcal{K}^*$ cuts in order to\ntighten the polyhedral relaxations and thereby improve the speed of\nconvergence, and propose fast heuristic methods of obtaining useful\n$\\mathcal{K}^*$ cuts. Our new open source MI-conic solver Pajarito\n(http://github.com/JuliaOpt/Pajarito.jl) uses an external mixed-integer linear\n(MILP) solver to manage the search tree and an external continuous conic solver\nfor subproblems. Benchmarking on a library of mixed-integer second-order cone\n(MISOCP) problems, we find that Pajarito greatly outperforms Bonmin (the\nleading open source alternative) and is competitive with CPLEX's specialized\nMISOCP algorithm. We demonstrate the robustness of Pajarito by solving diverse\nMI-conic problems involving mixtures of positive semidefinite, second-order,\nand exponential cones, and provide evidence for the practical value of our\nanalyses and enhancements of $\\mathcal{K}^*$ cuts.\n"", 'On the convex hull of convex quadratic optimization problems with\n indicators We consider the convex quadratic optimization problem with indicator\nvariables and arbitrary constraints on the indicators. We show that a convex\nhull description of the associated mixed-integer set in an extended space with\na quadratic number of additional variables consists of a single positive\nsemidefinite constraint (explicitly stated) and linear constraints. In\nparticular, convexification of this class of problems reduces to describing a\npolyhedral set in an extended formulation. While the vertex representation of\nthis polyhedral set is exponential and an explicit linear inequality\ndescription may not be readily available in general, we derive a compact\nmixed-integer linear formulation whose solutions coincide with the vertices of\nthe polyhedral set. We also give descriptions in the original space of\nvariables: we provide a description based on an infinite number of\nconic-quadratic inequalities, which are ``finitely generated."" In particular,\nit is possible to characterize whether a given inequality is necessary to\ndescribe the convex hull. The new theory presented here unifies several\npreviously established results, and paves the way toward utilizing polyhedral\nmethods to analyze the convex hull of mixed-integer nonlinear sets.\n', 'Convexification of bilinear terms over network polytopes It is well-known that the McCormick relaxation for the bilinear constraint\n$z=xy$ gives the convex hull over the box domains for $x$ and $y$. In network\napplications where the domain of bilinear variables is described by a network\npolytope, the McCormick relaxation, also referred to as linearization, fails to\nprovide the convex hull and often leads to poor dual bounds. We study the\nconvex hull of the set containing bilinear constraints $z_{i,j}=x_iy_j$ where\n$x_i$ represents the arc-flow variable in a network polytope, and $y_j$ is in a\nsimplex. For the case where the simplex contains a single $y$ variable, we\nintroduce a systematic procedure to obtain the convex hull of the above set in\nthe original space of variables, and show that all facet-defining inequalities\nof the convex hull can be obtained explicitly through identifying a special\ntree structure in the underlying network. For the generalization where the\nsimplex contains multiple $y$ variables, we design a constructive procedure to\nobtain an important class of facet-defining inequalities for the convex hull of\nthe underlying bilinear set that is characterized by a special forest structure\nin the underlying network. Computational experiments are presented to evaluate\nthe effectiveness of the proposed methods.\n']","[('convex quadratic programming', 0.6327882409095764), ('mixed integer convex', 0.6046164631843567), ('integer convex', 0.6011295914649963), ('convex hull', 0.5758158564567566), ('convex relaxations', 0.5650365352630615), ('integer nonlinear optimization', 0.5364458560943604), ('polyhedral relaxations', 0.5263542532920837), ('general linear programming', 0.5084383487701416), ('optimization formulations', 0.5052669644355774), ('linear programming', 0.5036247372627258)]" 566,566,54,566_permutation matrices_matrix entries_matrices bounded_binary matrix,"['permutation matrices', 'matrix entries', 'matrices bounded', 'binary matrix', 'matrix rows', 'submatrix', 'partitioned matrix', 'submatrices', 'matrices order', 'regular matrices']","['An exact characterization of saturation for permutation matrices A 0-1 matrix $M$ contains a 0-1 matrix pattern $P$ if we can obtain $P$ from\n$M$ by deleting rows and/or columns and turning arbitrary 1-entries into 0s.\nThe saturation function $\\mathrm{sat}(P,n)$ for a 0-1 matrix pattern $P$\nindicates the minimum number of 1s in an $n \\times n$ 0-1 matrix that does not\ncontain $P$, but changing any 0-entry into a 1-entry creates an occurrence of\n$P$. Fulek and Keszegh recently showed that each pattern has a saturation\nfunction either in $O(1)$ or in $\\Theta(n)$. We fully classify the saturation\nfunctions of permutation matrices.\n', 'Multivalued forbidden numbers of two-rowed configurations -- the missing\n cases The present paper considers extremal combinatorics questions in the language\nof matrices. An $s$-matrix is a matrix with entries in $\\{0,1,\\ldots, s-1\\}$.\nAn $s$-matrix is simple if it has no repeated columns. A matrix $F$ is a\nconfiguration in a matrix $A$, denoted $F\\prec A$, if it is a row/column\npermutation of a submatrix of $A$. $\\text{Avoid}(m,s,F)$ is the set of\n$m$-rowed, simple $s$-matrices not containing a configuration of $F$ and\n$\\text{forb}(m,s, F)=\\max\\{|A|\\colon A \\in \\text{Avoid}(m,s,F)\\}$. Dillon and\nSali initiated the systematic study of $\\text{forb}(m,s, F)$ for $2$-matrices\n$F$, and computed $\\text{forb}(m,s, F)$ for all 2-rowed $F$ when $s>3$. In this\npaper we tackle the remaining cases when $s=3$. In particular, we determine the\nasymptotics of $\\text{forb}(m,3,p\\cdot K_2)-\\text{forb}(m,3,p\\cdot I_2)$ for\n$p>3$, where $K_2$ is the $2\\times 4$ simple $2$-matrix and $I_2$ is the\n$2\\times 2$ identity matrix, as well as the exact values of\n$\\text{forb}(m,3,F)$ for many 2-rowed $2$-matrices $F$.\n', 'An intermediate case of exponential multivalued forbidden matrix\n configuration The forbidden number forb$(m,F)$, which denotes the maximum number of\ndistinct columns in an $m$-rowed $(0,1)$-matrix with no submatrix that is a row\nand column permutation of $F$, has been widely studied in extremal set theory.\nRecently, this function was extended to $r$-matrices, whose entries lie in\n$\\{0,1,\\cdots,r-1\\}$. forb$(m,r,F)$ is the maximum number of distinct columns\nin an $r$-matrix with no submatrix that is a row and column permutation of $F$.\nWhile forb$(m,F)$ is polynomial in $m$, forb$(m,r,F)$ is exponential for $r\\geq\n3$. Recently, forb$(m,r,F)$ was studied for some small $(0,1)$-matrices $F$,\nand exact values were determined in some cases. In this paper we study\nforb$(m,r,M)$ for $M=\\begin{bmatrix}0&1\\\\0&1\\\\1&0\\end{bmatrix}$, which is the\nsmallest matrix for which this forbidden number is unknown. Interestingly, it\nturns out that this problem is closely linked with the following optimisation\nproblem. For each triangle in the complete graph $K_m$, pick one of its edges.\nLet $m_e$ denote the number of times edge $e$ is picked. For each\n$\\alpha\\in\\mathbb{R}$, what is $H(m,\\alpha)=\\max\\sum_{e\\in\nE(K_m)}\\alpha^{m_e}$? We establish a relationship between forb$(m,r,M)$ and\n$H(m,(r-1)/(r-2))$, find upper and lower bounds for $H(m,\\alpha)$, and use them\nto significantly improve known bounds for forb$(m,r,M)$.\n']","[('permutation matrices', 0.5066666603088379), ('matrix entries', 0.4693513810634613), ('matrices bounded', 0.42343586683273315), ('binary matrix', 0.42057672142982483), ('matrix rows', 0.41099777817726135), ('submatrix', 0.4081539213657379), ('partitioned matrix', 0.40441974997520447), ('submatrices', 0.39641860127449036), ('matrices order', 0.3888341784477234), ('regular matrices', 0.3874637186527252)]" 567,567,54,567_surface integrals_fast multipole_layer potentials_fast multipole fmm,"['surface integrals', 'fast multipole', 'layer potentials', 'fast multipole fmm', 'double layer potential', 'multipole', 'layer potential', 'multipole fmm', 'single layer potential', 'quadrature expansion']","['On the Approximation of Local Expansions of Laplace Potentials by the\n Fast Multipole Method In this paper, we present a generalization of the classical error bounds of\nGreengard-Rokhlin for the Fast Multipole Method (FMM) for Laplace potentials in\nthree dimensions, extended to the case of local expansion (instead of point)\ntargets. We also present a complementary, less sharp error bound proven via\napproximation theory whose applicability is not restricted to Laplace\npotentials. Our study is motivated by the GIGAQBX FMM, an algorithm for the\nfast, high-order accurate evaluation of layer potentials near and on the source\nlayer. GIGAQBX is based on the FMM, but unlike a conventional FMM, which is\ndesigned to evaluate potentials at point-shaped targets, GIGAQBX evaluates\nlocal expansions of potentials at ball-shaped targets. Although the accuracy\n(or the acceleration error, i.e., error due to the approximation of the\npotential by the fast algorithm) of the conventional FMM is well understood,\nthe acceleration error of FMM-based algorithms applied to the evaluation of\nlocal expansions has not been as well studied. The main contribution of this\npaper is a proof of a set of hypotheses first demonstrated numerically in the\npaper ""A Fast Algorithm for Quadrature by Expansion in Three Dimensions,"" which\npertain to the accuracy of FMM approximation of local expansions of Laplace\npotentials in three dimensions. These hypotheses are also essential to the\nthree-dimensional error bound for GIGAQBX, which was previously stated\nconditionally on their truth and can now be stated unconditionally.\n', ""Fast Multipole Method for 3-D Linearized Poisson-Boltzmann Equation in\n Layered Media In this paper, we propose a fast multipole method (FMM) for 3-D linearized\nPoisson-Boltzmann (PB) equation in layered media. The main framework of the\nalgorithm is analogous to the FMM for Helmholtz and Laplace equation in layered\nmedia [1,2], using an extension of the Funk-Hecke formula for pure imaginary\nwave number. Moreover, a recurrence formula is provided for the run-time\ncomputation of the Sommerfeld-type integrals used in the FMM algorithm. Due to\nthe similarity between Helmholtz and linearized PB equation, the recurrence\nformula can also be used for the FMM of Helmholtz equation in layered media\nwith minor changes as mentioned in [1] . Numerical results validate that the\nFMM for interactions of charges under screen's potentials in layered media has\nthe same accuracy and CPU complexity as the classic FMM for charge interactions\nin free space.\n"", 'Fast multipole method for 3-D Laplace equation in layered media In this paper, a fast multipole method (FMM) is proposed for 3-D Laplace\nequation in layered media. The potential due to charges embedded in layered\nmedia is decomposed into a free space component and four types of reaction\nfield components, and the latter can be associated with the potential of a\npolarization source defined for each type. New multipole expansions (MEs) and\nlocal expansions (LEs), as well as the multipole to local (M2L) translation\noperators are derived for the reaction components, based on which the FMMs for\nreaction components are then proposed. The resulting FMM for charge\ninteractions in layered media is a combination of using the classic FMM for the\nfree space components and the new FMMs for the reaction field components. With\nthe help of a recurrence formula for the run-time computation of the\nSommerfeld-type integrals used in M2L translation operators, pre-computations\nof a large number of tables are avoided. The new FMMs for the reaction\ncomponents are found to be much faster than the classic FMM for the free space\ncomponents due to the separation of equivalent polarization charges and the\nassociated target charges by a material interface. As a result, the FMM for\npotential in layered media costs almost the same as the classic FMM in the free\nspace case. Numerical results validate the fast convergence of the MEs for the\nreaction components, and the O(N) complexity of the FMM with a given truncation\nnumber p for charge interactions in 3-D layered media.\n']","[('surface integrals', 0.5168631076812744), ('fast multipole', 0.4874567985534668), ('layer potentials', 0.4661477208137512), ('fast multipole fmm', 0.4607246220111847), ('double layer potential', 0.45141011476516724), ('multipole', 0.4299156367778778), ('layer potential', 0.42927780747413635), ('multipole fmm', 0.4256751537322998), ('single layer potential', 0.42496681213378906), ('quadrature expansion', 0.40934431552886963)]" 568,568,54,568_ginzburg landau equations_magnetization dynamics_landau equations_landau lifshitz gilbert,"['ginzburg landau equations', 'magnetization dynamics', 'landau equations', 'landau lifshitz gilbert', 'landau lifshitz', 'magnetization', 'ferromagnetic', 'magnetisation', 'landau', 'lifshitz gilbert']","['Recent results for the Landau-Lifshitz equation We give a survey on some recent results concerning the Landau-Lifshitz\nequation, a fundamental nonlinear PDE with a strong geometric content,\ndescribing the dynamics of the magnetization in ferromagnetic materials. We\nrevisit the Cauchy problem for the anisotropic Landau-Lifshitz equation,\nwithout dissipation, for smooth solutions, and also in the energy space in\ndimension one. We also examine two approximations of the Landau-Lifshitz\nequation given by of the Sine-Gordon equation and cubic Schr\\""odinger\nequations, arising in certain singular limits of strong easy-plane and\neasy-axis anisotropy, respectively.\n Concerning localized solutions, we review the orbital and asymptotic\nstability problems for a sum of solitons in dimension one, exploiting the\nvariational nature of the solitons in the hydrodynamical framework.\n Finally, we survey results concerning the existence, uniqueness and stability\nof self-similar solutions (expanders and shrinkers) for the isotropic\nLandau-Lifshitz equation with Gilbert term. Since expanders are associated with\na singular initial condition with a jump discontinuity, we also review their\nwell-posedness in spaces linked to the BMO space.\n', 'Well-Posedness and Finite Element Approximation for the\n Landau-Lifshitz-Gilbert Equation with Spin-Torques Spin currents act on ferromagnets by exerting a torque on the magnetisation.\nThis torque is modelled by appending additional terms to the\nLandau-Lifshitz-Gilbert equation motivating the study of the non-homogeneous\nLandau-Lifshitz-Gilbert equation. We first prove the existence and uniqueness\nof high regularity local solutions to this equation using the Faedo-Galerkin\nmethod. Then we construct a numerical method for the problem and prove that it\nconverges to a global weak solution of the PDE. Numerical simulations of the\nproblem are also included.\n', 'On numerical aspects of parameter identification for the\n Landau-Lifshitz-Gilbert equation in Magnetic Particle Imaging The Landau-Lifshitz-Gilbert equation yields a mathematical model to describe\nthe evolution of the magnetization of a magnetic material, particularly in\nresponse to an external applied magnetic field. It allows one to take into\naccount various physical effects, such as the exchange within the magnetic\nmaterial itself. In particular, the Landau-Lifshitz-Gilbert equation encodes\nrelaxation effects, i.e., it describes the time-delayed alignment of the\nmagnetization field with an external magnetic field. These relaxation effects\nare an important aspect in magnetic particle imaging, particularly in the\ncalibration process. In this article, we address the data-driven modeling of\nthe system function in magnetic particle imaging, where the\nLandau-Lifshitz-Gilbert equation serves as the basic tool to include relaxation\neffects in the model. We formulate the respective parameter identification\nproblem both in the all-at-once and the reduced setting, present reconstruction\nalgorithms that yield a regularized solution and discuss numerical experiments.\nApart from that, we propose a practical numerical solver to the nonlinear\nLandau-Lifshitz-Gilbert equation, not via the classical finite element method,\nbut through solving only linear PDEs in an inverse problem framework.\n']","[('ginzburg landau equations', 0.5615898966789246), ('magnetization dynamics', 0.5580888390541077), ('landau equations', 0.5548179149627686), ('landau lifshitz gilbert', 0.5341891646385193), ('landau lifshitz', 0.47455108165740967), ('magnetization', 0.44522619247436523), ('ferromagnetic', 0.4228179454803467), ('magnetisation', 0.4204021692276001), ('landau', 0.38645055890083313), ('lifshitz gilbert', 0.3803773820400238)]" 569,569,54,569_supersingular elliptic curves_class elliptic curves_isogeny class_elliptic curves,"['supersingular elliptic curves', 'class elliptic curves', 'isogeny class', 'elliptic curves', 'isogeny', 'isogeny based cryptography', 'elliptic curves defined', 'isogeny based', 'elliptic curve', 'supersingular elliptic']","['Higher-degree supersingular group actions We investigate the isogeny graphs of supersingular elliptic curves over\n$\\mathbb{F}_{p^2}$ equipped with a $d$-isogeny to their Galois conjugate. These\ncurves are interesting because they are, in a sense, a generalization of curves\ndefined over $\\mathbb{F}_p$, and there is an action of the ideal class group of\n$\\mathbb{Q}(\\sqrt{-dp})$ on the isogeny graphs. We investigate constructive and\ndestructive aspects of these graphs in isogeny-based cryptography, including\ngeneralizations of the CSIDH cryptosystem and the Delfs-Galbraith algorithm.\n', 'A classification of isogeny-torsion graphs of $\\mathbb{Q}$-isogeny\n classes of elliptic curves Let $\\mathcal{E}$ be a $\\mathbb{Q}$-isogeny class of elliptic curves defined\nover $\\mathbb{Q}$. The isogeny graph associated to $\\mathcal{E}$ is a graph\nwhich has a vertex for each elliptic curve in the $\\mathbb{Q}$-isogeny class\n$\\mathcal{E}$, and an edge for each cyclic $\\mathbb{Q}$-isogeny of prime degree\nbetween elliptic curves in the isogeny class, with the degree recorded as a\nlabel of the edge. In this paper, we define an isogeny-torsion graph to be an\nisogeny graph where, in addition, we label each vertex with the abstract group\nstructure of the torsion subgroup over $\\mathbb{Q}$ of the corresponding\nelliptic curve. Then, the main result of the article is a classification of all\nthe possible isogeny-torsion graphs that occur for $\\mathbb{Q}$-isogeny classes\nof elliptic curves defined over the rationals.\n', 'Orientations and cycles in supersingular isogeny graphs The paper concerns several theoretical aspects of oriented supersingular\n$\\ell$-isogeny volcanoes and their relationship to closed walks in the\nsupersingular $\\ell$-isogeny graph. Our main result is a bijection between the\nrims of the union of all oriented supersingular $\\ell$-isogeny volcanoes over\n$\\overline{\\mathbb{F}}_p$ (up to conjugation of the orientations), and isogeny\ncycles (non-backtracking closed walks which are not powers of smaller walks) of\nthe supersingular $\\ell$-isogeny graph over $\\overline{\\mathbb{F}}_p$. The\nexact proof and statement of this bijection are made more intricate by special\nbehaviours arising from extra automorphisms and the ramification of $p$ in\ncertain quadratic orders. We use the bijection to count isogeny cycles of given\nlength in the supersingular $\\ell$-isogeny graph exactly as a sum of class\nnumbers of these orders, and also give an explicit upper bound by estimating\nthe class numbers.\n']","[('supersingular elliptic curves', 0.6762767434120178), ('class elliptic curves', 0.6265339851379395), ('isogeny class', 0.6215174794197083), ('elliptic curves', 0.61449134349823), ('isogeny', 0.611928403377533), ('isogeny based cryptography', 0.5815449357032776), ('elliptic curves defined', 0.5811377763748169), ('isogeny based', 0.5646113753318787), ('elliptic curve', 0.5311540961265564), ('supersingular elliptic', 0.5106186270713806)]" 570,570,54,570_biharmonic maps_harmonic biharmonic_biharmonic_hypersurfaces riemannian,"['biharmonic maps', 'harmonic biharmonic', 'biharmonic', 'hypersurfaces riemannian', 'biharmonicity', 'submanifolds riemannian', 'riemannian submersions', 'hypersurfaces euclidean', 'hypersurfaces space forms', 'submanifolds euclidean']","['Remarks on constructing biharmonic and conformal biharmonic maps to\n spheres Biharmonic and conformal biharmonic maps are two fourth-order generalizations\nof the well-studied notion of harmonic maps in Riemannian geometry. In this\narticle we consider maps into the Euclidean sphere and investigate a geometric\nalgorithm that aims at rendering a given harmonic map either biharmonic or\nconformally biharmonic.\n For biharmonic maps we find that in the case of a closed domain the maximum\nprinciple imposes strong restrictions on our approach, whereas there is more\nflexibility when we have a non-compact domain and we highlight this difference\nby a number of examples.\n Concerning conformal biharmonic maps we show that our algorithm produces\nexplicit critical points for maps between spheres. Moreover, it turns out that\nwe do not get strong restrictions as we obtain for biharmonic maps, such that\nour algorithm might produce additional conformal biharmonic maps between\nspheres beyond the ones found in this article.\n', '$f$-Biharmonic submanifolds in space forms and $f$-biharmonic Riemannian\n submersions from 3-manifolds $f$-Biharmonic maps are generalizations of harmonic maps and biharmonic maps.\nIn this paper, we obtain some descriptions of $f$-biharmonic curves in a space\nform. We also obtain a complete classification of proper $f$-biharmonic\nisometric immersions of a developable surface in $\\r^3$ by proving that a\nproper $f$-biharmonic developable surface exists only in the case where the\nsurface is a cylinder. Based on this, we show that a proper biharmonic\nconformal immersion of a developable surface into $\\r^3$ exists only in the\ncase when the surface is a cylinder. Riemannian submersions can be viewed as\nthe dual notion of isometric immersions (i.e., submanifolds). We also study\n$f$-biharmonicity of Riemannian submersions from 3-space forms by using the\nintegrability data. Examples are given of proper $f$-biharmonic Riemannian\nsubmersions and $f$-biharmonic surfaces and curves.\n', 'On conformal biharmonic maps and hypersurfaces In this article we initiate a thorough geometric study of the conformal\nbienergy functional which consists of the standard bienergy augmented by two\nadditional curvature terms. The conformal bienergy is conformally invariant in\ndimension four and its precise structure is motivated by the Paneitz operator\nfrom conformal geometry. The critical points of the conformal bienergy are\ncalled conformal biharmonic maps.\n Besides establishing a number of basic results on conformal biharmonic maps,\nwe pay special attention to conformal biharmonic hypersurfaces in space forms.\nFor hypersurfaces in spheres, we determine all conformal biharmonic\nhyperspheres and then we classify all conformal biharmonic generalized Clifford\ntori. Moreover, in sharp contrast to biharmonic hypersurfaces, we show that\nthere also exist conformal biharmonic hypersurfaces of hyperbolic space,\npointing out a fundamental difference between biharmonic and conformal\nbiharmonic hypersurfaces.\n Finally, we also study the stability of the conformal biharmonic hyperspheres\nin spheres and explicitly compute their index and nullity. In particular, we\nobtain that the index of the equator $\\mathbb{S}^4$ of $\\mathbb{S}^5$ is zero,\ni.e., it is stable, while the index of the equator $\\mathbb{S}^5$ of\n$\\mathbb{S}^6$ is seven.\n']","[('biharmonic maps', 0.7640111446380615), ('harmonic biharmonic', 0.722446084022522), ('biharmonic', 0.6398043632507324), ('hypersurfaces riemannian', 0.6263751983642578), ('biharmonicity', 0.6071684956550598), ('submanifolds riemannian', 0.5582473874092102), ('riemannian submersions', 0.5461894869804382), ('hypersurfaces euclidean', 0.5364722609519958), ('hypersurfaces space forms', 0.5340084433555603), ('submanifolds euclidean', 0.522759735584259)]" 571,571,54,571_compact ahler manifolds_ahler manifolds_compact kahler manifolds_compact ahler manifold,"['compact ahler manifolds', 'ahler manifolds', 'compact kahler manifolds', 'compact ahler manifold', 'kahler manifolds', 'ahler manifold', 'ahler manifolds non', 'kahler manifold', 'compact kahler', 'positive currents']","[""Loss of mass of non-pluripolar products It is a well-known fact that the non-pluripolar self-products of a closed\npositive (1,1)-current in a big nef cohomology class on a compact Kahler\nmanifold are not of full mass in the presence of positive Lelong numbers of the\ncurrent in consideration. In this paper, we give a quantitative version of the\nlast property. Our proof involves a generalization of Demailly's comparison of\nLelong numbers to the setting of density currents, a reversed\nAlexandrov-Fenchel inequality, and the notion of relative non-pluripolar\nproducts.\n"", 'The generalized Lelong numbers and intersection theory Let $X$ be a complex manifold of dimension $k,$ and $(V,\\omega)$ be a\nK\\""ahler submanifold of dimension $l$ in $X,$ and $B\\Subset V$ be a domain with\n$\\mathcal{C}^2$-smooth boundary. Let $T$ be a positive plurisubharmonic current\non $X$ such that $T$ satisfies a reasonable approximation condition on $X$ and\nnear $\\partial B.$ In our previous work we introduce the concept of the\ngeneralized Lelong numbers $\\nu_j(T,B)\\in\\mathbb{R}$ of $T$ along $B$ for\n$0\\leq j\\leq l.$ When $l=0,$ $V=B$ is a single point $x,$ $\\nu_0(T,B)$ is none\nother than the classical Lelong number of $T$ at $x.$\n This article has five purposes: Firstly, we formulate the notion of the\ngeneralized Lelong number of $T$ associated to every closed smooth $(j,j)$-form\non $V.$ This concept extends the previous notion of the generalized Lelong\nnumbers. We also establish their basic properties. Secondly, we define the\nhorizontal dimension $\\hbar$ of such a current $T$ along $B.$ Next, we\ncharacterize $\\hbar$ in terms of the generalized Lelong numbers. We also\nestablish a Siu\'s upper-semicontinuity type theorem for the generalized Lelong\nnumbers. In their above-mentioned context, Dinh and Sibony introduced some\ncohomology classes which may be regarded as their analogues of the classical\nLelong numbers. Our third objective is to generalize their notion to the\nbroader context where $T$ is (merely) positive pluriharmonic. Moreover, we also\nestablish a formula relating Dinh-Sibony classes and the generalized Lelong\nnumbers. Fourthly, we obtain an effective sufficient condition for defining the\nintersection of $m$ positive closed currents in the sense of Dinh-Sibony\'s\ntheory of tangent currents on a compact K\\""ahler manifold. Finally, we\nestablish an effective sufficient condition for the continuity of the above\nintersection.\n', 'Positive plurisubharmonic currents: Generalized Lelong numbers and\n Tangent theorems Dinh--Sibony theory of tangent and density currents is a recent but powerful\ntool to study positive closed currents. Over twenty years ago, Alessandrini and\nBassanelli initiated the theory of the Lelong number of a positive\nplurisubharmonic current in $\\mathbb{C}^k$ along a linear subspace. Although\nthe latter theory is intriguing, it has not yet been explored in-depth since\nthen. Introducing the concept of the generalized Lelong numbers and studying\nthese new numerical values, we extend both theories to a more general class of\npositive plurisubharmonic currents and in a more general context of ambient\nmanifolds.\n More specifically, in the first part of our article, we consider a positive\nplurisubharmonic current $T$ of bidegree $(p,p)$ on a complex manifold $X$ of\ndimension $k,$ and let $V\\subset X$ be a K\\""ahler submanifold of dimension $l$\nand $B$ a relatively compact piecewise $\\mathcal{C}^2$-smooth open subset of\n$V.$ We define the notion of the $j$-th Lelong number of $T$ along $B$ for\nevery $j$ with $\\max(0,l-p)\\leq j\\leq \\min(l,k-p)$ and prove their existence as\nwell as their basic properties.\n Our method relies on some Lelong-Jensen formulas for the normal bundle to $V$\nin $X,$ which are of independent interest.\n The second part of our article is devoted to geometric characterizations of\nthe generalized Lelong numbers. As a consequence of this study, we show that\nthe top degree Lelong number of $T$ along $B$ is totally intrinsic. This is a\ngeneralization of the fundamental result of Siu (for positive closed currents)\nand of Alessandrini--Bassanelli (for positive plurisubharmonic currents) on the\nindependence of Lelong numbers at a single point on the choice of coordinates.\n']","[('compact ahler manifolds', 0.5545623302459717), ('ahler manifolds', 0.5501444339752197), ('compact kahler manifolds', 0.5386043787002563), ('compact ahler manifold', 0.5360661149024963), ('kahler manifolds', 0.532922089099884), ('ahler manifold', 0.5258020758628845), ('ahler manifolds non', 0.524488627910614), ('kahler manifold', 0.5166493058204651), ('compact kahler', 0.5148895382881165), ('positive currents', 0.4538809359073639)]" 572,572,54,572_vehicle routing_capacitated vehicle routing_vehicle routing problems_deep reinforcement learning,"['vehicle routing', 'capacitated vehicle routing', 'vehicle routing problems', 'deep reinforcement learning', 'vehicle', 'traveling salesman', 'deep learning', 'travelling salesman', 'vehicles', 'deep reinforcement']","['A deep learning Attention model to solve the Vehicle Routing Problem and\n the Pick-up and Delivery Problem with Time Windows SNCF, the French public train company, is experimenting to develop new types\nof transportation services by tackling vehicle routing problems. While many\ndeep learning models have been used to tackle efficiently vehicle routing\nproblems, it is difficult to take into account time related constraints. In\nthis paper, we solve the Capacitated Vehicle Routing Problem with Time Windows\n(CVRPTW) and the Capacitated Pickup and Delivery Problem with Time Windows\n(CPDPTW) with a constructive iterative Deep Learning algorithm. We use an\nAttention Encoder-Decoder structure and design a novel insertion heuristic for\nthe feasibility check of the CPDPTW. Our models yields results that are better\nthan best known learning solutions on the CVRPTW. We show the feasibility of\ndeep learning techniques for solving the CPDPTW but witness the limitations of\nour iterative approach in terms of computational complexity.\n', 'Deep Reinforcement Learning for Solving the Heterogeneous Capacitated\n Vehicle Routing Problem Existing deep reinforcement learning (DRL) based methods for solving the\ncapacitated vehicle routing problem (CVRP) intrinsically cope with homogeneous\nvehicle fleet, in which the fleet is assumed as repetitions of a single\nvehicle. Hence, their key to construct a solution solely lies in the selection\nof the next node (customer) to visit excluding the selection of vehicle.\nHowever, vehicles in real-world scenarios are likely to be heterogeneous with\ndifferent characteristics that affect their capacity (or travel speed),\nrendering existing DRL methods less effective. In this paper, we tackle\nheterogeneous CVRP (HCVRP), where vehicles are mainly characterized by\ndifferent capacities. We consider both min-max and min-sum objectives for\nHCVRP, which aim to minimize the longest or total travel time of the vehicle(s)\nin the fleet. To solve those problems, we propose a DRL method based on the\nattention mechanism with a vehicle selection decoder accounting for the\nheterogeneous fleet constraint and a node selection decoder accounting for the\nroute construction, which learns to construct a solution by automatically\nselecting both a vehicle and a node for this vehicle at each step. Experimental\nresults based on randomly generated instances show that, with desirable\ngeneralization to various problem sizes, our method outperforms the\nstate-of-the-art DRL method and most of the conventional heuristics, and also\ndelivers competitive performance against the state-of-the-art heuristic method,\ni.e., SISR. Additionally, the results of extended experiments demonstrate that\nour method is also able to solve CVRPLib instances with satisfactory\nperformance.\n', ""A Deep Reinforcement Learning Approach for Solving the Traveling\n Salesman Problem with Drone Reinforcement learning has recently shown promise in learning quality\nsolutions in many combinatorial optimization problems. In particular, the\nattention-based encoder-decoder models show high effectiveness on various\nrouting problems, including the Traveling Salesman Problem (TSP).\nUnfortunately, they perform poorly for the TSP with Drone (TSP-D), requiring\nrouting a heterogeneous fleet of vehicles in coordination -- a truck and a\ndrone. In TSP-D, the two vehicles are moving in tandem and may need to wait at\na node for the other vehicle to join. State-less attention-based decoder fails\nto make such coordination between vehicles. We propose a hybrid model that uses\nan attention encoder and a Long Short-Term Memory (LSTM) network decoder, in\nwhich the decoder's hidden state can represent the sequence of actions made. We\nempirically demonstrate that such a hybrid model improves upon a purely\nattention-based model for both solution quality and computational efficiency.\nOur experiments on the min-max Capacitated Vehicle Routing Problem (mmCVRP)\nalso confirm that the hybrid model is more suitable for the coordinated routing\nof multiple vehicles than the attention-based model. The proposed model\ndemonstrates comparable results as the operations research baseline methods.\n""]","[('vehicle routing', 0.5047167539596558), ('capacitated vehicle routing', 0.4767903983592987), ('vehicle routing problems', 0.4429205656051636), ('deep reinforcement learning', 0.44116660952568054), ('vehicle', 0.3952752351760864), ('traveling salesman', 0.3913218379020691), ('deep learning', 0.3911551833152771), ('travelling salesman', 0.38640621304512024), ('vehicles', 0.3807438015937805), ('deep reinforcement', 0.3753458857536316)]" 573,573,54,573_hadamard matrices_hadamard matrices order_hadamard matrix_hadamard matrix order,"['hadamard matrices', 'hadamard matrices order', 'hadamard matrix', 'hadamard matrix order', 'hadamard conjecture', 'matrices introduced', 'dimensional hadamard', 'hadamard powers', 'hadamard', 'matrices whose entries']","['Implementing Hadamard Matrices in SageMath Hadamard matrices are $(-1, +1)$ square matrices with mutually orthogonal\nrows. The Hadamard conjecture states that Hadamard matrices of order $n$ exist\nwhenever $n$ is $1$, $2$, or a multiple of $4$. However, no construction is\nknown that works for all values of $n$, and for some orders no Hadamard matrix\nhas yet been found. Given the many practical applications of these matrices, it\nwould be useful to have a way to easily check if a construction for a Hadamard\nmatrix of order $n$ exists, and in case to create it. This project aimed to\naddress this, by implementing constructions of Hadamard and skew Hadamard\nmatrices to cover all known orders less than or equal to $1000$ in SageMath, an\nopen-source mathematical software. Furthermore, we implemented some additional\nmathematical objects, such as complementary difference sets and T-sequences,\nwhich were not present in SageMath but are needed to construct Hadamard\nmatrices.\n This also allows to verify the correctness of the results given in the\nliterature; within the $n\\leq 1000$ range, just one order, $292$, of a skew\nHadamard matrix claimed to have a known construction, required a fix.\n', ""A database of constructions of Hadamard matrices Hadamard matrices of order $n$ are conjectured to exist whenever $n$ is $1$,\n$2$, or a multiple of $4$; a similar conjecture exists for skew Hadamard\nmatrices. We provide constructions covering orders $\\le 1208$ of all known\nHadamard and skew Hadamard matrices in the open-source software SageMath. This\nallowed us to verify the correctness of results given in the literature. Within\nthis range, just one order, $292$, of a skew Hadamard matrix claimed to have a\nknown construction, required a fix.\n We also produce the up to date tables, for $n \\le 2999$ (resp. $n\\le 999$ for\nskew case), of the minimum exponents $m$ such that a (skew) Hadamard matrix of\norder $2^m n$ is known, improving over 100 entries in the previously published\nsources. We explain how tables' entries are related to Riesel numbers. As a\nby-product of the latter, we show that the Paley constructions of\n(skew-)Hadamard matrices do not work for the order $2^m 509203$, for any $m$.\n"", 'On Some Quaternionic Hadamard Matrices of Small Order We introduce Hadamard matrices whose entries are quaternionic. We then go on\nto provide classification of quaternionic Hadamard matrices of circulant core\nof orders 2 through 5. We also introduce quaternionic Hadamard matrices of\nButson type and ways to create quaternionic Hadamard matrices from real and\ncomplex Hadamard matrices. Examples are shown that showcase how Hadamard\nmatrices over the quaternions are richer than Hadamard matrices over the\ncomplex numbers.\n']","[('hadamard matrices', 0.8248621821403503), ('hadamard matrices order', 0.7964359521865845), ('hadamard matrix', 0.7600660920143127), ('hadamard matrix order', 0.7531813979148865), ('hadamard conjecture', 0.6325342059135437), ('matrices introduced', 0.5978678464889526), ('dimensional hadamard', 0.5908184051513672), ('hadamard powers', 0.5608043670654297), ('hadamard', 0.5597406625747681), ('matrices whose entries', 0.5592418313026428)]" 574,574,54,574_sparse pca_robust pca_component analysis sparse_component analysis pca,"['sparse pca', 'robust pca', 'component analysis sparse', 'component analysis pca', 'principal component analysis', 'robust principal component', 'pca', 'analysis pca', 'robust principal', 'principal components']","['Efficient Sparse PCA via Block-Diagonalization Sparse Principal Component Analysis (Sparse PCA) is a pivotal tool in data\nanalysis and dimensionality reduction. However, Sparse PCA is a challenging\nproblem in both theory and practice: it is known to be NP-hard and current\nexact methods generally require exponential runtime. In this paper, we propose\na novel framework to efficiently approximate Sparse PCA by (i) approximating\nthe general input covariance matrix with a re-sorted block-diagonal matrix,\n(ii) solving the Sparse PCA sub-problem in each block, and (iii) reconstructing\nthe solution to the original problem. Our framework is simple and powerful: it\ncan leverage any off-the-shelf Sparse PCA algorithm and achieve significant\ncomputational speedups, with a minor additive error that is linear in the\napproximation error of the block-diagonal matrix. Suppose $g(k, d)$ is the\nruntime of an algorithm (approximately) solving Sparse PCA in dimension $d$ and\nwith sparsity constant $k$. Our framework, when integrated with this algorithm,\nreduces the runtime to $\\mathcal{O}\\left(\\frac{d}{d^\\star} \\cdot g(k, d^\\star)\n+ d^2\\right)$, where $d^\\star \\leq d$ is the largest block size of the\nblock-diagonal matrix. For instance, integrating our framework with the\nBranch-and-Bound algorithm reduces the complexity from $g(k, d) =\n\\mathcal{O}(k^3\\cdot d^k)$ to $\\mathcal{O}(k^3\\cdot d \\cdot (d^\\star)^{k-1})$,\ndemonstrating exponential speedups if $d^\\star$ is small. We perform\nlarge-scale evaluations on many real-world datasets: for exact Sparse PCA\nalgorithm, our method achieves an average speedup factor of 100.50, while\nmaintaining an average approximation error of 0.61%; for approximate Sparse PCA\nalgorithm, our method achieves an average speedup factor of 6.00 and an average\napproximation error of -0.91%, meaning that our method oftentimes finds better\nsolutions.\n', 'Sparse PCA on fixed-rank matrices Sparse PCA is the optimization problem obtained from PCA by adding a sparsity\nconstraint on the principal components. Sparse PCA is NP-hard and hard to\napproximate even in the single-component case. In this paper we settle the\ncomputational complexity of sparse PCA with respect to the rank of the\ncovariance matrix. We show that, if the rank of the covariance matrix is a\nfixed value, then there is an algorithm that solves sparse PCA to global\noptimality, whose running time is polynomial in the number of features. We also\nprove a similar result for the version of sparse PCA which requires the\nprincipal components to have disjoint supports.\n', 'Extended Principal Component Analysis Principal Component Analysis (PCA) is a transform for finding the principal\ncomponents (PCs) that represent features of random data. PCA also provides a\nreconstruction of the PCs to the original data. We consider an extension of PCA\nwhich allows us to improve the associated accuracy and diminish the numerical\nload, in comparison with known techniques. This is achieved due to the special\nstructure of the proposed transform which contains two matrices $T_0$ and\n$T_1$, and a special transformation $\\mathcal{f}$ of the so called auxiliary\nrandom vector $\\mathbf w$. For this reason, we call it the three-term PCA. In\nparticular, we show that the three-term PCA always exists, i.e. is applicable\nto the case of singular data. Both rigorous theoretical justification of the\nthree-term PCA and simulations with real-world data are provided.\n']","[('sparse pca', 0.7785629630088806), ('robust pca', 0.6730216145515442), ('component analysis sparse', 0.6523062586784363), ('component analysis pca', 0.6108027100563049), ('principal component analysis', 0.6069961190223694), ('robust principal component', 0.591234564781189), ('pca', 0.5691501498222351), ('analysis pca', 0.5459249019622803), ('robust principal', 0.5410550832748413), ('principal components', 0.5356019139289856)]" 575,575,53,575_network centrality_centrality measures_centrality_networks vertices,"['network centrality', 'centrality measures', 'centrality', 'networks vertices', 'complex networks', 'network analysis', 'network science', 'network adjacency', 'centralization', 'important nodes']","['Harmonic Centrality in Some Graph Families One of the more recent measures of centrality in social network analysis is\nthe normalized harmonic centrality. A variant of the closeness centrality,\nharmonic centrality sums the inverse of the geodesic distances of each node to\nother nodes where it is 0 if there is no path from one node to another. It is\nthen normalized by dividing it by m-1, where m is the number of nodes of the\ngraph. In this paper, we present notions regarding the harmonic centrality of\nsome important classes of graphs.\n', 'Fast computation of matrix function-based centrality measures for\n layer-coupled multiplex networks Centrality measures identify and rank the most influential entities of\ncomplex networks. In this paper, we generalize matrix function-based centrality\nmeasures, which have been studied extensively for single-layer and temporal\nnetworks in recent years to layer-coupled multiplex networks. The layers of\nthese networks can reflect different relationships and interactions between\nentities or changing interactions over time. We use the supra-adjacency matrix\nas network representation, which has already been used to generalize\neigenvector centrality to temporal and multiplex networks. With a suitable\nchoice of edge weights, the definition of single-layer matrix function-based\ncentrality measures in terms of walks on networks carries over naturally to the\nmultilayer case. In contrast to other walk-based centralities, matrix\nfunction-based centralities are parameterized measures, which have been shown\nto interpolate between (local) degree and (global) eigenvector centrality in\nthe single-layer case. As the explicit evaluation of the involved matrix\nfunction expressions becomes infeasible for medium to large-scale networks, we\npresent highly efficient approximation techniques from numerical linear\nalgebra, which rely on Krylov subspace methods, Gauss quadrature, and\nstochastic trace estimation. We present extensive numerical studies on\nsynthetic and real-world multiplex transportation, communication, and\ncollaboration networks. The comparison with established multilayer centrality\nmeasures shows that our framework produces meaningful rankings of nodes,\nlayers, and node-layer pairs. Furthermore, our experiments corroborate the\ntheoretically indicated linear computational complexity of the employed\nnumerical methods for sparse supra-adjacency matrices, which allows the\nefficient treatment of large-scale networks with the number of node-layer pairs\nof order $10^7$ or higher.\n', 'Centrality measures for graphons: Accounting for uncertainty in networks As relational datasets modeled as graphs keep increasing in size and their\ndata-acquisition is permeated by uncertainty, graph-based analysis techniques\ncan become computationally and conceptually challenging. In particular, node\ncentrality measures rely on the assumption that the graph is perfectly known --\na premise not necessarily fulfilled for large, uncertain networks. Accordingly,\ncentrality measures may fail to faithfully extract the importance of nodes in\nthe presence of uncertainty. To mitigate these problems, we suggest a\nstatistical approach based on graphon theory: we introduce formal definitions\nof centrality measures for graphons and establish their connections to\nclassical graph centrality measures. A key advantage of this approach is that\ncentrality measures defined at the modeling level of graphons are inherently\nrobust to stochastic variations of specific graph realizations. Using the\ntheory of linear integral operators, we define degree, eigenvector, Katz and\nPageRank centrality functions for graphons and establish concentration\ninequalities demonstrating that graphon centrality functions arise naturally as\nlimits of their counterparts defined on sequences of graphs of increasing size.\nThe same concentration inequalities also provide high-probability bounds\nbetween the graphon centrality functions and the centrality measures on any\nsampled graph, thereby establishing a measure of uncertainty of the measured\ncentrality score. The same concentration inequalities also provide\nhigh-probability bounds between the graphon centrality functions and the\ncentrality measures on any sampled graph, thereby establishing a measure of\nuncertainty of the measured centrality score.\n']","[('network centrality', 0.7047029733657837), ('centrality measures', 0.6981902122497559), ('centrality', 0.5895329117774963), ('networks vertices', 0.5262851119041443), ('complex networks', 0.5112992525100708), ('network analysis', 0.5018473863601685), ('network science', 0.5003154873847961), ('network adjacency', 0.5000029802322388), ('centralization', 0.4732985198497772), ('important nodes', 0.4599999189376831)]" 576,576,53,576_measures fourier_almost periodicity_measure fourier_almost periodic,"['measures fourier', 'almost periodicity', 'measure fourier', 'almost periodic', 'periodic distributions', 'periodic sets', 'measure', 'measures', 'bounded measure', 'tempered distributions']","['Pure Point Diffraction and Mean, Besicovitch and Weyl Almost Periodicity We show that a translation bounded measure has pure point diffraction if and\nonly if it is mean almost periodic. We then go on and show that a translation\nbounded measure solves what we call the phase problem if and only if it is\nBesicovitch almost periodic. Finally, we show that a translation bounded\nmeasure solves the phase problem independent of the underlying van Hove\nsequence if and only if it is Weyl almost periodic. These results solve\nfundamental issues in the theory of pure point diffraction and answer questions\nof Lagarias.\n', 'On the Fourier Analysis of Measures with Meyer Set Support In this paper we show the existence of the generalized Eberlein decomposition\nfor Fourier transformable measures with Meyer set support. We prove that each\nof the three components is also Fourier transformable and has Meyer set\nsupport. We obtain that each of the pure point, absolutely continuous and\nsingular continuous components of the Fourier transform is a strong almost\nperiodic measure, and hence is either trivial or has relatively dense support.\nWe next prove that the Fourier transform of a measure with Meyer set support is\nnorm almost periodic, and hence so is each of the pure point, absolutely\ncontinuous and singular continuous components. We show that a measure with\nMeyer set support is Fourier transformable if and only if it is a linear\ncombination of positive definite measures, which can be chosen with Meyer set\nsupport, solving a particular case of an open problem. We complete the paper by\ndiscussing some applications to the diffraction of weighted Dirac combs with\nMeyer set support.\n', 'On Weakly Almost Periodic Measures We study the diffraction and dynamical properties of translation bounded\nweakly almost periodic measures. We prove that the dynamical hull of a weakly\nalmost periodic measure is a weakly almost periodic dynamical system with\nunique minimal component given by the hull of the strongly almost periodic\ncomponent of the measure. In particular the hull is minimal if and only if the\nmeasure is strongly almost periodic and the hull is always measurably conjugate\nto a torus and has pure point spectrum with continuous eigenfunctions. As an\napplication we show the stability of the class of weighted Dirac combs with\nMeyer set or FLC support and deduce that such measures have either trivial or\nlarge pure point respectively continuous spectrum. We complement these results\nby investigating the Eberlein convolution of two weakly almost periodic\nmeasures. Here, we show that it is unique and a strongly almost periodic\nmeasure. We conclude by studying the Fourier-Bohr coefficients of weakly almost\nperiodic measures.\n']","[('measures fourier', 0.6879010796546936), ('almost periodicity', 0.6286703944206238), ('measure fourier', 0.6280233860015869), ('almost periodic', 0.5788630247116089), ('periodic distributions', 0.5179911851882935), ('periodic sets', 0.4664420783519745), ('measure', 0.45926353335380554), ('measures', 0.4568881392478943), ('bounded measure', 0.45468512177467346), ('tempered distributions', 0.44849804043769836)]" 577,577,53,577_polytopes vertices_polytope vertices_edge polytopes_reflexive polytopes,"['polytopes vertices', 'polytope vertices', 'edge polytopes', 'reflexive polytopes', 'dimensional polytope', 'polytopes', 'dual polytope', 'reflexive polytope', 'simple polytope', 'simplicial polytopes']","[""A lower bound theorem for $d$-polytopes with $2d+2$ vertices We establish a lower bound theorem for the number of $k$-faces ($1\\le k\\le\nd-2$) in a $d$-dimensional polytope $P$ (abbreviated as a $d$-polytope) with\n$2d+2$ vertices, building on the known case for $k=1$. There are two distinct\nlower bounds depending on the number of facets in the $d$-polytope. We identify\nall minimisers for $d\\le 5$. If $P$ has $d+2$ facets, the lower bound is tight\nwhen $d$ is odd. For $d\\ge 5$ and $P$ with at least $d+3$ facets, the lower\nbound is always tight. Moreover, for $1\\le k\\le {d/3}-2$, minimisers among\n$d$-polytopes with $2d+2$ vertices are those with at least $d+3$ facets, while\nfor ${0.4d}\\le k\\le d-1$, the lower bound arises from $d$-polytopes with $d+2$\nfacets. These results support Pineda-Villavicencio's lower bound conjecture for\n$d$-polytopes with at most $3d-1$ vertices.\n"", ""A Positive Answer to B\\'ar\\'any's Question on Face Numbers of Polytopes Despite a full characterization of the face vectors of simple and simplicial\npolytopes, the face numbers of general polytopes are poorly understood. Around\n1997, B\\'ar\\'any asked whether for all convex $d$-polytopes $P$ and all $0 \\leq\nk \\leq d-1$, $f_k(P) \\geq \\min\\{f_0(P), f_{d-1}(P)\\}$. We answer B\\'ar\\'any's\nquestion in the affirmative and prove a stronger statement: for all convex\n$d$-polytopes $P$ and all $0 \\leq k \\leq d-1$, \\[ \\frac{f_k(P)}{f_0(P)} \\geq\n\\frac{1}{2}\\biggl[{\\lceil \\frac{d}{2} \\rceil \\choose k} + {\\lfloor \\frac{d}{2}\n\\rfloor \\choose k}\\biggr], \\qquad \\frac{f_k(P)}{f_{d-1}(P)} \\geq\n\\frac{1}{2}\\biggl[{\\lceil \\frac{d}{2} \\rceil \\choose d-k-1} + {\\lfloor\n\\frac{d}{2} \\rfloor \\choose d-k-1}\\biggr]. \\] In the former, equality holds\nprecisely when $k=0$ or when $k=1$ and $P$ is simple. In the latter, equality\nholds precisely when $k=d-1$ or when $k=d-2$ and $P$ is simplicial.\n"", 'Reflexive polytopes arising from edge polytopes It is known that every lattice polytope is unimodularly equivalent to a face\nof some reflexive polytope. A stronger question is to ask whether every\n$(0,1)$-polytope is unimodularly equivalent to a facet of some reflexive\npolytope. A large family of $(0,1)$-polytopes are the edge polytopes of finite\nsimple graphs. In the present paper, it is shown that, by giving a new class of\nreflexive polytopes, each edge polytope is unimodularly equivalent to a facet\nof some reflexive polytope. Furthermore, we extend the characterization of\nnormal edge polytopes to a characterization of normality for these new\nreflexive polytopes.\n']","[('polytopes vertices', 0.6839759945869446), ('polytope vertices', 0.6730940937995911), ('edge polytopes', 0.6613056659698486), ('reflexive polytopes', 0.6525644063949585), ('dimensional polytope', 0.6518339514732361), ('polytopes', 0.6427150964736938), ('dual polytope', 0.6318151354789734), ('reflexive polytope', 0.6311408281326294), ('simple polytope', 0.6257333159446716), ('simplicial polytopes', 0.6222288012504578)]" 578,578,53,578_delay differential equations_delay differential_delay equations_differential delay,"['delay differential equations', 'delay differential', 'delay equations', 'differential delay', 'linear delay differential', 'solutions delay', 'delay systems', 'functional differential equations', 'state dependent delay', 'delay parameter']","[""On solution manifolds of some differential equations with more general\n state-dependent delay Differential equations with state-dependent delays define a semiflow of\ncontinuously differentiable solution operators in general only on the\nassociated {\\it solution manifold} in the Banach space\n$C^1_n=C^1([-h,0],\\mathbb{R}^n)$. For a prototypic example we develop a new\nproof that its solution manifold is diffeomorphic to an open subset of the\nsubspace given by $\\phi'(0)=0$, without recourse to a restrictive hypothesis\nabout the form of delays which is instrumental in earlier work on the nature of\nsolution manifolds. The new proof uses the framework of algebraic-delay\nsystems.\n"", 'Parameterization method for state-dependent delay perturbation of an\n ordinary differential equation We consider state-dependent delay equations (SDDE) obtained by adding delays\nto a planar ordinary differential equation with a limit cycle. These situations\nappear in models of several physical processes, where small delay effects are\nadded. Even if the delays are small, they are very singular perturbations since\nthe natural phase space of an SDDE is an infinite dimensional space.\n We show that the SDDE admits solutions which resemble the solutions of the\nODE. That is, there exist a periodic solution and a two parameter family of\nsolutions whose evolution converges to the periodic solution. Even if the phase\nspace of the SDDE is naturally a space of functions, we show that there are\ninitial values which lead to solutions similar to that of the ODE.\n The method of proof bypasses the theory of existence, uniqueness, dependence\non parameters of SDDE. We consider the class of functions of time that have a\nwell defined behavior (e.g. periodic, or asymptotic to periodic) and derive a\nfunctional equation which imposes that they are solutions of the SDDE. These\nfunctional equations are studied using methods of functional analysis. We\nprovide a result in ""a posteriori"" format: Given an approximate solution of the\nfunctional equation, which has some good condition numbers, we prove that there\nis true solution close to the approximate one. Thus, we can use the result to\nvalidate the results of numerical computations. The method of proof leads also\nto practical algorithms. In a companion paper, we present the implementation\ndetails and representative results.\n One feature of the method presented here is that it allows to obtain smooth\ndependence on parameters for the periodic solutions and their slow stable\nmanifolds without studying the smoothness of the flow (which seems to be\nproblematic for SDDEs, for now the optimal result on smoothness of the flow is\n$C^1$).\n', ""Topologies of continuity for Carath\\'{e}odory delay differential\n equations with applications in non-autonomous dynamics We study some already introduced and some new strong and weak topologies of\nintegral type to provide continuous dependence on continuous initial data for\nthe solutions of non-autonomous Carath\\'eodory delay differential equations. As\na consequence, we obtain new families of continuous skew-product semiflows\ngenerated by delay differential equations whose vector fields belong to such\nmetric topological vector spaces of Lipschitz Carath\\'eodory functions.\nSufficient conditions for the equivalence of all or some of the considered\nstrong or weak topologies are also given. Finally, we also provide results of\ncontinuous dependence of the solutions as well as of continuity of the\nskew-product semiflows generated by Carath\\'eodory delay differential equations\nwhen the considered phase space is a Sobolev space.\n""]","[('delay differential equations', 0.7437011003494263), ('delay differential', 0.6293702721595764), ('delay equations', 0.6289461851119995), ('differential delay', 0.6233406662940979), ('linear delay differential', 0.6214284300804138), ('solutions delay', 0.5660370588302612), ('delay systems', 0.5383453965187073), ('functional differential equations', 0.5148991346359253), ('state dependent delay', 0.5061132311820984), ('delay parameter', 0.4831099510192871)]" 579,579,53,579_galton watson trees_galton watson tree_watson trees_trees critical,"['galton watson trees', 'galton watson tree', 'watson trees', 'trees critical', 'random trees', 'tree conditioned', 'generated trees', 'watson tree', 'random tree', 'trees']","[""Conditioning Bienaym{\\'e}-Galton-Watson trees to have large\n sub-populations We study the local limit in distribution of Bienaym{\\'e}-Galton-Watson trees\nconditioned on having large sub-populations. Assuming a generic and aperiodic\ncondition on the offspring distribution, we prove the existence of a limit\ngiven by a Kesten's tree associated with a certain critical offspring\ndistribution.\n"", ""Critical exponential tiltings for size-conditioned multitype\n Bienaym\\'e--Galton--Watson trees We consider here multitype Bienaym\\'e--Galton--Watson trees, under the\nconditioning that the numbers of vertices of given type satisfy some linear\nrelations. We prove that, under some smoothness conditions on the offspring\ndistribution $\\mathbf{\\zeta}$, there exists a critical offspring distribution\n$\\tilde{\\mathbf{\\zeta}}$ such that the trees with offspring distribution\n$\\mathbf{\\zeta}$ and $\\tilde{\\mathbf{\\zeta}}$ have the same law under our\nconditioning. This allows us in a second time to characterize the local limit\nof such trees, as their size goes to infinity. Our main tool is a notion of\nexponential tilting for multitype Bienaym\\'e--Galton--Watson trees.\n"", 'Invariance and attraction properties of Galton-Watson trees We give a description of invariants and attractors of the critical and\nsubcritical Galton-Watson tree measures under the operation of Horton pruning\n(cutting tree leaves with subsequent series reduction). Under a regularity\ncondition, the class of invariant measures consists of the critical binary\nGalton-Watson tree and a one-parameter family of critical Galton-Watson trees\nwith offspring distribution $\\{q_k\\}$ that has a power tail $q_k\\sim\nCk^{-(1+1/q_0)}$, where $q_0\\in(1/2,1)$. Each invariant measure has a non-empty\ndomain of attraction under consecutive Horton pruning, specified by the tail\nbehavior of the initial Galton-Watson offspring distribution. The invariant\nmeasures satisfy the Toeplitz property for the Tokunaga coefficients and obey\nthe Horton law with exponent $R = (1-q_0)^{-1/q_0}$.\n']","[('galton watson trees', 0.6364066004753113), ('galton watson tree', 0.5927675366401672), ('watson trees', 0.5685687065124512), ('trees critical', 0.5674169659614563), ('random trees', 0.5657873749732971), ('tree conditioned', 0.5326477885246277), ('generated trees', 0.5226263999938965), ('watson tree', 0.5116195678710938), ('random tree', 0.49587926268577576), ('trees', 0.48195046186447144)]" 580,580,53,580_toeplitz matrices_matrices toeplitz_toeplitz matrices generated_toeplitz matrix,"['toeplitz matrices', 'matrices toeplitz', 'toeplitz matrices generated', 'toeplitz matrix', 'block toeplitz matrices', 'toeplitz operators', 'symmetric toeplitz', 'toeplitz systems', 'tridiagonal toeplitz', 'matrix sequences']","['A note on eigenvalues and singular values of variable Toeplitz matrices\n and matrix-sequences, with application to variable two-step BDF\n approximations to parabolic equations Here, we consider a more general class of matrix-sequences and we prove that\nthey belong to the maximal $*$-algebra of generalized locally Toeplitz (GLT)\nmatrix-sequences. Then, we identify the associated GLT symbols and GLT\nmomentary symbols in the general setting and in the specific case, by providing\nin both cases a spectral and singular value analysis. More specifically, we use\nthe GLT tools in order to study the asymptotic behaviour of the eigenvalues and\nsingular values of the considered BDF matrix-sequences, in connection with the\ngiven non-uniform grids. Numerical examples, visualizations, and open problems\nend the present work.\n', 'A Note on Generalized Locally Toeplitz Operators Generalized Locally Toeplitz (GLT) matrix sequences arise from large linear\nsystems that approximate Partial Differential Equations (PDEs), Fractional\nDifferential Equations (FDEs), and Integro-Differential Equations (IDEs). GLT\nsequences of matrices have been developed to study the spectral/singular value\nbehaviour of the numerical approximations to various PDEs, Fades and IDEs.\nThese approximations can be achieved using any discretization method on\nappropriate grids through local techniques such as Finite Differences, Finite\nElements, Finite Volumes, Isogeometric Analysis, and Discontinuous Galerkin\nmethods. Spectral and singular value symbols are essential for analyzing the\neigenvalue and singular value distributions of matrix sequences in the Weyl\nsense. In this article, we provide a comprehensive overview of the\noperator-theoretic aspect of GLT sequences. The theory of GLT sequences, along\nwith findings on the asymptotic spectral distribution of perturbed matrix\nsequences, is a highly effective and successful method for calculating the\nspectral symbol f. Therefore, developing an automatic procedure to compute the\nspectral symbols of these matrix sequences would be advantageous, a task that\nAhmed Ratnani, N S Sarathkumar, S. Serra-Capizzano have partially undertaken.\nAs an application of the theory developed here, we propose an automatic\nprocedure for computing the symbol of the underlying sequences of matrices,\nassuming they form a GLT sequence that meets mild conditions.\n', 'Toeplitz Momentary Symbols: definition, results, and limitations in the\n spectral analysis of Structured Matrices A powerful tool for analyzing and approximating the singular values and\neigenvalues of structured matrices is the theory of GLT sequences. By the GLT\ntheory one can derive a function, which describes the singular value or the\neigenvalue distribution of the sequence, the latter under precise assumptions.\nHowever, for small values of the matrix size of the considered sequence, the\napproximations may not be as good as it is desirable, since in the construction\nof the GLT symbol one disregards small norm and low-rank perturbations. On the\nother hand, LFA can be used to construct polynomial symbols in a similar manner\nfor discretizations, where the geometric information is present, but the small\nnorm perturbations are retained. The main focus of this paper is the\nintroduction of the concept of sequence of ""Toeplitz momentary symbols"",\nassociated with a given sequence of truncated Toeplitz-like matrices. We\nconstruct the symbol in the same way as in the GLT theory, but we keep the\ninformation of the small norm contributions. The low-rank contributions are\nstill disregarded, and we give an idea on the reason why this is negligible in\ncertain cases and why it is not in other cases, being aware that in presence of\nhigh nonnormality the same low-rank perturbation can produce a dramatic change\nin the eigenvalue distribution. Moreover, a difference with respect to the LFA\nsymbols is that GLT symbols and Toeplitz momentary symbols are more general and\nare applicable to a larger class of matrices. We show the applicability of the\napproach which leads to higher accuracy in some cases when compared with the\nGLT symbol. Finally, since for many applications and their analysis it is often\nnecessary to consider non-square Toeplitz matrices, we formalize and provide\nsome useful definitions, applicable for non-square Toeplitz momentary symbols.\n']","[('toeplitz matrices', 0.7590765357017517), ('matrices toeplitz', 0.7464879751205444), ('toeplitz matrices generated', 0.7420318126678467), ('toeplitz matrix', 0.7348496913909912), ('block toeplitz matrices', 0.71797114610672), ('toeplitz operators', 0.6518711447715759), ('symmetric toeplitz', 0.6343663930892944), ('toeplitz systems', 0.6268385052680969), ('tridiagonal toeplitz', 0.6021559238433838), ('matrix sequences', 0.5148468613624573)]" 581,581,53,581_climate models_bifurcations_bifurcation_bifurcation analysis,"['climate models', 'bifurcations', 'bifurcation', 'bifurcation analysis', 'tipping point', 'induced tipping', 'tipping points', 'oscillations', 'climate change', 'global climate']","['Tipping mechanisms in a carbon cycle model Rate-induced tipping (R-tipping) occurs when a ramp parameter changes rapidly\nenough to cause the system to tip between co-existing, attracting states, while\nnoise-induced tipping (N-tipping) occurs when there are random transitions\nbetween two attractors of the underlying deterministic system. This work\ninvestigates R-tipping and N-tipping events in a carbonate system in the upper\nocean, in which the key objective is understanding how the system undergoes\ntipping away from a stable fixed point in a bistable regime. While R-tipping\naway from the fixed point is straightforward, N-tipping poses challenges due to\na periodic orbit forming the basin boundary for the attracting fixed point of\nthe underlying deterministic system. Furthermore, in the case of N-tipping, we\nare interested in the case where noise is away from the small noise limit, as\nit is more appropriate for the application. We compute the most probable escape\npath (MPEP) for our system, resulting in a firm grasp on the least action path\nin an asymmetric system of higher scale. Our analysis shows that the carbon\ncycle model is susceptible to both tipping mechanisms when using the standard\nformulations.\n', 'Uniting Parametric Uncertainty and Tipping Diagrams Various subsystems of the Earth system may undergo critical transitions by\npassing a so-called tipping point, under sustained changes to forcing. For\nexample, the Atlantic Meridional Overturning Circulation (AMOC) is of\nparticular importance for North Atlantic heat transport and is thought to be\npotentially at risk of tipping. Given a model of such a subsystem that\naccurately includes the relevant physical processes, whether tipping occurs or\nnot, will depend on model parameters that typically are uncertain. Reducing\nthis parametric uncertainty is important to understand the likelihood of\ntipping behavior being present in the system and possible tipping locations. In\nthis letter, we develop improved estimates for the parametric uncertainty by\ninferring probability distributions for the model parameters based on physical\nconstraints and by using a Bayesian inversion technique. To visualize the\nimpact of parametric uncertainty, we extend classical tipping diagrams by\nvisualizing probabilistic bifurcation curves according to the inferred\ndistribution of the model parameter. Furthermore, we highlight the uncertain\nlocations of tipping points along the probabilistic bifurcation curves. We\nshowcase our probabilistic visualizations of the tipping behavior using a\nsimple box-model of the AMOC, the Stommel-Cessi model [5].\n', 'Signatures consistent with multi-frequency tipping in the Atlantic\n meridional overturning circulation The early detection of tipping points, which describe a rapid departure from\na stable state, is an important theoretical and practical challenge. Tipping\npoints are most commonly associated with the disappearance of steady-state or\nperiodic solutions at fold bifurcations. We discuss here multi-frequency\ntipping (M-tipping), which is tipping due to the disappearance of an attracting\ntorus. M-tipping is a generic phenomenon in systems with at least two intrinsic\nor external frequencies that can interact and, hence, is relevant to a wide\nvariety of systems of interest. We show that the more complicated sequence of\nbifurcations involved in M-tipping provides a possible consistent explanation\nfor as yet unexplained behavior observed near tipping in climate models for the\nAtlantic meridional overturning circulation. More generally, this work provides\na path towards identifying possible early-warning signs of tipping in\nmultiple-frequency systems.\n']","[('climate models', 0.5048434734344482), ('bifurcations', 0.45939743518829346), ('bifurcation', 0.4437396824359894), ('bifurcation analysis', 0.42380547523498535), ('tipping point', 0.39182770252227783), ('induced tipping', 0.3764795660972595), ('tipping points', 0.3666541576385498), ('oscillations', 0.35940080881118774), ('climate change', 0.3574243485927582), ('global climate', 0.35260340571403503)]" 582,582,53,582_fracture networks_porous media flow_flow porous media_darcy flow,"['fracture networks', 'porous media flow', 'flow porous media', 'darcy flow', 'flow porous', 'fracture', 'fractured', 'fractures', 'finite volume scheme', 'porous media']","['A hybrid-mixed finite element method for single-phase Darcy flow in\n fractured porous media We present a hybrid-mixed finite element method for\n a novel hybrid-dimensional model of single-phase Darcy flow in a fractured\nporous media. In this model, the fracture is treated as an $(d-1)$-dimensional\ninterface within the $d$-dimensional fractured porous domain, for $d=2, 3$. Two\nclasses of fracture are distinguished based on the permeability magnitude ratio\nbetween the fracture and its surrounding medium: when the permeability in the\nfracture is (significantly) larger than in its surrounding medium, it is\nconsidered as a {\\it conductive} fracture; when the permeability in the\nfracture is (significantly) smaller than in its surrounding medium, it is\nconsidered as a {\\it blocking} fracture. The conductive fractures are treated\nusing the classical hybrid-dimensional approach of the interface model where\npressure is assumed to be continuous across the fracture interfaces, while the\nblocking fractures are treated using the recent Dirac-$\\delta$ function\napproach where normal component of Darcy velocity is assumed to be continuous\nacross the interface. Due to the use of Dirac-$\\delta$ function approach for\nthe blocking fractures, our numerical scheme allows for nonconforming meshes\nwith respect to the blocking fractures. This is the major novelty of our model\nand numerical discretization. Moreover, our numerical scheme produces locally\nconservative velocity approximations and leads to a symmetric positive definite\nlinear system involving pressure degrees of freedom on the mesh skeleton only.\nThe performance of the proposed method is demonstrated by various benchmark\ntest cases in both two- and three-dimensions. Numerical results indicate that\nthe proposed scheme is highly competitive with existing methods in the\nliterature.\n', 'Geometric model of the fracture as a manifold immersed in porous media In this work, we analyze the flow filtration process of slightly compressible\nfluids in porous media containing man made fractures with complex geometries.\nWe model the coupled fracture-porous media system where the linear Darcy flow\nis considered in porous media and the nonlinear Forchheimer equation is used\ninside the fracture. We develop a model to examine the flow inside fractures\nwith complex geometries and variable thickness, on a Riemannian manifold. The\nfracture is represented as the normal variation of a surface immersed in\n$\\mathbb{R}^3$. Using operators of Laplace Beltrami type and geometric\nidentities, we model an equation that describes the flow in the fracture. A\nreduced model is obtained as a low dimensional BVP. We then couple the model\nwith the porous media. Theoretical and numerical analysis have been performed\nto compare the solutions between the original geometric model and the reduced\nmodel in reservoirs containing fractures with complex geometries. We prove that\nthe two solutions are close, and therefore, the reduced model can be\neffectively used in large scale simulators for long and thin fractures with\ncomplicated geometry.\n', 'A five field formulation for flow simulations in porous media with\n fractures and barriers via an optimization based domain decomposition method The present work deals with the numerical resolution of coupled 3D-2D\nproblems arising from the simulation of fluid flow in fractured porous media\nmodeled via the Discrete Fracture and Matrix (DFM) model. According to the DFM\nmodel, fractures are represented as planar interfaces immersed in a 3D porous\nmatrix and can behave as preferential flow paths, in the case of conductive\nfractures, or can actually be a barrier for the flow, when, instead, the\npermeability in the normal-to-fracture direction is small compared to the\npermeability of the matrix. Consequently, the pressure solution in a DFM can be\ndiscontinuous across a barrier, as a result of the geometrical dimensional\nreduction operated on the fracture.\n The present work is aimed at developing a numerical scheme suitable for the\nsimulation of the flow in a DFM with fractures and barriers, using a mesh for\nthe 3D matrix non conforming to the fractures and that is ready for domain\ndecomposition. This is achieved starting from a PDE-constrained optimization\nmethod, currently available in literature only for conductive fractures in a\nDFM. First, a novel formulation of the optimization problem is defined to\naccount for non permeable fractures. These are described by a filtration-like\ncoupling at the interface with the surrounding porous matrix. Also the extended\nfinite element method with discontinuous enrichment functions is used to\nreproduce the pressure solution in the matrix around a barrier.\n The method is presented here in its simplest form, for clarity of exposition,\ni.e. considering the case of a single fracture in a 3D domain, also providing a\nproof of the well posedness of the resulting discrete problem. Four validation\nexamples are proposed to show the viability and the effectiveness of the\nmethod.\n']","[('fracture networks', 0.548383891582489), ('porous media flow', 0.4655747413635254), ('flow porous media', 0.46192091703414917), ('darcy flow', 0.41419076919555664), ('flow porous', 0.4041970372200012), ('fracture', 0.3828469216823578), ('fractured', 0.37078291177749634), ('fractures', 0.36413612961769104), ('finite volume scheme', 0.34907498955726624), ('porous media', 0.3359956741333008)]" 583,583,53,583_flow constraints_minimum cost flow_cost flow_multi commodity flow,"['flow constraints', 'minimum cost flow', 'cost flow', 'multi commodity flow', 'flow network', 'minimum flow', 'flow formulations', 'flow decomposition', 'max flow min', 'maximum flow']","['Solving Unsplittable Network Flow Problems with Decision Diagrams In unsplittable network flow problems, certain nodes must satisfy a\ncombinatorial requirement that the incoming arc flows cannot be split or merged\nwhen routed through outgoing arcs. This so-called ""no-split no-merge""\nrequirement arises in unit train scheduling where train consists should remain\nintact at stations that lack necessary equipment and manpower to attach/detach\nthem. Solving the unsplittable network flow problems with standard\nmixed-integer programming formulations is computationally difficult due to the\nlarge number of binary variables needed to determine matching pairs between\nincoming and outgoing arcs of nodes with no-split no-merge constraint. In this\npaper, we study a stochastic variant of the unit train scheduling problem where\nthe demand is uncertain. We develop a novel decision diagram (DD)-based\nframework that decomposes the underlying two-stage formulation into a master\nproblem that contains the combinatorial requirements, and a subproblem that\nmodels a continuous network flow problem. The master problem is modeled by a DD\nin a transformed space of variables with a smaller dimension, leading to a\nsubstantial improvement in solution time. Similarly to the Benders\ndecomposition technique, the subproblems output cutting planes that are used to\nrefine the master DD. Computational experiments show a significant improvement\nin solution time of the DD framework compared with that of standard methods.\n', 'Robust Minimum Cost Flow Problem Under Consistent Flow Constraints The robust minimum cost flow problem under consistent flow constraints\n(RobMCF$\\equiv$) is a new extension of the minimum cost flow (MCF) problem. In\nthe RobMCF$\\equiv$ problem, we consider demand and supply that are subject to\nuncertainty. For all demand realizations, however, we require that the flow\nvalue on an arc needs to be equal if it is included in the predetermined arc\nset given. The objective is to find feasible flows that satisfy the equal flow\nrequirements while minimizing the maximum occurring cost among all demand\nrealizations.\n In the case of a discrete set of scenarios, we derive structural results\nwhich point out the differences with the polynomial time solvable MCF problem\non networks with integral capacities. In particular, the Integral Flow Theorem\nof Dantzig and Fulkerson does not hold. For this reason, we require integral\nflows in the entire paper. We show that the RobMCF$\\equiv$ problem is strongly\n$\\mathcal{NP}$-hard on acyclic digraphs by a reduction from the $(3,B2)$-Sat\nproblem. Further, we demonstrate that the RobMCF$\\equiv$ problem is weakly\n$\\mathcal{NP}$-hard on series-parallel digraphs by providing a reduction from\nPartition and a pseudo-polynomial algorithm based on dynamic programming.\nFinally, we propose a special case on series-parallel digraphs for which we can\nsolve the RobMCF$\\equiv$ problem in polynomial time.\n', 'A Tight Max-Flow Min-Cut Duality Theorem for Non-Linear Multicommodity\n Flows The Max-Flow Min-Cut theorem is the classical duality result for the Max-Flow\nproblem, which considers flow of a single commodity. We study a multiple\ncommodity generalization of Max-Flow in which flows are composed of real-valued\nk-vectors through networks with arc capacities formed by regions in \\R^k. Given\nthe absence of a clear notion of ordering in the multicommodity case, we define\nthe generalized max flow as the feasible region of all flow values.\n We define a collection of concepts and operations on flows and cuts in the\nmulticommodity setting. We study the mutual capacity of a set of cuts, defined\nas the set of flows that can pass through all cuts in the set. We present a\nmethod to calculate the mutual capacity of pairs of cuts, and then generalize\nthe same to a method of calculation for arbitrary sets of cuts. We show that\nthe mutual capacity is exactly the set of feasible flows in the network, and\nhence is equal to the max flow. Furthermore, we present a simple class of the\nmulticommodity max flow problem where computations using this tight duality\nresult could run significantly faster than default brute force computations.\n We also study more tractable special cases of the multicommodity max flow\nproblem where the objective is to transport a maximum real or integer multiple\nof a given vector through the network. We devise an augmenting cycle search\nalgorithm that reduces the optimization problem to one with m constraints in at\nmost \\R^{(m-n+1)k} space from one that requires mn constraints in \\R^{mk} space\nfor a network with n nodes and m edges. We present efficient algorithms that\ncompute eps-approximations to both the ratio and the integer ratio maximum flow\nproblems.\n']","[('flow constraints', 0.650623619556427), ('minimum cost flow', 0.6360247731208801), ('cost flow', 0.5561113953590393), ('multi commodity flow', 0.5506693720817566), ('flow network', 0.532760739326477), ('minimum flow', 0.5316399931907654), ('flow formulations', 0.5111958384513855), ('flow decomposition', 0.5090819597244263), ('max flow min', 0.5083338022232056), ('maximum flow', 0.4998980164527893)]" 584,584,52,584_jacobian conjecture_jacobian_jacobian determinant_jacobian matrix,"['jacobian conjecture', 'jacobian', 'jacobian determinant', 'jacobian matrix', 'polynomial maps', 'vanishing conjecture', 'conjecture dimensions', 'polynomial mappings', 'conjecture characteristic', 'polynomial map']","['Jacobian conjecture in $\\mathbb R^2$ Jacobian conjecture states that if $F:\\ \\mathbb C^n(\\mathbb R^n)\\rightarrow\n\\mathbb C^n(\\mathbb R^n)$ is a polynomial map such that the Jacobian of $F$ is\na nonzero constant, then $F$ is injective. This conjecture is still open for\nall $n\\ge 2$, and for both $\\mathbb C^n$ and $\\mathbb R^n$. Here we provide a\npositive answer to the Jacobian conjecture in $\\mathbb R^2$ via the tools from\nthe theory of dynamical systems.\n', 'Characteristic p approaches to the Jacobian Conjecture We present several versions of the Jacobian Conjecture in positive\ncharacteristic each of which if true would imply the Jacobian conjecture in\ncharacteristic 0. We test these characteristic p versions of the conjecture\nagainst several families of Jacobian pairs in characteristic p. Based on the\nresults we propose a characteristic p approach to solving the Jacobian\nConjecture in characteristic 0.\n', ""The necessary and sufficient conditions for the real Jacobian conjecture The real Jacobian conjecture claims that if\n$F=\\left(f^1,\\ldots,f^n\\right):\\mathbb{R}^n\\rightarrow \\mathbb{R}^n$ is a\npolynomial map such that $\\det DF$ is nowhere zero, then $F$ is a global\ninjective.\n The first part is to study the two-dimensional real Jacobian conjecture via\nthe method of the qualitative theory of dynamical systems. By Bendixson\ncompactification, an induced polynomial differential system can be obtained\nfrom the Hamiltonian system associated to polynomial map $F$. We prove that the\nfollowing statements are equivalent: (A) $F$ is a global injective; (B) the\norigin of induced system is a center; (C) the origin of induced system is a\nmonodromic singular point; (D) the origin of induced system has no hyperbolic\nsectors; (E) induced system has a $C^k$ first integral with an isolated minimun\nat the origin and $k\\in\\mathbb{N}^{+}\\cup\\{\\infty\\}$. Moreover, applying the\nabove results we present a necessary and sufficient condition for the validity\nof the two-dimensional real Jacobian conjecture, which is an algebraic\ncriterion. By definition a criterion function, $F$ is a global injective if and\nonly if the limit of criterion function is infinite as\n$\\left|x\\right|+\\left|y\\right|$ tends to infinity. This algebraic criterion\nimproves the main result of Braun et al [J. Differential Equations {\\bf 260}\n(2016) 5250-5258].\n In the second part, the necessary and sufficient conditions on the\n$n$-dimensional real Jacobian conjecture is obtained. Using the tool from the\nnonlinear functional analysis, $F$ is a global injective if and only if\n$\\parallel F\\left(\\mathbf{x}\\right)\\parallel$ approaches to infinite as\n$\\parallel\\mathbf{x}\\parallel\\rightarrow\\infty$, which is a generalization of\nthe above algebraic criterion. As an application, we give an alternate proof of\nthe Cima's result on the $n$-dimensional real Jacobian conjecture [Nonlinear\nAnal. {\\bf 26} (1996) 877-885].\n""]","[('jacobian conjecture', 0.791641116142273), ('jacobian', 0.6024095416069031), ('jacobian determinant', 0.5814048051834106), ('jacobian matrix', 0.5321245789527893), ('polynomial maps', 0.4801611304283142), ('vanishing conjecture', 0.45821526646614075), ('conjecture dimensions', 0.4536340832710266), ('polynomial mappings', 0.4506003260612488), ('conjecture characteristic', 0.4483993649482727), ('polynomial map', 0.4444870352745056)]" 585,585,52,585_nernst planck equations_poisson nernst planck_planck equations_ions,"['nernst planck equations', 'poisson nernst planck', 'planck equations', 'ions', 'planck system', 'ionic', 'poisson boltzmann', 'planck navier', 'nernst planck navier', 'ion']","[""Integral equation method for the 1D steady-state Poisson-Nernst-Planck\n equations An integral equation method is presented for the 1D steady-state\nPoisson-Nernst-Planck equations modeling ion transport through membrane\nchannels. The differential equations are recast as integral equations using\nGreen's 3rd identity yielding a fixed-point problem for the electric potential\ngradient and ion concentrations. The integrals are discretized by a combination\nof midpoint and trapezoid rules and the resulting algebraic equations are\nsolved by Gummel iteration. Numerical tests for electroneutral and\nnon-electroneutral systems demonstrate the method's 2nd order accuracy and\nability to resolve sharp boundary layers. The method is applied to a 1D model\nof the K$^+$ ion channel with a fixed charge density that ensures cation\nselectivity. In these tests, the proposed integral equation method yields\npotential and concentration profiles in good agreement with published results.\n"", ""On the equilibrium of the Poisson-Nernst-Planck-Bikermann model\n equipping with the steric and correlation effects The Poisson-Nernst-Planck-Bikermann (PNPB) model, in which the ions and water\nmolecules are treated as different species with non-uniform sizes and valences\nwith interstitial voids, can describe the steric and correlation effects in\nionic solution neglected by the Poisson-Nernst-Planck and Poisson-Boltzmann\ntheories with point charge assumption. In the PNPB model, the electric\npotential is governed by the fourth-order Poisson-Bikermann (4PBik) equation\ninstead of the Poisson equation so that it can describe the correlation effect.\nWhat's more, the steric potential is included in the ionic and water fluxes as\nwell as the equilibrium Fermi-like distributions which characterizes the steric\neffect quantitatively.\n In this work, after doing a nondimensionalization step, we analyze the\nself-adjointness and the kernel of the fourth-order operator of the 4PBik\nequation. Also, we show the positivity of the void volume function and the\nconvexity of the free energy. Following these properties, the well-posedness of\nthe PNPB model in equilibrium is given. Furthermore, because the PNPB model has\nan energy dissipated structure, we adopt a finite volume scheme which preserves\nthe energy dissipated property at the semi-discrete level. After that, various\nnumerical investigations are given to show the parameter dependence of the\nsteric effect to the steady state.\n"", 'An inverse averaging finite element method for solving the size-modified\n Poisson-Nernst-Planck equations in ion channel simulations In this work, we introduce an inverse averaging finite element method (IAFEM)\nfor solving the size-modified Poisson-Nernst-Planck (SMPNP) equations.\nComparing with the classical Poisson-Nernst-Planck (PNP) equations, the SMPNP\nequations add a nonlinear term to each of the Nernst-Planck (NP) fluxes to\ndescribe the steric repulsion which can treat multiple nonuniform particle\nsizes in simulations. Since the new terms include sums and gradients of ion\nconcentrations, the nonlinear coupling of SMPNP equations is much stronger than\nthat of PNP equations. By introducing a generalized Slotboom transform, each of\nthe size-modified NP equation is transformed into a self-adjoint equation with\nexponentially behaved coefficient, which has similar simple form to the\nstandard NP equation with the Slotboom transformation. This treatment enables\nemploying our recently developed inverse averaging technique to deal with the\nexponential coefficients of the reformulated formulations, featured with\nadvantages of numerical stability and flux conservation especially in strong\nnonlinear and convection-dominated cases. Comparing with previous stabilization\nmethods, the IAFEM proposed in this paper can still possess the numerical\nstability when dealing with convection-dominated problems. And it is more\nconcise and easier to be numerically implemented. Numerical experiments about a\nmodel problem with analytic solutions are presented to verify the accuracy and\norder of IAFEM for SMPNP equations. Studies about the size-effects of a sphere\nmodel and an ion channel system are presented to show that our IAFEM is more\neffective and robust than the traditional finite element method (FEM) when\nsolving SMPNP equations in simulations of biological systems.\n']","[('nernst planck equations', 0.5028902292251587), ('poisson nernst planck', 0.48824986815452576), ('planck equations', 0.4568244516849518), ('ions', 0.4455103576183319), ('planck system', 0.42010197043418884), ('ionic', 0.4139557480812073), ('poisson boltzmann', 0.41371777653694153), ('planck navier', 0.3851510286331177), ('nernst planck navier', 0.37874001264572144), ('ion', 0.37506619095802307)]" 586,586,52,586_stability rotating_stars_star_astrophysics,"['stability rotating', 'stars', 'star', 'astrophysics', 'euler poisson equations', 'stellar', 'stability criterion', 'euler poisson system', 'galaxies', 'boson stars']","['Nonlinear stability of non-rotating gaseous stars For the non-rotating gaseous stars modeled by the compressible Euler-Poisson\nsystem with general pressure law, Lin and Zeng [18] proved a turning point\nprinciple, which gives the sharp linear stability/instability criteria for the\nnon-rotating gaseous stars. In this paper, we prove that the sharp linear\nstability criterion for the non-rotating stars also implies nonlinear orbital\nstability against general perturbations provided the global weak solutions\nexist. If the perturbations are further restricted to be spherically symmetric,\nthen nonlinear stability holds true unconditionally in the sense that the\nexistence of global weak solutions near the non-rotating star can be proved.\n', 'Separable Hamiltonian PDEs and Turning point principle for stability of\n gaseous stars We consider stability of non-rotating gaseous stars modeled by the\nEuler-Poisson system. Under general assumptions on the equation of states, we\nproved a turning point principle (TPP) that the stability of the stars is\nentirely determined by the mass-radius curve parameterized by the center\ndensity. In particular, the stability can only change at extrema (i.e. local\nmaximum or minimum points) of the total mass. For very general equation of\nstates, TPP implies that for increasing center density the stars are stable up\nto the first mass maximum and unstable beyond this point until next mass\nextremum (a minimum). Moreover, we get a precise counting of unstable modes and\nexponential trichotomy estimates for the linearized Euler-Poisson system. To\nprove these results, we develop a general framework of separable Hamiltonian\nPDEs. The general approach is flexible and can be used for many other problems\nincluding stability of rotating and magnetic stars, relativistic stars and\ngalaxies.\n', 'Stability of rotating gaseous stars We consider stability of rotating gaseous stars modeled by the Euler-Poisson\nsystem with general equation of states. When the angular velocity of the star\nis Rayleigh stable, we proved a sharp stability criterion for axi-symmetric\nperturbations. We also obtained estimates for the number of unstable modes and\nexponential trichotomy for the linearized Euler-Poisson system. By using this\nstability criterion, we proved that for a family of slowly rotating stars\nparameterized by the center density with fixed angular velocity profile, the\nturning point principle is not true. That is, unlike the case of non-rotating\nstars, the change of stability of the rotating stars does not occur at extrema\npoints of the total mass. By contrast, we proved that the turning point\nprinciple is true for the family of slowly rotating stars with fixed angular\nmomentum distribution. When the angular velocity is Rayleigh unstable, we\nproved linear instability of rotating stars. Moreover, we gave a complete\ndescription of the spectra and sharp growth estimates for the linearized\nEuler-Poisson equation.\n']","[('stability rotating', 0.43998730182647705), ('stars', 0.4382312595844269), ('star', 0.40996667742729187), ('astrophysics', 0.39446714520454407), ('euler poisson equations', 0.39367735385894775), ('stellar', 0.3890090882778168), ('stability criterion', 0.382023423910141), ('euler poisson system', 0.3802114725112915), ('galaxies', 0.37533289194107056), ('boson stars', 0.3623967468738556)]" 587,587,52,587_chemical reaction networks_reaction networks_biochemical reaction networks_reaction network,"['chemical reaction networks', 'reaction networks', 'biochemical reaction networks', 'reaction network', 'stochastic reaction', 'networks stochastic', 'markov chains', 'reaction systems', 'models reaction', 'markov chain']","['Sensitivity of steady states in networks with application to Markov\n chains and chemical reaction networks We consider steady states of dynamics that have an underlying network\nstructure. We study how a steady state responds to small perturbations in the\nnetwork parameters and how this sensitivity is connected to the network\nstructure. We introduce a prototypical linear response equation and determine\nits sensitivity. This abstract result is applied to study the sensitivity of\nsteady states in two common dynamics on networks: continuous-time Markov chains\nand deterministically modelled chemical reaction networks. For continuous-time\nMarkov chains, we are able to efficiently compute the signs of the response in\nterms of the underlying network structure. The study of chemical reaction\nnetworks extends the sensitivity analysis to open systems with more complex\nnetwork structures.\n', 'Identifiability of SDEs for reaction networks Biochemical reaction networks are widely applied across scientific disciplines to model complex dynamic systems. We investigate the diffusion approximation of reaction networks with mass-action kinetics, focusing on the identifiability of the generator of the associated stochastic differential equations. We derive conditions under which the law of the diffusion approximation is identifiable and provide theorems for verifying identifiability in practice. Notably, our results show that some reaction networks have non-identifiable reaction rates, even when the law of the corresponding stochastic process is completely known. Moreover, we show that reaction networks with distinct graphical structures can generate the same diffusion law under specific choices of reaction rates. Finally, we compare our framework with identifiability results in the deterministic ODE setting and the discrete continuous-time Markov chain models for reaction networks.', 'Fast reactions with non-interacting species in stochastic reaction\n networks We consider stochastic reaction networks modeled by continuous-time Markov\nchains. Such reaction networks often contain many reactions, potentially\noccurring at different time scales, and have unknown parameters (kinetic rates,\ntotal amounts). This makes their analysis complex. We examine stochastic\nreaction networks with non-interacting species that often appear in examples of\ninterest (e.g. in the two-substrate Michaelis Menten mechanism).\nNon-interacting species typically appear as intermediate (or transient)\nchemical complexes that are depleted at a fast rate. We embed the Markov\nprocess of the reaction network into a one-parameter family under a two\ntime-scale approach, such that molecules of non-interacting species are\ndegraded fast. We derive simplified reaction networks where the non-interacting\nspecies are eliminated and that approximate the scaled Markov process in the\nlimit as the parameter becomes small. Then, we derive sufficient conditions for\nsuch reductions based on the reaction network structure for both homogeneous\nand time-varying stochastic settings, and study examples and properties of the\nreduction.\n']","[('chemical reaction networks', 0.6441124081611633), ('reaction networks', 0.6277099251747131), ('biochemical reaction networks', 0.6231732368469238), ('reaction network', 0.6180610060691833), ('stochastic reaction', 0.6173568964004517), ('networks stochastic', 0.5874063372612), ('markov chains', 0.4969191253185272), ('reaction systems', 0.4630500376224518), ('models reaction', 0.45952659845352173), ('markov chain', 0.4547452926635742)]" 588,588,52,588_spline functions_spline basis functions_spline interpolation_polynomial spline,"['spline functions', 'spline basis functions', 'spline interpolation', 'polynomial spline', 'splines basis', 'splines defined', 'spline basis', 'spline curves', 'spline approximation', 'splines']","['Polynomial and trigonometric splines Classes of simple polynomial and simple trigonometric splines given by\nFourier series are considered. It is shown that the class of simple\ntrigonometric splines includes the class of simple polynomial splines. For some\nparameter values, the polynomial splines coincide with the trigonometric ones;\nthis allows to transfer to such trigonometric splines all the results obtained\nfor polynomial splines. Thus, it was possible to combine two powerful theories\n- the theory of trigonometric Fourier series and the theory of simple\npolynomial splines. The above material is illustrated by numerous examples.\n', 'About some properties of simple trigonometric splines The class $Ts(r,f)$ the trigonometric interpolation splines depending on the\nparameter vectors, selected convergence factors and interpolation factors is\nconsidered. The main properties of simple interpolation trigonometric splines\nare given, which are also transferred to periodic simple interpolation\npolynomial splines. These results lead to the possibility of combining the\ntheory of simple polynomial interpolation splines and the basics of the theory\nof simple trigonometric splines into a single theory - the theory of\ninterpolation splines\n', 'B-splines and kernels of trigonometric interpolation splines This article focuses on trigonometric Riemann B-splines and Riemann kernels\nof trigonometric interpolation splines of arbitrary order; it is shown that\ntrigonometric interpolation splines are a convolution of trigonometric\nB-splines with corresponding kernels. Theoretical statements are followed by\nexamples, and the results are applicable in many practical areas.\n']","[('spline functions', 0.7563902735710144), ('spline basis functions', 0.7491527199745178), ('spline interpolation', 0.7403860092163086), ('polynomial spline', 0.7366668581962585), ('splines basis', 0.7265335917472839), ('splines defined', 0.714167594909668), ('spline basis', 0.6895570755004883), ('spline curves', 0.6751521229743958), ('spline approximation', 0.6674691438674927), ('splines', 0.6577062606811523)]" 589,589,52,589_elastic scattering_inverse scattering theory_inverse scattering_scattering theory,"['elastic scattering', 'inverse scattering theory', 'inverse scattering', 'scattering theory', 'scattering', 'medium scattering', 'scattering problems', 'electromagnetic scattering', 'non scattering', 'wave field']","[""On corners scattering stably and stable shape determination by a single\n far-field pattern In this paper, we establish two sharp quantitative results for the direct and\ninverse time-harmonic acoustic wave scattering. The first one is concerned with\nthe recovery of the support of an inhomogeneous medium, independent of its\ncontents, by a single far-field measurement. For this challenging inverse\nscattering problem, we establish a sharp stability estimate of logarithmic type\nwhen the medium support is a polyhedral domain in $\\mathbb{R}^n$, $n=2,3$. The\nsecond one is concerned with the stability for corner scattering. More\nprecisely if an inhomogeneous scatterer, whose support has a corner, is probed\nby an incident plane-wave, we show that the energy of the scattered far-field\npossesses a positive lower bound depending only on the geometry of the corner\nand bounds on the refractive index of the medium there. This implies the\nimpossibility of approximate invisibility cloaking by a device containing a\ncorner and made of isotropic material. Our results sharply quantify the\nqualitative corner scattering results in the literature, and the corresponding\nproofs involve much more subtle analysis and technical arguments. As a\nsignificant byproduct of this study, we establish a quantitative Rellich's\ntheorem that continues smallness of the wave field from the far-field up to the\ninterior of the inhomogeneity. The result is of significant mathematical\ninterest for its own sake and is surprisingly not yet known in the literature.\n"", 'Stable determination of an elastic medium scatterer by a single\n far-field measurement and beyond We are concerned with the time-harmonic elastic scattering due to an\ninhomogeneous elastic material inclusion located inside a uniformly homogeneous\nisotropic medium. We establish a sharp stability estimate of logarithmic type\nin determining the support of the elastic scatterer, independent of its\nmaterial content, by a single far-field measurement when the support is a\nconvex polyhedral domain in $\\mathbb{R}^n$, $n=2,3$. Our argument in\nestablishing the stability result is localized around a corner of the medium\nscatterer. This enables us to further establish a byproduct result by proving\nthat if a generic medium scatterer, not necessary to be a polyhedral shape,\npossesses a corner, then there exists a positive lower bound of the scattered\nfar-field patterns. The latter result indicates that if an elastic material\nobject possesses a corner on its support, then it scatters every incident wave\nstably and invisibility phenomenon does not occur.\n', 'Unique determination by a single far-field measurement for an inverse\n elastic problem This paper is concerned with the unique identification of the shape of a\nscatterer through a single far-field pattern in an inverse elastic medium\nscattering problem with a generalized transmission boundary condition. The\nuniqueness issue by a single far-field measurement is a challenging problem in\ninverse scattering theory, which has a long and colorful history. In this\npaper, we demonstrate the well-posedness of the direct problem by the\nvariational approach. We establish the uniqueness results by a single far-field\nmeasurement under a generic scenario when dealing with underlying elastic\nscatterers exhibiting polygonal-nest or polygonal-cell structures. Furthermore,\nfor a polygonal-nest or polygonal-cell structure scatterer associated with\ndensity and boundary impedance parameters as piecewise constants, we show that\nthese physical quantities can be uniquely determined simultaneously by a single\nfar-field measurement. The corresponding proof relies heavily on examining the\nsingular behaviour of a coupled PDE system near a corner in a microlocal\nmanner.\n']","[('elastic scattering', 0.6389300227165222), ('inverse scattering theory', 0.5869908928871155), ('inverse scattering', 0.581352949142456), ('scattering theory', 0.5590956807136536), ('scattering', 0.5530143976211548), ('medium scattering', 0.5320357084274292), ('scattering problems', 0.530455470085144), ('electromagnetic scattering', 0.5221232175827026), ('non scattering', 0.5195671319961548), ('wave field', 0.424030601978302)]" 590,590,52,590_area preserving diffeomorphisms_area preserving homeomorphisms_preserving surface diffeomorphisms_diffeomorphisms surfaces,"['area preserving diffeomorphisms', 'area preserving homeomorphisms', 'preserving surface diffeomorphisms', 'diffeomorphisms surfaces', 'surface diffeomorphisms', 'area preserving maps', 'preserving diffeomorphisms', 'hamiltonian diffeomorphisms', 'area preserving surface', 'diffeomorphisms']","[""Periodic Floer homology and the smooth closing lemma for area-preserving\n surface diffeomorphisms We prove a very general Weyl-type law for Periodic Floer Homology, estimating\nthe action of twisted Periodic Floer Homology classes over essentially any\ncoefficient ring in terms of the grading and the degree, and recovering the\nCalabi invariant of Hamiltonians in the limit. We also prove a strong\nnon-vanishing result, showing that under a monotonicity assumption which holds\nfor a dense set of maps, the Periodic Floer Homology has infinite rank. An\napplication of these results yields that a $C^{\\infty}$-generic area-preserving\ndiffeomorphism of a closed surface has a dense set of periodic points. This\nsettles Smale's tenth problem in the special case of area-preserving\ndiffeomorphisms of closed surfaces.\n"", 'A $C^{\\infty}$ closing lemma on torus Asaoka & Irie recently proved a $C^{\\infty}$ closing lemma of Hamiltonian\ndiffeomorphisms of closed surfaces. We reformulated their techniques into a\nmore general perturbation lemma for area-preserving diffeomorphism and proved a\n$C^{\\infty}$ closing lemma for area-preserving diffeomorphisms on a torus that\nis isotopic to identity. i.e., we show that the set of periodic orbits is dense\nfor a generic diffeomorphism isotopic to identity area-preserving\ndiffeomorphism on torus. The main tool is the flux vector of area-preserving\ndiffeomorphisms which is, different from Hamiltonian cases, non-zero in\ngeneral.\n', 'Generic density of periodic orbits of area-preserving maps on punctured\n surfaces We study the dynamics of area-preserving maps in a non-compact setting. We\nshow that the $C^{\\infty}$-closing lemma holds for area-preserving\ndiffeomorphisms on a closed surface with finitely many points removed. As a\ncorollary, a $C^{\\infty}$-generic area-preserving diffeomorphism on such a\nsurface has a dense set of periodic points. For area-preserving maps on a\nfinitely punctured 2-sphere, we establish a more quantitative result regarding\nthe equidistribution of periodic orbits. The proof of this result involves a\nPFH Weyl law for rational area-preserving homeomorphisms, which may be of\nindependent interest.\n']","[('area preserving diffeomorphisms', 0.7402252554893494), ('area preserving homeomorphisms', 0.6511232852935791), ('preserving surface diffeomorphisms', 0.6442357897758484), ('diffeomorphisms surfaces', 0.5909556746482849), ('surface diffeomorphisms', 0.5855881571769714), ('area preserving maps', 0.577867865562439), ('preserving diffeomorphisms', 0.5719179511070251), ('hamiltonian diffeomorphisms', 0.5707530379295349), ('area preserving surface', 0.5659522414207458), ('diffeomorphisms', 0.5403804183006287)]" 591,591,52,591_linear system identification_learning dynamics_state estimator_linear dynamical systems,"['linear system identification', 'learning dynamics', 'state estimator', 'linear dynamical systems', 'identification linear', 'linear time invariant', 'finite time analysis', 'unknown nonlinear systems', 'linear dynamical system', 'learning stable']","['Non-asymptotic System Identification for Linear Systems with Nonlinear\n Policies This paper considers a single-trajectory system identification problem for\nlinear systems under general nonlinear and/or time-varying policies with i.i.d.\nrandom excitation noises. The problem is motivated by safe learning-based\ncontrol for constrained linear systems, where the safe policies during the\nlearning process are usually nonlinear and time-varying for satisfying the\nstate and input constraints. In this paper, we provide a non-asymptotic error\nbound for least square estimation when the data trajectory is generated by any\nnonlinear and/or time-varying policies as long as the generated state and\naction trajectories are bounded. This significantly generalizes the existing\nnon-asymptotic guarantees for linear system identification, which usually\nconsider i.i.d. random inputs or linear policies. Interestingly, our error\nbound is consistent with that for linear policies with respect to the\ndependence on the trajectory length, system dimensions, and excitation levels.\nLastly, we demonstrate the applications of our results by safe learning with\nrobust model predictive control and provide numerical analysis.\n', ""Finite Sample Identification of Partially Observed Bilinear Dynamical\n Systems We consider the problem of learning a realization of a partially observed\nbilinear dynamical system (BLDS) from noisy input-output data. Given a single\ntrajectory of input-output samples, we provide a finite time analysis for\nlearning the system's Markov-like parameters, from which a balanced realization\nof the bilinear system can be obtained. Our bilinear system identification\nalgorithm learns the system's Markov-like parameters by regressing the outputs\nto highly correlated, nonlinear, and heavy-tailed covariates. Moreover, the\nstability of BLDS depends on the sequence of inputs used to excite the system.\nThese properties, unique to partially observed bilinear dynamical systems, pose\nsignificant challenges to the analysis of our algorithm for learning the\nunknown dynamics. We address these challenges and provide high probability\nerror bounds on our identification algorithm under a uniform stability\nassumption. Our analysis provides insights into system theoretic quantities\nthat affect learning accuracy and sample complexity. Lastly, we perform\nnumerical experiments with synthetic data to reinforce these insights.\n"", 'Non-asymptotic Identification of Linear Dynamical Systems Using Multiple\n Trajectories This paper considers the problem of linear time-invariant (LTI) system\nidentification using input/output data. Recent work has provided non-asymptotic\nresults on partially observed LTI system identification using a single\ntrajectory but is only suitable for stable systems. We provide finite-time\nanalysis for learning Markov parameters based on the ordinary least-squares\n(OLS) estimator using multiple trajectories, which covers both stable and\nunstable systems. For unstable systems, our results suggest that the Markov\nparameters are harder to estimate in the presence of process noise. Without\nprocess noise, our upper bound on the estimation error is independent of the\nspectral radius of system dynamics with high probability. These two features\nare different from fully observed LTI systems for which recent work has shown\nthat unstable systems with a bigger spectral radius are easier to estimate.\nExtensive numerical experiments demonstrate the performance of our OLS\nestimator.\n']","[('linear system identification', 0.5255639553070068), ('learning dynamics', 0.46315762400627136), ('state estimator', 0.44029805064201355), ('linear dynamical systems', 0.43920475244522095), ('identification linear', 0.4389808177947998), ('linear time invariant', 0.42111778259277344), ('finite time analysis', 0.41725799441337585), ('unknown nonlinear systems', 0.41005411744117737), ('linear dynamical system', 0.4056509733200073), ('learning stable', 0.4036725163459778)]" 592,592,52,592_groebner bases_gr obner basis_groebner basis_computing gr obner,"['groebner bases', 'gr obner basis', 'groebner basis', 'computing gr obner', 'compute gr obner', 'obner basis', 'groebner', 'basis algorithms', 'gr obner bases', 'obner basis respect']","['A Signature-Based Gr\\""obner Basis Algorithm with Tail-Reduced Reductors\n (M5GB) Gr\\""obner bases are an important tool in computational algebra and,\nespecially in cryptography, often serve as a boilerplate for solving systems of\npolynomial equations. Research regarding (efficient) algorithms for computing\nGr\\""obner bases spans a large body of dedicated work that stretches over the\nlast six decades. The pioneering work of Bruno Buchberger in 1965 can be\nconsidered as the blueprint for all subsequent Gr\\""obner basis algorithms to\ndate. Among the most efficient algorithms in this line of work are\nsignature-based Gr\\""obner basis algorithms, with the first of its kind\npublished in the late 1990s by Jean-Charles Faug\\`ere under the name F5. In\naddition to signature-based approaches, Rusydi Makarim and Marc Stevens\ninvestigated a different direction to efficiently compute Gr\\""obner bases,\nwhich they published in 2017 with their algorithm M4GB. The ideas behind M4GB\nand signature-based approaches are conceptually orthogonal to each other\nbecause each approach addresses a different source of inefficiency in\nBuchberger\'s initial algorithm by different means.\n We amalgamate those orthogonal ideas and devise a new Gr\\""obner basis\nalgorithm, called M5GB, that combines the concepts of both worlds. In that\ncapacity, M5GB merges strong signature-criteria to eliminate redundant S-pairs\nwith concepts for fast polynomial reductions borrowed from M4GB. We provide\nproofs of termination and correctness and a proof-of-concept implementation in\nC++ by means of the Mathic library. The comparison with a state-of-the-art\nsignature-based Gr\\""obner basis algorithm (implemented via the same library)\nvalidates our expectations of an overall faster runtime for quadratic\noverdefined polynomial systems that have been used in comparisons before in the\nliterature and are also part of cryptanalytic challenges.\n', 'Learning to Compute Gr\\""obner Bases Solving a polynomial system, or computing an associated Gr\\""obner basis, has\nbeen a fundamental task in computational algebra. However, it is also known for\nits notorious doubly exponential time complexity in the number of variables in\nthe worst case. This paper is the first to address the learning of Gr\\""obner\nbasis computation with Transformers. The training requires many pairs of a\npolynomial system and the associated Gr\\""obner basis, raising two novel\nalgebraic problems: random generation of Gr\\""obner bases and transforming them\ninto non-Gr\\""obner ones, termed as backward Gr\\""obner problem. We resolve these\nproblems with 0-dimensional radical ideals, the ideals appearing in various\napplications. Further, we propose a hybrid input embedding to handle\ncoefficient tokens with continuity bias and avoid the growth of the vocabulary\nset. The experiments show that our dataset generation method is a few orders of\nmagnitude faster than a naive approach, overcoming a crucial challenge in\nlearning to compute Gr\\""obner bases, and Gr\\""obner computation is learnable in\na particular class.\n', 'The GroebnerWalk.jl package for OSCAR Computing Gr\\""obner bases is known to have a very high upper bound on\ncomputation time with respect to input length. Due to the connection between\npolyhedral geometry and Gr\\""obner bases through the Gr\\""obner fan, one can\nattempt an incremental approach to compute Gr\\""obner bases. First computing a\nGr\\""obner basis with respect to an `easy\' term order and transforming that\nresult to a Gr\\""obner basis with respect to the desired term order by using\ninformation about this polyhedral fan is done by a family of algorithms termed\nas Gr\\""obner walk. We implemented two variants of the Gr\\""obner walk in the\ncomputer algebra system OSCAR and compared their performance with classical\nGr\\""obner basis methods already found in OSCAR.\n']","[('groebner bases', 0.6213439702987671), ('gr obner basis', 0.5847278833389282), ('groebner basis', 0.5782039165496826), ('computing gr obner', 0.5716066956520081), ('compute gr obner', 0.5396527051925659), ('obner basis', 0.537919282913208), ('groebner', 0.516010046005249), ('basis algorithms', 0.509105920791626), ('gr obner bases', 0.507167398929596), ('obner basis respect', 0.497378408908844)]" 593,593,52,593_area minimizing surfaces_minimal surface_boundary regularity_integral currents,"['area minimizing surfaces', 'minimal surface', 'boundary regularity', 'integral currents', 'submanifold sigma', 'interior regularity', 'integral varifolds', 'minimal cones', 'minimizing surfaces', 'dimensional minimal']","['Unique continuation for area minimizing currents The main goal of this work is to prove an instance of the unique continuation\nprinciple for area minimizing integral currents. More precisely, consider an\n$m$-dimensional area minimizing integral current and an $m$-dimensional minimal\nsurface, both contained in $\\mathbb{R}^{n+m}$ with $n\\geq 1$. We show that if,\nin an integral sense, the current has infinite order of contact with the\nminimal surface at a point, then the current and the minimal surface coincide\nin a neighborhood of that point.\n', 'Regularity of area minimizing currents mod $p$ We establish a first general partial regularity theorem for area minimizing\ncurrents $\\mathrm{mod}(p)$, for every $p$, in any dimension and codimension.\nMore precisely, we prove that the Hausdorff dimension of the interior singular\nset of an $m$-dimensional area minimizing current $\\mathrm{mod}(p)$ cannot be\nlarger than $m-1$. Additionally, we show that, when $p$ is odd, the interior\nsingular set is $(m-1)$-rectifiable with locally finite $(m-1)$-dimensional\nmeasure.\n', 'The Fine Structure of the Singular Set of Area-Minimizing Integral\n Currents III: Frequency 1 Flat Singular Points and $\\mathcal{H}^{m-2}$-a.e.\n Uniqueness of Tangent Cones We consider an area-minimizing integral current $T$ of codimension higher\nthan 1 ins a smooth Riemannian manifold $\\Sigma$. We prove that $T$ has a\nunique tangent cone, which is a superposition of planes, at\n$\\mathcal{H}^{m-2}$-a.e. point in its support. In combination with works of the\nfirst and third authors, we conclude that the singular set of $T$ is countably\n$(m-2)$-rectifiable.\n']","[('area minimizing surfaces', 0.5018146634101868), ('minimal surface', 0.44186270236968994), ('boundary regularity', 0.4414539635181427), ('integral currents', 0.440019428730011), ('submanifold sigma', 0.4376963675022125), ('interior regularity', 0.4260050654411316), ('integral varifolds', 0.42377978563308716), ('minimal cones', 0.42231783270835876), ('minimizing surfaces', 0.41237398982048035), ('dimensional minimal', 0.4066006541252136)]" 594,594,52,594_compact quantum groups_compact quantum group_discrete quantum groups_quantum groups,"['compact quantum groups', 'compact quantum group', 'discrete quantum groups', 'quantum groups', 'quantum groups quantum', 'groups quantum', 'small quantum groups', 'quantum subgroups', 'quantum group', 'quantum subgroup']","[""Bornological quantum groups as locally compact quantum groups Bornological quantum groups were introduced by Voigt in order to generalize\nthe theory of algebraic quantum groups in the sense of van Daele. In particular\nthe class of bornological quantum groups contains all classical locally compact\ngroups. In this paper we prove that a bornological quantum group gives rise to\na locally compact quantum group, in a similar way to Kustermans and van Daele's\nresult for algebraic quantum groups. We show that the bornological quantum\ngroups, although more general than the algebraic ones, share most of their nice\nproperties. We also argue that bornological quantum groups, when they occur as\ndense subalgebras of locally compact quantum groups, are useful tools for\nstudying locally compact quantum groups. For instance, we show that the simple\ndefinition of a bornological closed quantum subgroup yields a closed subgroup\nof the locally compact quantum group in the sense of Vaes or Wooronowicz.\n"", 'Introduction to compact and discrete quantum groups These are notes from introductory lectures at the graduate school\n""Topological Quantum Groups"" in B\\k{e}dlewo (June 28--July 11, 2015). The notes\npresent the passage from Hopf algebras to compact quantum groups and sketch the\nnotion of discrete quantum groups viewed as duals of compact quantum groups.\n', 'On certain invariants of compact quantum groups We introduce and study a number of invariants of locally compact quantum\ngroups defined by their scaling and modular groups and the spectrum of their\nmodular elements. Focusing mainly on compact quantum groups we consider the\nquestion whether triviality of one of the invariants is equivalent to the\nquantum group being of Kac type and show that it has a positive answer in many\ncases including duals of second countable type $\\mathrm{I}$ discrete quantum\ngroups. We perform a complete calculation of the invariants for all\n$q$-deformations of compact, simply connected, semisimple Lie groups as well as\nfor some non-compact quantum groups and the compact quantum groups\n$\\operatorname{U}_F^+$. Finally we introduce a family of conditions for\ndiscrete quantum groups which for classical discrete groups are all equivalent\nto the fact that the group is i.c.c. We show that the above mentioned question\nabout characterization of Kac type quantum groups by one of our invariants has\na positive answer for duals of discrete quantum groups satisfying such an\ni.c.c.-type condition and illustrate this with the example of\n$\\operatorname{U}_F^+$.\n']","[('compact quantum groups', 0.8467414975166321), ('compact quantum group', 0.8106592893600464), ('discrete quantum groups', 0.764532208442688), ('quantum groups', 0.7620022892951965), ('quantum groups quantum', 0.7248157858848572), ('groups quantum', 0.720363199710846), ('small quantum groups', 0.7177827954292297), ('quantum subgroups', 0.7048670649528503), ('quantum group', 0.6898833513259888), ('quantum subgroup', 0.6650700569152832)]" 595,595,52,595_invariant riemannian metrics_manifolds geodesic_metrics lie groups_riemannian manifolds,"['invariant riemannian metrics', 'manifolds geodesic', 'metrics lie groups', 'riemannian manifolds', 'geodesic orbit', 'pseudo riemannian manifolds', 'riemannian metrics', 'metric geodesic', 'geodesic completeness', 'invariant riemannian']","['The Structure of Geodesic Orbit Lorentz Nilmanifolds The geodesic orbit property is useful and interesting in Riemannian geometry.\nIt implies homogeneity and has important classes of Riemannian manifolds as\nspecial cases. Those classes include weakly symmetric Riemannian manifolds and\nnaturally reductive Riemannian manifolds. The corresponding results for\nindefinite metric manifolds are much more delicate than in Riemannian\nsignature, but in the last few years important corresponding structural results\nwere proved for geodesic orbit Lorentz manifolds. Here we carry out a major\nstep in the structural analysis of geodesic orbit Lorentz nilmanifolds. Those\nare the geodesic orbit Lorentz manifolds $M = G/H$ such that a nilpotent\nanalytic subgroup of $G$ is transitive on $M$. Suppose that there is a\nreductive decomposition $\\mathfrak{g} = \\mathfrak{h} \\oplus \\mathfrak{n}$\n(vector space direct sum) with $\\mathfrak{n}$ nilpotent. When the metric is\nnondegenerate on $[\\mathfrak{n},\\mathfrak{n}]$ we show that $\\mathfrak{n}$ is\nabelian or 2-step nilpotent (this is the same result as for geodesic orbit\nRiemannian nilmanifolds), and when the metric is degenerate on\n$[\\mathfrak{n},\\mathfrak{n}]$ we show that $\\mathfrak{n}$ is a Lorentz double\nextension corresponding to a geodesic orbit Riemannian nilmanifold. In the\nlatter case we construct examples to show that the number of nilpotency steps\nis unbounded.\n', 'Pseudo-Riemannian geodesic orbit nilmanifolds of signature\n $\\boldsymbol{(n-2,2)}$ The geodesic orbit property is useful and interesting in itself, and it plays\na key role in Riemannian geometry. It implies homogeneity and has important\nclasses of Riemannian manifolds as special cases. Those classes include weakly\nsymmetric Riemannian manifolds and naturally reductive Riemannian manifolds.\nThe corresponding results for indefinite metric manifolds are much more\ndelicate than in Riemannian signature, but in the last few years important\ncorresponding structural results were proved for geodesic orbit Lorentz\nmanifolds. Here we extend Riemannian and Lorentz results to trans-Lorentz\nnilmanifolds. Those are the geodesic orbit pseudo Riemannian manifolds $M =\nG/H$ of signature $(n-2,2)$ such that a nilpotent analytic subgroup of $G$ is\ntransitive on $M$. For that we suppose that there is a reductive decomposition\n$\\g = \\h \\oplus \\n \\text{ (vector space direct sum) with } [\\h,\\n] \\subset \\n$\nand $\\n$ nilpotent. When the metric is nondegenerate on $[\\n,\\n]$ we show that\n$\\n$ is abelian or 2-step nilpotent. That is the same result as for geodesic\norbit Riemannian and Lorentz nilmanifolds. When the metric is degenerate on\n$[\\n,\\n]$ we show that $\\n$ is a double extension of a geodesic orbit\nnilmanifold of either Riemannian or Lorentz signature.\n', 'On the Geometric Orbit Property for Lorentz Manifolds The geodesic orbit property has been studied intensively for Riemannian\nmanifolds. Geodesic orbit spaces are homogeneous and allow simplifications of\nmany structural questions using the Lie algebra of the isometry group. Weakly\nsymmetric Riemannian manifolds are geodesic orbit spaces. Here we define\n""naturally reductive"" for pseudo-Riemannian manifolds and note that they are\ngeodesic orbit spaces. A few years ago two of the authors proved that weakly\nsymmetric pseudo-Riemannian manifolds are geodesic orbit spaces. In particular\nthese results apply to pseudo-Riemannian Lorentz manifolds. There our main\nresults are Theorems 4.2 and 5.1. In the Riemannian case the nilpotent isometry\ngroup for a geodesic orbit nilmanifold is abelian or $2$-step nilpotent.\nExamples show that this fails dramatically in the pseudo-Riemannian case. Here\nwe concentrate on the geodesic orbit property for Lorentz nilmanifolds $G/H$\nwith $G = N \\rtimes H$ and $N$ nilpotent. When the metric is nondegenerate on\n$[\\mathfrak{n},\\mathfrak{n}]$, Theorem 4.2 shows that $N$ either is at most\n$2$-step nilpotent as in the Riemannian situation, or is $4$-step nilpotent,\nbut cannot be $3$-step nilpotent. Examples show that these bounds are the best\npossible. Surprisingly, Theorem 5.1 shows that $N$ is at most $2$-step\nnilpotent when the metric is degenerate on $[\\mathfrak{n},\\mathfrak{n}]$. Both\ntheorems give additional structural information and specialize to naturally\nreductive and to weakly symmetric Lorentz nilmanifolds.\n Key Words: Geodesic Orbit Space; Lorentz nilmanifold; Weakly Symmetric Space;\nNaturally Reductive Space; Pseudo-Riemannian Manifold.\n']","[('invariant riemannian metrics', 0.684596598148346), ('manifolds geodesic', 0.664558470249176), ('metrics lie groups', 0.6186991930007935), ('riemannian manifolds', 0.6110048890113831), ('geodesic orbit', 0.607198178768158), ('pseudo riemannian manifolds', 0.6064746975898743), ('riemannian metrics', 0.6004126071929932), ('metric geodesic', 0.5999941229820251), ('geodesic completeness', 0.5945535898208618), ('invariant riemannian', 0.5938571095466614)]" 596,596,52,596_bounded analytic functions_bohr radius_bounded analytic_analytic functions unit,"['bounded analytic functions', 'bohr radius', 'bounded analytic', 'analytic functions unit', 'analytic functions', 'class analytic functions', 'harmonic mappings', 'sum_ infty a_nz', 'analytic functions defined', 'analytic']","['Bohr-Rogosinski and improved Bohr type inequalities for certain fully\n starlike harmonic mappings The classical Bohr inequality states that if $ f $ is an analytic function\nwith the power series representation $ f(z)=\\sum_{n=0}^{\\infty}a_nz^n $ in the\nunit disk $ \\mathbb{D}:=\\{z\\in\\mathbb{C} : |z|<1\\} $ such that $ |f(z)|\\leq 1 $\nfor all $ z\\in\\mathbb{D} $, then \\begin{equation*}\n \\sum_{n=0}^{\\infty}|a_n|r^n\\leq 1\\;\\; \\text{for}\\;\\; |z|=r\\leq\\frac{1}{3}\n\\end{equation*} and the constant $ 1/3 $ cannot be improved. The constant $\nr_0=1/3 $ is known as Bohr radius and the inequality $\n\\sum_{n=0}^{\\infty}|a_n|r^n\\leq 1 $ is known as Bohr inequality. Let $\n\\mathcal{H} $ be the class of complex-valued harmonic mappings $ f=h+\\bar{g}$\ndefined in the unit disk $ \\mathbb{D} $, where $ h $ and $ g $ are analytic\nfunctions in $ \\mathbb{D} $ with the normalization $ h(0)=0=h^{\\prime}(0)-1 $\nand $ g(0)=0 $. Let $ \\mathcal{H}_{0}=\\{f=h+\\bar{g}\\in\\mathcal{H} :\ng^{\\prime}(0)=0\\}. $ Let $ \\mathcal{P}^{0}_{\\mathcal{H}}(M)\n:=\\{f=h+\\overline{g} \\in \\mathcal{H}_{0}: \\real (zh^{\\prime\\prime}(z))>\n-M+|zg^{\\prime\\prime}(z)|,\\; z \\in \\mathbb{D},\\; M>0\\} $. Functions in the\nclass $ \\mathcal{P}^{0}_{\\mathcal{H}}(M) $ are called fully starlike univalent\nfunctions for $ 0=2. Initially, M balls are\nrandomly placed in the n urns. At each subsequent step, a ball is selected and\nput into the other n-1 urns with equal probability. The expected hitting time\nleading to a change of the M balls' status is computed using the method of\nstopping times. As a corollary, we obtain the expected hitting time of moving\nall the M balls from Urn 1 to Urn 2. This proves a conjecture which was\nrecently made in Chen et al.(2017).\n"", ""Urns with Multiple Drawings and Graph-Based Interaction Consider a finite undirected graph and place an urn with balls of two colours\nat each vertex. At every discrete time step, for each urn, a fixed number of\nballs are drawn from that same urn with probability $p$, and from a randomly\nchosen neighbour of that urn with probability $1-p$. Based on what is drawn,\nthe urns then reinforce themselves or their neighbours. For every ball of a\ngiven colour in the sample, in case of P\\'olya-type reinforcement, a constant\nmultiple of balls of that colour is added while in case of Friedman-type\nreinforcement, balls of the other colour are reinforced. These different\nchoices for reinforcement give rise to multiple models. In this paper, we study\nthe convergence of the fraction of balls of either colour across urns for all\nof these models. We show that in most cases the urns synchronize, that is, the\nfraction of balls of either colour in each urn converges to the same limit\nalmost surely. A different kind of asymptotic behaviour is observed on\nbipartite graphs. We also prove similar results for the case of finite directed\ngraphs.\n"", 'Feedback Interacting Urn Models We introduce and discuss a special type of feedback interacting urn model\nwith deterministic interaction. This is a generalisation of the very well known\nEggenberger and Polya (1923) urn model. In our model, balls are added to a\nparticular urn depending on the replacement matrix of that urn and the color of\nball chosen from some other urn. This urn model can help in studying how\nvarious interacting models might behave in real life in the long run. We have\nalso introduced a special type of interacting urn model with non-deterministic\ninteraction and studied its behaviour. Furthermore, we have provided some nice\nexamples to illustrate the various consequences of these interacting urn\nmodels.\n']","[('urn models', 0.6244636178016663), ('urn schemes', 0.5442214608192444), ('urns', 0.4535621106624603), ('urn', 0.41076335310935974), ('olya urns', 0.3631264865398407), ('number balls', 0.3552396893501282), ('draws', 0.35325855016708374), ('balls bins', 0.34416908025741577), ('olya urn', 0.33704817295074463), ('balls', 0.33525803685188293)]" 598,598,52,598_chow group zero_higher chow groups_chow groups_smooth projective varieties,"['chow group zero', 'higher chow groups', 'chow groups', 'smooth projective varieties', 'group zero cycles', 'projective varieties', 'chow group', 'quotient varieties', 'quasi projective', 'zero cycles']","[""Zero-cycles on normal varieties We prove an extension of the Kato-Saito class field theory for smooth\nprojective schemes over a finite field to schemes with singularities. As an\napplication, we obtain Bloch's formula for the Chow groups of 0-cycles on such\nschemes. We identify the Chow group of 0-cycles on a normal projective scheme\nover an algebraically closed field to the Suslin homology of its regular locus.\nOur final result is a Roitman torsion theorem for smooth quasi-projective\nschemes over algebraically closed fields. This completes the missing\n$p$-torsion part in the torsion theorem of Spiess and Szamuely.\n"", 'Cycle class maps for Chow groups of zero-cycles with modulus For a quasi-projective smooth scheme X of pure dimension d over a field k and\nan effective Cartier divisor D on X whose support is a simple normal crossing\ndivisor, we construct a cycle class map from the Chow group of zero-cycles with\nmodulus to the top cohomology of the dth relative Milnor K-sheaf.\n', 'Zero-cycles with modulus and relative $K$-theory We construct a cycle class map from the higher Chow groups of 0-cycles to the\nrelative $K$-theory of a modulus pair. We show that this induces a\npro-isomorphism between the additive higher Chow groups of relative 0-cycles\nand relative $K$-theory of truncated polynomial rings over a regular semi-local\nring, essentially of finite type over a characteristic zero field.\n']","[('chow group zero', 0.6121647953987122), ('higher chow groups', 0.5692532062530518), ('chow groups', 0.5075135231018066), ('smooth projective varieties', 0.4909512996673584), ('group zero cycles', 0.48911306262016296), ('projective varieties', 0.4863366484642029), ('chow group', 0.4674281179904938), ('quotient varieties', 0.4468742311000824), ('quasi projective', 0.4317098557949066), ('zero cycles', 0.42893943190574646)]" 599,599,52,599_yang mills connections_yang mills theory_dual yang mills_hermitian yang mills,"['yang mills connections', 'yang mills theory', 'dual yang mills', 'hermitian yang mills', 'yang mills fields', 'yang mills higgs', 'yang mills', 'mills connections', 'mills theory', 'su yang mills']","[""The stability for F-Yang-Mills functional on CP^n In this paper, we study the critical points of $F$-Yang-Mills functional on\n$\\mathbb{C}P^n$, which are called $F$-Yang-Mills connections. We prove that if\n$(2+\\frac4n)F''(x)x+(n+1)F'(x)<0$, then the weakly stable $F$-Yang-Mills\nconnection on $\\mathbb{C}P^n$ must be flat. Moreover, if\n$(2+\\frac4n)F''(x)x+(n+1)F'(x)=0$, we obtain the structure of curvatures\ncorresponding to weakly stable connections. We also show a gap theorem for\n$F$-Yang-Mills connections on $\\mathbb{C}P^n$.\n"", ""A Simons type condition for instability of $F$-Yang-Mills connections $F$-Yang-Mills connections are critical points of $F$-Yang Mills functional\non the space of connections of a principal fiber bundle, which is a\ngeneralization of Yang-Mills connections, $p$-Yang-Mills connections and\nexponential Yang-Mills connections and so on. Here, $F$ is a strictly\nincreasing $C^{2}$-function. In this paper, we extend Simons theorem for an\ninstability of Yang-Mills connections to $F$-Yang-Mills connections. We derive\na sufficient condition that any non-flat, $F$-Yang-Mills connection over convex\nhypersurfaces in a Euclidean space is instable. In the sphere case, this\ncondition is expressed by an inequality with respect to its dimension and a\ndegree of the differential of the function $F$. The proofs of the results are\ngiven by extending Kobayashi-Ohnita-Takeuchi's calculation to $F$-Yang-Mills\nconnections.\n"", 'Stability and energy identity for Yang-Mills-Higgs pairs In this paper, we study the properties of the critical points of\nYang-Mills-Higgs functional, which are called Yang-Mills-Higgs pairs. We first\nconsider the properties of weakly stable Yang-Mills-Higgs pairs on a vector\nbundle over S^n (n > 3). When n > 3, we prove that the norm of its Higgs field\nis 1 and the connection is actually Yang-Mills. More precisely, its curvature\nvanishes when n > 4. We also use the bubble-neck decomposition to prove the\nenergy identity of a sequence of Yang-Mills-Higgs pairs over a 4-dimensional\ncompact manifold with uniformly bounded energy. We show there is a subsequence\nconverges smoothly to a Yang-Mills-Higgs pair up to gauge modulo finitely many\n4-dimensional spheres with Yang-Mills connections.\n']","[('yang mills connections', 0.6773803234100342), ('yang mills theory', 0.6461192965507507), ('dual yang mills', 0.63357013463974), ('hermitian yang mills', 0.6220141649246216), ('yang mills fields', 0.6057571172714233), ('yang mills higgs', 0.592616081237793), ('yang mills', 0.5099999308586121), ('mills connections', 0.5085885524749756), ('mills theory', 0.5074515342712402), ('su yang mills', 0.4879157245159149)]" 600,600,52,600_multiuser communications_movable antennas mas_movable antennas_movable antenna ma,"['multiuser communications', 'movable antennas mas', 'movable antennas', 'movable antenna ma', 'movable antenna', 'wireless communication performance', 'antennas mas', 'antenna positions', 'antenna ma', 'antenna position']","[""Multiuser Communications with Movable-Antenna Base Station Via Antenna\n Position Optimization This paper studies the deployment of multiple movable antennas (MAs) at the\nbase station (BS) for enhancing the multiuser communication performance. First,\nwe model the multiuser channel in the uplink to characterize the wireless\nchannel variation caused by MAs' movement at the BS. Then, an optimization\nproblem is formulated to maximize the minimum achievable rate among multiple\nusers for MA-aided uplink multiuser communications by jointly optimizing the\nMAs' positions, their receive combining at the BS, and the transmit power of\nusers, under the constraints of finite moving region of MAs, minimum inter-MA\ndistance, and maximum transmit power of each user. To solve this challenging\nnon-convex optimization problem, a two-loop iterative algorithm is proposed by\nleveraging the particle swarm optimization (PSO) method. Specifically, the\nouter-loop updates the positions of a set of particles, where each particle's\nposition represents one realization of the antenna positioning vector (APV) of\nall MAs. The inner-loop implements the fitness evaluation for each particle in\nterms of the max-min achievable rate of multiple users with its corresponding\nAPV, where the receive combining matrix of the BS and the transmit power of\neach user are optimized by applying the block coordinate descent (BCD)\ntechnique. Simulation results show that the antenna position optimization for\nMAs-aided BS can significantly improve the rate performance as compared to\nconventional BS with fixed-position antennas (FPAs).\n"", 'Multiuser Communications Aided by Cross-Linked Movable Antenna Array:\n Architecture and Optimization Movable antenna (MA) has been regarded as a promising technology to enhance\nwireless communication performance by enabling flexible antenna movement.\nHowever, the hardware cost of conventional MA systems scales with the number of\nmovable elements due to the need for independently controllable driving\ncomponents. To reduce hardware cost, we propose in this paper a novel\narchitecture named cross-linked MA (CL-MA) array, which enables the collective\nmovement of multiple antennas in both horizontal and vertical directions. To\nevaluate the performance benefits of the CL-MA array, we consider an uplink\nmultiuser communication scenario. Specifically, we aim to minimize the total\ntransmit power while satisfying a given minimum rate requirement for each user\nby jointly optimizing the horizontal and vertical antenna position vectors\n(APVs), the receive combining at the base station (BS), and the transmit power\nof users. A globally lower bound on the total transmit power is derived, with\nclosed-form solutions for the APVs obtained under the condition of a single\nchannel path for each user. For the more general case of multiple channel\npaths, we develop a low-complexity algorithm based on discrete antenna position\noptimization. Additionally, to further reduce antenna movement overhead, a\nstatistical channel-based antenna position optimization approach is proposed,\nallowing for unchanged APVs over a long time period. Simulation results\ndemonstrate that the proposed CL-MA schemes significantly outperform\nconventional fixed-position antenna (FPA) systems and closely approach the\ntheoretical lower bound on the total transmit power. Compared to the\ninstantaneous channel-based CL-MA optimization, the statistical channel-based\napproach incurs a slight performance loss but achieves significantly lower\nmovement overhead, making it an appealing solution for practical wireless\nsystems.\n', ""Multiuser Communications with Movable-Antenna Base Station: Joint\n Antenna Positioning, Receive Combining, and Power Control Movable antenna (MA) is an emerging technology which enables a local movement\nof the antenna in the transmitter/receiver region for improving the channel\ncondition and communication performance. In this paper, we study the deployment\nof multiple MAs at the base station (BS) for enhancing the multiuser\ncommunication performance. First, we model the multiuser channel in the uplink\nto characterize the wireless channel variation due to MAs' movements at the BS.\nThen, an optimization problem is formulated to maximize the minimum achievable\nrate among multiple users for MA-aided uplink multiuser communications by\njointly optimizing the MAs' positions, their receive combining at the BS, and\nthe transmit power of users, under the constraints of finite moving region for\nMAs, minimum inter-MA distance, and maximum transmit power of each user. To\nsolve this challenging non-convex optimization problem, a two-loop iterative\nalgorithm is proposed by leveraging the particle swarm optimization (PSO)\nmethod. Specifically, the outer-loop updates the positions of a set of\nparticles, where each particle's position represents one realization of the\nantenna position vector (APV) of all MAs. The inner-loop implements the fitness\nevaluation for each particle in terms of the max-min achievable rate of\nmultiple users with its corresponding APV, where the receive combining matrix\nof the BS and the transmit power of each user are optimized by applying the\nblock coordinate descent (BCD) technique. Simulation results show that the\nantenna position optimization for MAs-aided BSs can significantly improve the\nrate performance as compared to conventional BSs with fixed-position antennas\n(FPAs).\n""]","[('multiuser communications', 0.5311717391014099), ('movable antennas mas', 0.5073432922363281), ('movable antennas', 0.4847365617752075), ('movable antenna ma', 0.47404319047927856), ('movable antenna', 0.4680345356464386), ('wireless communication performance', 0.4656793177127838), ('antennas mas', 0.43591150641441345), ('antenna positions', 0.4319903552532196), ('antenna ma', 0.42925408482551575), ('antenna position', 0.4288038909435272)]" 601,601,51,601_drinfeld modules finite_drinfeld modules_drinfeld module_drinfeld modular,"['drinfeld modules finite', 'drinfeld modules', 'drinfeld module', 'drinfeld modular', 'modules rank', 'rank drinfeld', 'module rank', 'isogeny classes', '_q finite field', 'adic galois representation']","['Drinfeld Module and Weil pairing over Dedekind domain of class number\n two The primary objective of this paper is to derive explicit formulas for rank\none and rank two Drinfeld modules over a specific domain denoted by A. This\ndomain corresponds to the projective line associated with an infinite place of\ndegree two. To achieve the goals, we construct a pair of standard Drinfeld\nmodules whose coefficients are in the Hilbert class field of A. We demonstrate\nthat the period lattice of the exponential functions corresponding to both\nmodules behaves similarly to the period lattice of the Carlitz module, the\nstandard rank one Drinfeld module defined over rational function field.\nMoreover, we employ Andersons t-motive to obtain the complete family of rank\ntwo Drinfeld modules. This family is parameterized by the invariant J =\n\\lambda^{q^2+1} which effectively serves as the counterpart of the j-invariant\nfor elliptic curves. Building upon the concepts introduced by van~der~Heiden,\nparticularly with regard to rank two Drinfeld modules, we are able to\nreformulate the Weil pairing of Drinfeld modules of any rank using a\nspecialized polynomial in multiple variables known as the Weil operator. As an\nillustrative example, we provide a detailed examination of a more explicit\nformula for the Weil pairing and the Weil operator of rank two Drinfeld modules\nover the domain A.\n', 'Orders occurring as endomorphism ring of a Drinfeld module in some\n isogeny classes of Drinfeld modules of higher ranks The question we propose to answer throughout this paper is the following:\nGiven an isogeny class of Drinfeld modules over a finite field, what are the\norders of the corresponding endomorphism algebra (which is an isogeny\ninvariant) that occur as endomorphism ring of a Drinfeld module in that isogeny\nclass? It is worth mentioning that this question is different from the ones\ninvestigated by the authors Kuhn, Pink in [6] and Garai, Papikian in [3]. The\nformer authors rather provided an answer to the question, given a Drinfeld\nmodule {\\phi}, how does one efficiently compute the endomorphism ring of\n{\\phi}? The importance of our question resides in the fact that it might be\nvery helpful to better understand isogeny graphs of Drinfeld modules of higher\nrank (r > 2) and may be reopen the debate concerning the application to\nisogeny-based cryptography. We answer that question for the case whereby the\nendomorphism algebra is a field by providing a necessary and sufficient\ncondition for a given order to be the endomorphism ring of a Drinfeld module.\nWe apply our result to rank r = 3 Drinfeld modules and explicitly compute those\norders occurring as endomorphism rings of rank 3 Drinfeld modules over a finite\nfield.\n', ""Explicit description of isogeny and isomorphism classes of Drinfeld\n modules over finite field When travelling from the number fields theory to the function fields theory,\none cannot miss the deep analogy between rank 1 Drinfeld modules and the group\nof root of unity and the analogy between rank 2 Drinfeld modules and elliptic\ncurves. But so far, there is no known structure in number fields theory that is\nanalogous to the Drinfeld modules of higher rank r > 2. In this paper we\ninvestigate the classes of those Drinfeld modules of higher rank r > 2. We\ndescribe explicitly the Weil polynomials defining the isogeny classes of rank r\nDrinfeld modules for any rank r > 2. our explicit description of the Weil\npolynomials depends heavily on Yu's classification of isogeny classes (analogue\nof Honda-Tate at abelian varieties). Actually Yu has also explicitly did that\nwork for r = 2. To complete the classification, we define the new notion of\nfine isomorphy invariants for any rank r Drinfeld module and we prove that the\nfine isomorphy invariants together with J-invariants completely determine the\nL-isomorphism classes of rank r Drinfeld modules defined over the finite field\nL.\n""]","[('drinfeld modules finite', 0.6660834550857544), ('drinfeld modules', 0.593525230884552), ('drinfeld module', 0.5236316323280334), ('drinfeld modular', 0.512085497379303), ('modules rank', 0.46785658597946167), ('rank drinfeld', 0.466763436794281), ('module rank', 0.45952144265174866), ('isogeny classes', 0.42578932642936707), ('_q finite field', 0.4133080542087555), ('adic galois representation', 0.41229093074798584)]" 602,602,51,602_acoustic waves_acoustic wave_propagation acoustic waves_propagation acoustic,"['acoustic waves', 'acoustic wave', 'propagation acoustic waves', 'propagation acoustic', 'wave equations', 'ultrasonic', 'acoustics', 'acoustic', 'nonlinearities', 'acoustic pressure']","['Boundary stabilization of the linear MGT equation with partially\n absorbing boundary data and degenerate viscoelasticity The Jordan--Moore--Gibson--Thompson (JMGT) equation is a well-established and\nrecently widely studied model for nonlinear acoustics (NLA). It is a\nthird-order (in time) semilinear Partial Differential Equation (PDE) model with\nthe distinctive feature of predicting the propagation of ultrasound waves at\n\\textit{finite} speed due to heat phenomenon know as \\textit{second sound}\nwhich leads to the hyperbolic character of heat propagation. In this paper, we\nconsider the problem of stabilizability of the linear (known as) MGT--equation.\nWe consider a special geometry that is suitable for studying the problem of\ncontrolling (from the boundary) the acoustic pressure involved in medical\ntreatments like lithotripsy, thermotherapy, sonochemistry, or any other\nprocedures using High Intensity Focused Ultrasound (HIFU).\n', ""Asymptotic behaviors for the Jordan-Moore-Gibson-Thompson equation in\n the viscous case In this paper, we study large-time behaviors for a fundamental model in\nnonlinear acoustics, precisely, the viscous Jordan-Moore-Gibson-Thompson (JMGT)\nequation in the whole space $\\mathbb{R}^n$. This model describes nonlinear\nacoustics in perfect gases under irrotational flow and equipping Cattaneo's law\nof heat conduction. By employing refined WKB analysis and Fourier analysis, we\nderive first- and second-order asymptotic profiles of solution to the\nMoore-Gibson-Thompson (MGT) equation as $t\\gg 1$, which illustrates novel\noptimal estimates for the solutions even subtracting its profiles. Concerning\nthe nonlinear JMGT equation, via suggesting a new decomposition of nonlinear\nportion, we investigate the existence and large-time profiles of global (in\ntime) small data Sobolev solutions with suitable regularity. These results help\nbridge a new connection between the JMGT equation and diffusion-waves as\n$t\\gg1$.\n"", 'Time-fractional Moore-Gibson-Thompson equations In this paper, we consider several time-fractional generalizations of the\nJordan-Moore-Gibson-Thompson (JMGT) equations in nonlinear acoustics as well as\ntheir linear Moore-Gibson-Thompson (MGT) versions. Following the procedure\ndescribed in Jordan (2014), these time-fractional acoustic equations are\nderived from four fractional versions of the Maxwell-Cattaneo law in Compte and\nMetzler (1997). Additionally to providing well-posedness results for each of\nthem, we also study the respective limits as the fractional order tends to one,\nleading to the classical third order in time (J)MGT equation.\n']","[('acoustic waves', 0.4705714285373688), ('acoustic wave', 0.46758076548576355), ('propagation acoustic waves', 0.45636796951293945), ('propagation acoustic', 0.45423203706741333), ('wave equations', 0.443844199180603), ('ultrasonic', 0.41037750244140625), ('acoustics', 0.3934442698955536), ('acoustic', 0.39048248529434204), ('nonlinearities', 0.386278361082077), ('acoustic pressure', 0.3741256594657898)]" 603,603,51,603_kac moody algebras_kac moody algebra_moody lie algebras_moody algebras,"['kac moody algebras', 'kac moody algebra', 'moody lie algebras', 'moody algebras', 'moody algebra', 'symmetrizable kac moody', 'lie algebras', 'kac moody lie', 'lie algebra mathfrak', 'lie superalgebras']","['On a Class of Indefinite Kac-Moody Algebras In this paper, we study a special class of indefinite Kac-Moody algebras.\nBased on the study of hyperbolic Kac-Moody algebras, we give the definition of\n$N_k$ type Kac-Moody algebras and study some properties of this special type\nKac-Moody algebras.\n', '$\\pi$-systems and the embedding problem for rank $2$ Kac-Moody Lie\n algebras $\\pi$-systems are fundamental in the study of Kac-Moody Lie algebras since\nthey arise naturally in the embedding problems. Dynkin introduced them first\nand showed how they also appear in the classification of semisimple subalgebras\nof a semisimple Lie algebra. In this article, we explicitly classify the\n$\\pi$-systems associated to rank $2$ Kac-Moody Lie algebras and prove that in\nmost of the cases they are linearly independent. This classification allows us\nto determine the root generated subalgebras and which in turn determines all\npossible Kac-Moody algebras that can be embedded in a rank $2$ Kac-Moody\nalgebra as subalgebras generated by real root vectors. Additionally, following\nthe work of Naito we provide examples illustrating how Borcherds Kac-Moody\nalgebras can also be embedded inside a rank $2$ Kac-Moody algebra.\n', 'N-Extended Lorentzian Kac-Moody algebras We investigate a class of Kac-Moody algebras previously not considered. We\nrefer to them as n-extended Lorentzian Kac-Moody algebras defined by their\nDynkin diagrams through the connection of an $A_n$ Dynkin diagram to the node\ncorresponding to the affine root. The cases $n=1$ and $n=2$ correspond to the\nwell studied over and very extended Kac-Moody algebras, respectively, of which\nthe particular examples of $E_{10}$ and $E_{11}$ play a prominent role in\nstring and M-theory. We construct closed generic expressions for their\nassociated roots, fundamental weights and Weyl vectors. We use these quantities\nto calculate specific constants from which the nodes can be determined that\nwhen deleted decompose the n-extended Lorentzian Kac-Moody algebras into simple\nLie algebras and Lorentzian Kac-Moody algebra. The signature of these constants\nalso serves to establish whether the algebras possess $SO(1,2)$ and/or\n$SO(3)$-principal subalgebras.\n']","[('kac moody algebras', 0.861343264579773), ('kac moody algebra', 0.8127442598342896), ('moody lie algebras', 0.7869264483451843), ('moody algebras', 0.7369333505630493), ('moody algebra', 0.6632618308067322), ('symmetrizable kac moody', 0.6393943428993225), ('lie algebras', 0.6287389397621155), ('kac moody lie', 0.5666267275810242), ('lie algebra mathfrak', 0.5600702166557312), ('lie superalgebras', 0.5530683398246765)]" 604,604,51,604_cusped hyperbolic manifolds_cusped hyperbolic manifold_volume hyperbolic manifolds_hyperbolic manifolds,"['cusped hyperbolic manifolds', 'cusped hyperbolic manifold', 'volume hyperbolic manifolds', 'hyperbolic manifolds', 'manifolds hyperbolic', 'hyperbolic manifold', 'closed hyperbolic manifolds', 'orientable hyperbolic', 'hyperbolic three', 'finite volume hyperbolic']","['Embedding closed hyperbolic 3-manifolds in small volume hyperbolic\n 4-manifolds In this paper we study existence and lack thereof of closed embedded\norientable co-dimension one totally geodesic submanifolds of minimal volume\ncusped orientable hyperbolic manifolds.\n', 'Hyperbolic 3-manifolds of low cusp volume We classify the complete hyperbolic 3-manifolds admitting a maximal cusp of\nvolume at most 2.62. We use this to show that the figure-8 knot complement is\nthe unique 1-cusped hyperbolic 3-manifold with nine or more non-hyperbolic\nfillings; to show that the figure-8 knot complement and its sister are the\nunique hyperbolic 3-manifolds with minimal volume maximal cusps; and to extend\nresults on determining low volume closed and cusped hyperbolic 3-manifolds.\n', ""Guts and The Minimal Volume Orientable Hyperbolic 3-Manifold with 3\n Cusps The minimal volume of orientable hyperbolic manifolds with a given number of\ncusps has been found for $0,1,2,4$ cusps, while the minimal volume of 3-cusped\norientable hyperbolic manifolds remains unknown. By using guts in sutured\nmanifolds and pared manifolds, we are able to show that for an orientable\nhyperbolic 3-manifold with 3 cusps such that every second homology class is\nlibroid, its volume is at least $5.49\\ldots = 6 \\times $Catalan's constant.\n""]","[('cusped hyperbolic manifolds', 0.7633167505264282), ('cusped hyperbolic manifold', 0.73630690574646), ('volume hyperbolic manifolds', 0.7145212292671204), ('hyperbolic manifolds', 0.6847983598709106), ('manifolds hyperbolic', 0.6791417002677917), ('hyperbolic manifold', 0.6539127230644226), ('closed hyperbolic manifolds', 0.6455258131027222), ('orientable hyperbolic', 0.6024537086486816), ('hyperbolic three', 0.58144211769104), ('finite volume hyperbolic', 0.5665795207023621)]" 605,605,51,605_wasserstein gradient flows_wasserstein gradient flow_gradient flow wasserstein_wasserstein gradient,"['wasserstein gradient flows', 'wasserstein gradient flow', 'gradient flow wasserstein', 'wasserstein gradient', 'flow wasserstein', 'gradient flow formulation', 'gradient flows', 'wasserstein metric', 'gradient flows space', 'metric gradient flow']","['Lagrangian schemes for Wasserstein gradient flows This paper reviews different numerical methods for specific examples of\nWasserstein gradient flows: we focus on nonlinear Fokker-Planck equations,but\nalso discuss discretizations of the parabolic-elliptic Keller-Segel model and\nof the fourth order thin film equation. The methods under review are of\nLagrangian nature, that is, the numerical approximations trace the\ncharacteristics of the underlying transport equation rather than solving the\nevolution equation for the mass density directly. The two main approaches are\nbased on integrating the equation for the Lagrangian maps on the one hand, and\non solution of coupled ODEs for individual mass particles on the other hand.\n', ""The back-and-forth method for Wasserstein gradient flows We present a method to efficiently compute Wasserstein gradient flows. Our\napproach is based on a generalization of the back-and-forth method (BFM)\nintroduced by Jacobs and L\\'eger to solve optimal transport problems. We evolve\nthe gradient flow by solving the dual problem to the JKO scheme. In general,\nthe dual problem is much better behaved than the primal problem. This allows us\nto efficiently run large-scale simulations for a large class of internal\nenergies including singular and non-convex energies.\n"", ""A new flow dynamic approach for Wasserstein gradient flows We develop in this paper a new regularized flow dynamic approach to construct\nefficient numerical schemes for Wasserstein gradient flows in Lagrangian\ncoordinates. Instead of approximating the Wasserstein distance which needs to\nsolve constrained minimization problems, we reformulate the problem using the\nBenamou-Brenier's flow dynamic approach, leading to algorithms which only need\nto solve unconstrained minimization problem in $L^2$ distance. Our schemes\nautomatically inherit some essential properties of Wasserstein gradient systems\nsuch as positivity-preserving, mass conservative and energy dissipation. We\npresent ample numerical simulations of Porous-Medium equations, Keller-Segel\nequations and Aggregation equations to validate the accuracy and stability of\nthe proposed schemes. Compared to numerical schemes in Eulerian coordinates,\nour new schemes can capture sharp interfaces for various Wasserstein gradient\nflows using relatively smaller number of unknowns.\n""]","[('wasserstein gradient flows', 0.8286130428314209), ('wasserstein gradient flow', 0.7934304475784302), ('gradient flow wasserstein', 0.7837318778038025), ('wasserstein gradient', 0.7101649641990662), ('flow wasserstein', 0.6782558560371399), ('gradient flow formulation', 0.5889840722084045), ('gradient flows', 0.5883603096008301), ('wasserstein metric', 0.5852901935577393), ('gradient flows space', 0.5672669410705566), ('metric gradient flow', 0.5593248605728149)]" 606,606,51,606_anderson acceleration_acceleration methods_accelerating convergence_newton iteration,"['anderson acceleration', 'acceleration methods', 'accelerating convergence', 'newton iteration', 'convergence acceleration', 'fixed point iterations', 'fixed point iteration', 'accelerated', 'point iterations', 'fixed point methods']","['Composite Anderson acceleration method with dynamic window-sizes and\n optimized damping In this paper, we propose and analyze a set of fully non-stationary Anderson\nacceleration algorithms with dynamic window sizes and optimized damping.\nAlthough Anderson acceleration (AA) has been used for decades to speed up\nnonlinear solvers in many applications, most authors are simply using and\nanalyzing the stationary version of Anderson acceleration (sAA) with fixed\nwindow size and a constant damping factor. The behavior and potential of the\nnon-stationary version of Anderson acceleration methods remain an open\nquestion. Since most efficient linear solvers use composable algorithmic\ncomponents. Similar ideas can be used for AA to solve nonlinear systems. Thus\nin the present work, to develop non-stationary Anderson acceleration\nalgorithms, we first propose two systematic ways to dynamically alternate the\nwindow size $m$ by composition. One simple way to package sAA(m) with sAA(n) in\neach iteration is applying sAA(m) and sAA(n) separately and then average their\nresults. It is an additive composite combination. The other more important way\nis the multiplicative composite combination, which means we apply sAA(m) in the\nouter loop and apply sAA(n) in the inner loop. By doing this, significant gains\ncan be achieved. Secondly, to make AA to be a fully non-stationary algorithm,\nwe need to combine these strategies with our recent work on the non-stationary\nAnderson acceleration algorithm with optimized damping (AAoptD), which is\nanother important direction of producing non-stationary AA and nice performance\ngains have been observed. Moreover, we also investigate the rate of convergence\nof these non-stationary AA methods under suitable assumptions. Finally, our\nnumerical results show that some of these proposed non-stationary Anderson\nacceleration algorithms converge faster than the stationary sAA method and they\nmay significantly reduce the storage and time to find the solution in many\ncases.\n', 'Anderson Acceleration as a Krylov Method with Application to Asymptotic\n Convergence Analysis Anderson acceleration (AA) is widely used for accelerating the convergence of\nnonlinear fixed-point methods $x_{k+1}=q(x_{k})$, $x_k \\in \\mathbb{R}^n$, but\nlittle is known about how to quantify the convergence acceleration provided by\nAA. As a roadway towards gaining more understanding of convergence acceleration\nby AA, we study AA($m$), i.e., Anderson acceleration with finite window size\n$m$, applied to the case of linear fixed-point iterations $x_{k+1}=M x_{k}+b$.\nWe write AA($m$) as a Krylov method with polynomial residual update formulas,\nand derive recurrence relations for the AA($m$) polynomials. Writing AA($m$) as\na Krylov method immediately implies that $k$ iterations of AA($m$) cannot\nproduce a smaller residual than $k$ iterations of GMRES without restart (but\nwithout implying anything about the relative convergence speed of (windowed)\nAA($m$) versus restarted GMRES($m$)). We find that the AA($m$) residual\npolynomials observe a periodic memory effect where increasing powers of the\nerror iteration matrix $M$ act on the initial residual as the iteration number\nincreases. We derive several further results based on these polynomial residual\nupdate formulas, including orthogonality relations, a lower bound on the AA(1)\nacceleration coefficient $\\beta_k$, and explicit nonlinear recursions for the\nAA(1) residuals and residual polynomials that do not include the acceleration\ncoefficient $\\beta_k$. Using these recurrence relations we also derive new\nresidual convergence bounds for AA(1) in the linear case, demonstrating how the\nper-iteration residual reduction $||r_{k+1}||/||r_{k}||$ depends strongly on\nthe residual reduction in the previous iteration and on the angle between the\nprior residual vectors $r_k$ and $r_{k-1}$. We apply these results to study the\ninfluence of the initial guess on the asymptotic convergence factor of AA(1),\nand to study AA(1) residual convergence patterns.\n', 'Anderson acceleration of gradient methods with energy for optimization\n problems Anderson acceleration (AA) as an efficient technique for speeding up the\nconvergence of fixed-point iterations may be designed for accelerating an\noptimization method. We propose a novel optimization algorithm by adapting\nAnderson acceleration to the energy adaptive gradient method (AEGD)\n[arXiv:2010.05109]. The feasibility of our algorithm is examined in light of\nconvergence results for AEGD, though it is not a fixed-point iteration. We also\nquantify the accelerated convergence rate of AA for gradient descent by a\nfactor of the gain at each implementation of the Anderson mixing. Our\nexperimental results show that the proposed algorithm requires little tuning of\nhyperparameters and exhibits superior fast convergence.\n']","[('anderson acceleration', 0.6059589982032776), ('acceleration methods', 0.49620574712753296), ('accelerating convergence', 0.49507251381874084), ('newton iteration', 0.4835720360279083), ('convergence acceleration', 0.48123618960380554), ('fixed point iterations', 0.46517136693000793), ('fixed point iteration', 0.4546765387058258), ('accelerated', 0.42470917105674744), ('point iterations', 0.3885803520679474), ('fixed point methods', 0.38733404874801636)]" 607,607,51,607_tree theorems_tangles_tangle_tree decompositions,"['tree theorems', 'tangles', 'tangle', 'tree decompositions', 'tree decomposition', 'locally finite graphs', 'infinite graphs', 'spanning trees', 'finite graphs', 'graphs infinite']","[""A tree-of-tangles theorem for infinite tangles Carmesin has extended Robertson and Seymour's tree-of-tangles theorem to the\ninfinite tangles of locally finite infinite graphs. We extend it further to the\ninfinite tangles of all infinite graphs.\n Our result has a number of applications for the topology of infinite graphs,\nsuch as their end spaces and their compactifications.\n"", 'Tangle-tree duality in abstract separation systems We prove a general width duality theorem for combinatorial structures with\nwell-defined notions of cohesion and separation. These might be graphs and\nmatroids, but can be much more general or quite different. The theorem asserts\na duality between the existence of high cohesiveness somewhere local and a\nglobal overall tree structure.\n We describe cohesive substructures in a unified way in the format of tangles:\nas orientations of low-order separations satisfying certain consistency axioms.\nThese axioms can be expressed without reference to the underlying structure,\nsuch as a graph or matroid, but just in terms of the poset of the separations\nthemselves. This makes it possible to identify tangles, and apply our\ntangle-tree duality theorem, in very diverse settings.\n Our result implies all the classical duality theorems for width parameters in\ngraph minor theory, such as path-width, tree-width, branch-width or rank-width.\nIt yields new, tangle-type, duality theorems for tree-width and path-width. It\nimplies the existence of width parameters dual to cohesive substructures such\nas $k$-blocks, edge-tangles, or given subsets of tangles, for which no width\nduality theorems were previously known.\n Abstract separation systems can be found also in structures quite unlike\ngraphs and matroids. For example, our theorem can be applied to image analysis\nby capturing the regions of an image as tangles of separations defined as\nnatural partitions of its set of pixels. It can be applied in big data contexts\nby capturing clusters as tangles. It can be applied in the social sciences,\ne.g. by capturing as tangles the few typical mindsets of individuals found by a\nsurvey. It could also be applied in pure mathematics, e.g. to separations of\ncompact manifolds.\n', ""Refining trees of tangles in abstract separation systems: inessential\n parts Robertson and Seymour proved two fundamental theorems about tangles in\ngraphs: the tree-of-tangles theorem, which says that every graph has a\ntree-decomposition such that distinguishable tangles live in different nodes of\nthe tree, and the tangle-tree duality theorem, which says that graphs without a\n$k$-tangle have a tree-decomposition that witnesses the non-existence of such\ntangles, in that $k$-tangles would have to live in a node but no node is large\nenough to accommodate one.\n Erde combined these two fundamental theorems into one, by constructing a\nsingle tree-decomposition such that every node either accommodates a single\n$k$-tangle or is too small to accommodate one. Such a tree-decomposition thus\nshows at a glance how many $k$-tangles a graph has and where they are.\n The two fundamental theorems have since been extended to abstract separation\nsystems, which support tangles in more general discrete structures. In this\npaper we extend Erde's unified theorem to such general systems.\n""]","[('tree theorems', 0.5448997020721436), ('tangles', 0.5394032597541809), ('tangle', 0.5283288955688477), ('tree decompositions', 0.48516157269477844), ('tree decomposition', 0.4313061535358429), ('locally finite graphs', 0.4217003583908081), ('infinite graphs', 0.41983890533447266), ('spanning trees', 0.4127034842967987), ('finite graphs', 0.40692704916000366), ('graphs infinite', 0.3973032534122467)]" 608,608,51,608_free matching_matching problems_matchings_matching,"['free matching', 'matching problems', 'matchings', 'matching', 'random matching', 'matching minimum', 'preference lists', 'matched', 'matching maximum', 'bipartite']","['Instances of small size with no weakly stable matching for three-sided\n problem with complete cyclic preferences Given $n$ men, $n$ women, and $n$ dogs, we assume that each man has a\ncomplete preference list of women, while each woman does a complete preference\nlist of dogs, and each dog does a complete preference list of men. We study the\nso-called 3D-CYC problem, i.e., a three-dimensional problem with cyclic\npreferences. We understand a matching as a collection of $n$ nonintersecting\ntriples, each of which contains a man, a woman, and a dog. A matching is said\nto be nonstable, if one can find a man, a woman, and a dog, which belong to\ndifferent triples and prefer each other to their current partners in the\ncorresponding triples. Otherwise, the matching is said to be stable. According\nto the conjecture proposed by Eriksson, S\\""ostrand, and Strimling (2006), the\nproblem of finding a stable matching (the problem 3DSM-CYC) always has a\nsolution. However, Lam and Paxton have proposed an algorithm for constructing\npreference lists in 3DSM-CYC of size $n=90$, which has allowed them to disprove\nthe mentioned conjecture. The question on the existence of counterexamples of a\nlesser size remained open. The main value of this paper consists in reducing\nthe size of the counterexample to $n=20$. At the end part of the paper, we\ndiscuss a new variant of 3DSM, whose solution always exists.\n', 'Finding Stable Matchings in PhD Markets with Consistent Preferences and\n Cooperative Partners We introduce a new algorithm for finding stable matchings in multi-sided\nmatching markets. Our setting is motivated by a PhD market of students,\nadvisors, and co-advisors, and can be generalized to supply chain networks\nviewed as $n$-sided markets. In the three-sided PhD market, students primarily\ncare about advisors and then about co-advisors (consistent preferences), while\nadvisors and co-advisors have preferences over students only (hence they are\ncooperative). A student must be matched to one advisor and one co-advisor, or\nnot at all. In contrast to previous work, advisor-student and\nstudent-co-advisor pairs may not be mutually acceptable (e.g., a student may\nnot want to work with an advisor or co-advisor and vice versa). We show that\nthree-sided stable matchings always exist, and present an algorithm that, in\ntime quadratic in the market size (up to log factors), finds a three-sided\nstable matching using any two-sided stable matching algorithm as matching\nengine. We illustrate the challenges that arise when not all advisor-co-advisor\npairs are compatible. We then generalize our algorithm to $n$-sided markets\nwith quotas and show how they can model supply chain networks. Finally, we show\nhow our algorithm outperforms the baseline given by [Danilov, 2003] in terms of\nboth producing a stable matching and a larger number of matches on a synthetic\ndataset.\n', 'Stable Marriage with One-Sided Preference Many countries around the world, including Korea, use the school choice\nlottery system. However, this method has a problem in that many students are\nassigned to less-preferred schools based on the lottery results. In addition,\nthe task of finding a good assignment with ties often has a time complexity of\nNP, making it a very difficult problem to improve the quality of the\nassignment.\n In this paper, we prove that the problem of finding a stable matching that\nmaximizes the student-oriented preference utility in a two-sided market with\none-sided preference can be solved in polynomial time, and we verify through\nexperiments that the quality of assignment is improved. The main contributions\nof this paper are as follows. We found that stable student-oriented allocation\nin a two-sided market with one-sided preferences is the same as stable\nallocation in a two-sided market with symmetric preferences. In addition, we\ndefined a method to quantify the quality of allocation from a preference\nutilitarian perspective. Based on the above two, it was proven that the problem\nof finding a stable match that maximizes the preference utility in a two-sided\nmarket with homogeneous preferences can be reduced to an allocation problem. In\nthis paper, through an experiment, we quantitatively verified that optimal\nstudent assignment assigns more students to schools of higher preference, even\nin situations where many students are assigned to schools of low preference\nusing the existing assignment method.\n']","[('free matching', 0.6098833680152893), ('matching problems', 0.5929465293884277), ('matchings', 0.5906234383583069), ('matching', 0.5533781051635742), ('random matching', 0.5203653573989868), ('matching minimum', 0.4816785454750061), ('preference lists', 0.44951513409614563), ('matched', 0.4382687211036682), ('matching maximum', 0.42643502354621887), ('bipartite', 0.40602701902389526)]" 609,609,51,609_oscillatory integrals_gaussian quadrature rules_gaussian quadrature_high order quadrature,"['oscillatory integrals', 'gaussian quadrature rules', 'gaussian quadrature', 'high order quadrature', 'quadrature formulas', 'numerical integration', 'quadrature rules', 'explicit error bounds', 'integration rules', 'type integrals']","['A Filon-Clenshaw-Curtis-Smolyak rule for multi-dimensional oscillatory\n integrals with application to a UQ problem for the Helmholtz equation In this paper, we combine the Smolyak technique for multi-dimensional\ninterpolation with the Filon-Clenshaw-Curtis (FCC) rule for one-dimensional\noscillatory integration, to obtain a new Filon-Clenshaw-Curtis-Smolyak (FCCS)\nrule for oscillatory integrals with linear phase over the $d-$dimensional cube\n$[-1,1]^d$. By combining stability and convergence estimates for the FCC rule\nwith error estimates for the Smolyak interpolation operator, we obtain an error\nestimate for the FCCS rule, consisting of the product of a Smolyak-type error\nestimate multiplied by a term that decreases with\n$\\mathcal{O}(k^{-\\tilde{d}})$, where $k$ is the wavenumber and $\\tilde{d}$ is\nthe number of oscillatory dimensions. If all dimensions are oscillatory, a\nhigher negative power of $k$ appears in the estimate. As an application, we\nconsider the forward problem of uncertainty quantification (UQ) for a\none-space-dimensional Helmholtz problem with wavenumber $k$ and a random\nheterogeneous refractive index, depending in an affine way on $d$ i.i.d.\nuniform random variables. After applying a classical hybrid\nnumerical-asymptotic approximation, expectations of functionals of the solution\nof this problem can be formulated as a sum of oscillatory integrals over\n$[-1,1]^d$, which we compute using the FCCS rule. We give numerical results for\nthe FCCS rule and the UQ algorithm showing that accuracy improves when both $k$\nand the order of the rule increase. We also give results for dimension-adaptive\nsparse grid FCCS quadrature showing its efficiency as dimension increases.\n', 'Gaussian quadrature rules for composite highly oscillatory integrals Highly oscillatory integrals of composite type arise in electronic\nengineering and their calculations is a challenging problem. In this paper, we\npropose two Gaussian quadrature rules for computing such integrals. The first\none is constructed based on the classical theory of orthogonal polynomials and\nits nodes and weights can be computed efficiently by using tools of numerical\nlinear algebra. We show that the rate of convergence of this rule depends\nsolely on the regularity of the non-oscillatory part of the integrand. The\nsecond one is constructed with respect to a sign-changing function and the\nclassical theory of Gaussian quadrature can not be used anymore. We explore\ntheoretical properties of this Gaussian quadrature, including the trajectories\nof the quadrature nodes and the convergence rate of these nodes to the\nendpoints of the integration interval, and prove its asymptotic error estimate\nunder suitable hypotheses. Numerical experiments are presented to demonstrate\nthe performance of the proposed methods.\n', 'Modified Filon-Clenshaw-Curtis rules for oscillatory integrals with a\n nonlinear oscillator Filon-Clenshaw-Curtis rules are among rapid and accurate quadrature rules for\ncomputing highly oscillatory integrals. In the implementation of the\nFilon-Clenshaw-Curtis rules in the case when the oscillator function is not\nlinear, its inverse should be evaluated at some points. In this paper, we solve\nthis problem by introducing an approach based on the interpolation, which leads\nto a class of modifications of the original Filon-Clenshaw-Curtis rules. In the\nabsence of stationary points, two kinds of modified Filon-Clenshaw-Curtis rules\nare introduced. For each kind, an error estimate is given theoretically, and\nthen illustrated by some numerical experiments. Also, some numerical\nexperiments are carried out for a comparison of the accuracy and the efficiency\nof the two rules. In the presence of stationary points, the idea is applied to\nthe composite Filon-Clenshaw-Curtis rules on graded meshes. An error estimate\nis given theoretically, and then illustrated by some numerical experiments.\n']","[('oscillatory integrals', 0.6106595396995544), ('gaussian quadrature rules', 0.5925812721252441), ('gaussian quadrature', 0.5313867926597595), ('high order quadrature', 0.5296556353569031), ('quadrature formulas', 0.5277127027511597), ('numerical integration', 0.5238021016120911), ('quadrature rules', 0.46367567777633667), ('explicit error bounds', 0.4467110335826874), ('integration rules', 0.42468592524528503), ('type integrals', 0.4140947461128235)]" 610,610,51,610_population covariance matrices_large sample covariance_sample covariance matrices_linear spectral statistics,"['population covariance matrices', 'large sample covariance', 'sample covariance matrices', 'linear spectral statistics', 'spectral statistics', 'random matrix theory', 'eigenvalue statistics', 'limiting spectral distribution', 'spiked eigenvalues', 'population covariance matrix']","[""A CLT for the LSS of large dimensional sample covariance matrices with\n unbounded dispersions In this paper, we establish the central limit theorem (CLT) for linear\nspectral statistics (LSS) of large-dimensional sample covariance matrix when\nthe population covariance matrices are not uniformly bounded, which is a\nnontrivial extension of the Bai-Silverstein theorem (BST) (2004). The latter\nhas strongly stimulated the development of high-dimensional statistics,\nespecially the application of random matrix theory to statistics. However, the\nassumption of uniform boundedness of the population covariance matrices is\nfound strongly limited to the applications of BST. The aim of this paper is to\nremove the blockages to the applications of BST. The new CLT, allows the spiked\neigenvalues to exist and tend to infinity. It is interesting to note that the\nroles of either spiked eigenvalues or the bulk eigenvalues or both of the two\nare dominating in the CLT.\n Moreover, the results are checked by simulation studies with various\npopulation settings. The CLT for LSS is then applied for testing the hypothesis\nthat a covariance matrix $ \\bSi $ is equal to an identity matrix. For this, the\nasymptotic distributions for the corrected likelihood ratio test (LRT) and\nNagao's trace test (NT) under alternative are derived, and we also propose the\nasymptotic power of LRT and NT under certain alternatives.\n"", ""A CLT for the LSS of large dimensional sample covariance matrices with\n diverging spikes In this paper, we establish the central limit theorem (CLT) for linear\nspectral statistics (LSSs) of a large-dimensional sample covariance matrix when\nthe population covariance matrices are involved with diverging spikes. This\nconstitutes a nontrivial extension of the Bai-Silverstein theorem (BST) (Ann\nProbab 32(1):553--605, 2004), a theorem that has strongly influenced the\ndevelopment of high-dimensional statistics, especially in the applications of\nrandom matrix theory to statistics. Recently, there has been a growing\nrealization that the assumption of uniform boundedness of the population\ncovariance matrices in the BST is not satisfied in some fields, such as\neconomics, where the variances of principal components may diverge as the\ndimension tends to infinity. Therefore, in this paper, we aim to eliminate this\nobstacle to applications of the BST. Our new CLT accommodates spiked\neigenvalues, which may either be bounded or tend to infinity. A distinguishing\nfeature of our result is that the variance in the new CLT is related to both\nspiked eigenvalues and bulk eigenvalues, with dominance being determined by the\ndivergence rate of the largest spiked eigenvalues. The new CLT for LSS is then\napplied to test the hypothesis that the population covariance matrix is the\nidentity matrix or a generalized spiked model. The asymptotic distributions of\nthe corrected likelihood ratio test statistic and the corrected Nagao's trace\ntest statistic are derived under the alternative hypothesis. Moreover, we\npresent power comparisons between these two LSSs and Roy's largest root test.\nIn particular, we demonstrate that except for the case in which the number of\nspikes is equal to one, the LSSs could exhibit higher asymptotic power than\nRoy's largest root test.\n"", 'Asymptotic independence of spiked eigenvalues and linear spectral\n statistics for large sample covariance matrices We consider general high-dimensional spiked sample covariance models and show\nthat their leading sample spiked eigenvalues and their linear spectral\nstatistics are asymptotically independent when the sample size and dimension\nare proportional to each other. As a byproduct, we also establish the central\nlimit theorem of the leading sample spiked eigenvalues by removing the block\ndiagonal assumption on the population covariance matrix, which is commonly\nneeded in the literature. Moreover, we propose consistent estimators of the\n$L_4$ norm of the spiked population eigenvectors. Based on these results, we\ndevelop a new statistic to test the equality of two spiked population\ncovariance matrices. Numerical studies show that the new test procedure is more\npowerful than some existing methods.\n']","[('population covariance matrices', 0.5943713784217834), ('large sample covariance', 0.5873129963874817), ('sample covariance matrices', 0.5862782001495361), ('linear spectral statistics', 0.576336145401001), ('spectral statistics', 0.5642995834350586), ('random matrix theory', 0.5607863068580627), ('eigenvalue statistics', 0.5596984028816223), ('limiting spectral distribution', 0.5559484362602234), ('spiked eigenvalues', 0.5510962009429932), ('population covariance matrix', 0.5378568768501282)]" 611,611,51,611_commutative semiring_idempotent semirings_semirings_idempotent semiring,"['commutative semiring', 'idempotent semirings', 'semirings', 'idempotent semiring', 'semiring', 'semifields', 'prime ideals', 'reduced ring', 'commutative rings', 'maximal ideals']","['Some remarks on the comparability of ideals in semirings A semiring is uniserial if its ideals are totally ordered by inclusion.\nFirst, we show that a semiring $S$ is uniserial if and only if the matrix\nsemiring $M_n(S)$ is uniserial. As a generalization of valuation semirings, we\nalso investigate those semirings whose prime ideals are linearly ordered by\ninclusion. For example, we prove that the prime ideals of a commutative\nsemiring $S$ are linearly ordered if and only if for each $x,y \\in S$, there is\na positive integer $n$ such that either $x|y^n$ or $y|x^n$. Then, we introduce\nand characterize pseudo-valuation semidomains. It is shown that prime ideals of\npseudo-valuation semidomains and also of the divided ones are linearly ordered.\n', ""Lattices, Spectral Spaces, and Closure Operations on Idempotent\n Semirings Spectral spaces, introduced by Hochster, are topological spaces homeomorphic\nto the prime spectra of commutative rings. In this paper we study spectral\nspaces in perspective of idempotent semirings which are algebraic structures\nreceiving a lot of attention due to its several applications to tropical\ngeometry. We first prove that a space is spectral if and only if it is the\n\\emph{prime $k$-spectrum} of an idempotent semiring. In fact, we enrich\nHochster's theorem by constructing a subcategory of idempotent semirings which\nis antiequivalent to the category of spectral spaces. We further provide\nexamples of spectral spaces arising from sets of congruence relations of\nsemirings. In particular, we prove that the \\emph{space of valuations} and the\n\\emph{space of prime congruences} on an idempotent semiring are spectral, and\nthere is a natural bijection of sets between the two; this shows a stark\ndifference between rings and idempotent semirings. We then develop several\naspects of commutative algebra of semirings. We mainly focus on the notion of\n\\emph{closure operations} for semirings, and provide several examples. In\nparticular, we introduce an \\emph{integral closure operation} and a\n\\emph{Frobenius closure operation} for idempotent semirings.\n"", ""Algebraic properties of expectation semirings In this paper, we investigate the algebraic properties of the expectation\nsemirings which are semiring version of the concept of trivial extension in\nring theory. We discuss ideals, primes, maximals and primary ideals of these\nsemirings. We also discuss the distinguished elements such as the units,\nidempotents, and zero-divisors of the expectations semirings. Similar to their\ncounterparts in ring theory, we introduce pr\\'{e}simplifiable, domainlike,\nclean, almost clean, and weakly clean semiring and see when an expectation\nsemiring is one of these semirings.\n""]","[('commutative semiring', 0.7479601502418518), ('idempotent semirings', 0.7180318832397461), ('semirings', 0.714269757270813), ('idempotent semiring', 0.6744199991226196), ('semiring', 0.6571899652481079), ('semifields', 0.5602231621742249), ('prime ideals', 0.5106940865516663), ('reduced ring', 0.49636465311050415), ('commutative rings', 0.4702248275279999), ('maximal ideals', 0.46681469678878784)]" 612,612,51,612_control barrier functions_control constraints_state control constraints_safety constraints,"['control barrier functions', 'control constraints', 'state control constraints', 'safety constraints', 'safety critical control', 'control barrier', 'lyapunov barrier functions', 'control lyapunov barrier', 'control barrier cbf', 'control bounds']","['Predictive Control Barrier Functions: Bridging model predictive control\n and control barrier functions In this paper, we establish a connection between model predictive control\n(MPC) techniques and Control Barrier Functions (CBFs). Recognizing the\nsimilarity between CBFs and Control Lyapunov Functions (CLFs), we propose a\nsafe MPC formulation that ensures invariance and safety without relying on\nexplicit stability conditions. The value function of our proposed safe MPC is a\nCBF, which we refer to as the Predictive Control Barrier Function (PCBF),\nsimilar to traditional MPC formulations which encode stability by having value\nfunctions as CLFs. Our formulation is simpler than previous PCBF approaches and\nis based on weaker assumptions while proving a similar theorem that guarantees\nsafety recovery. Notably, our safe MPC formulation does not require the value\nfunction to be strictly decreasing to ensure convergence to a safe invariant\nset. Numerical examples demonstrate the effectiveness of our approach in\nguaranteeing safety and constructing non-conservative CBFs.\n', 'Optimal Control Barrier Functions: Maximizing the Action Space Subject\n to Control Bounds This letter addresses the constraint compatibility problem of control barrier\nfunctions (CBFs), which occurs when a safety-critical CBF requires a system to\napply more control effort than it is capable of generating. This inevitably\nleads to a safety violation, which transitions the system to an unsafe (and\npossibly dangerous) trajectory. We resolve the constraint compatibility problem\nby constructing a control barrier function that maximizes the feasible action\nspace for first and second-order constraints, and we prove that the optimal CBF\nencodes a dynamical motion primitive. Furthermore, we show that this dynamical\nmotion primitive contains an implicit model for the future trajectory for\ntime-varying components of the system. We validate our optimal CBF in\nsimulation, and compare its behavior with a linear CBF.\n', 'Composing Control Barrier Functions for Complex Safety Specifications The increasing complexity of control systems necessitates control laws that\nguarantee safety w.r.t. complex combinations of constraints. In this letter, we\npropose a framework to describe compositional safety specifications with\ncontrol barrier functions (CBFs). The specifications are formulated as Boolean\ncompositions of state constraints, and we propose an algorithmic way to create\na single continuously differentiable CBF that captures these constraints and\nenables safety-critical control. We describe the properties of the proposed\nCBF, and we demonstrate its efficacy by numerical simulations.\n']","[('control barrier functions', 0.6491319537162781), ('control constraints', 0.6295250654220581), ('state control constraints', 0.6108224987983704), ('safety constraints', 0.6017189621925354), ('safety critical control', 0.5821799039840698), ('control barrier', 0.5656638741493225), ('lyapunov barrier functions', 0.5600019693374634), ('control lyapunov barrier', 0.5585483908653259), ('control barrier cbf', 0.5521830320358276), ('control bounds', 0.5328438878059387)]" 613,613,51,613_flocking behavior_cucker smale flocking_flocking_smale flocking,"['flocking behavior', 'cucker smale flocking', 'flocking', 'smale flocking', 'flock', 'collective dynamics', 'flocks', 'asymptotic dynamics', 'collective motion', 'cucker smale type']","[""Finite flocking time of the nonlinear Cucker--Smale model with Rayleigh\n friction type using the discrete $p$-Laplacian The study of collective behavior in multi-agent systems has attracted the\nattention of many researchers due to its wide range of applications. Among\nthem, the Cucker-Smale model was developed to study the phenomenon of flocking,\nand various types of extended models have been actively proposed and studied in\nrecent decades.\n In this study, we address open questions of the Cucker--Smale model with\nnorm-type Rayleigh friction: {\\bf (i)} The positivity of the communication\nweight, {\\bf (ii)} The convergence of the norm of the velocities of agents,\n{\\bf (iii)} The direction of the velocities of agents. For problems (i) and\n(ii), we present the nonlinear Cucker--Smale model with norm-type Rayleigh\nfriction, where the nonlinear Cucker--Smale model is generalized to a nonlinear\nmodel by applying a discrete $p$-Laplacian operator. For this model, we present\nconditions that guarantee that the norm for velocities of agents converges to 0\nor a positive value, and we also show that the regular communication weight\nsatisfies the conditions given in this study. In particular, we present a\ncondition for the initial configuration to obtain that the norm of agent\nvelocities converges to only some positive value.\n By contrast, problem (iii) is not solved by the norm-type nonlinear model.\nThus, we propose a nonlinear Cucker--Smale model with a vector-type Rayleigh\nfriction for problem (iii). In parallel to the first model, we show that the\ndirection of the agents' velocities can be controlled by parameters in the\nnonlinear Cucker--Smale model with the vector-type Rayleigh friction.\n"", 'Interplay of geometric constraint and bonding force in the emergent\n behaviors of relativistic Cucker-Smale flocks We present the relativistic analogue of the Cucker-Smale model with a bonding\nforce on Riemannian manifold, and study its emergent dynamics. The Cucker-Smale\nmodel serves a prototype example of mechanical flocking models, and it has been\nextensively studied from various points of view. Recently, the authors studied\ncollision avoidance and asymptotic flocking of the Cucker-Smale model with a\nbonding force on the Euclidean space. In this paper, we provide an analytical\nframework for collision avoidance and asymptotic flocking of the proposed model\non Riemannian manifolds. Our analytical framework is explicitly formulated in\nterms of system parameters, initial data and the injectivity radius of the\nambient manifold, and we study how the geometric information of an ambient\nmanifold can affect the flocking dynamics.\n', 'Asymptotic dynamics for the Cucker-Smale model with velocity control We study the Cucker-Smale model with a velocity control function. The\nCucker-Smale model design the emergence of consensus in terms of flocking. A\nproposed model encompasses several Cucker-Smale models, such as a speed limit\nmodel, a relativistic model, and an almost unit speed model. We provide\ncollective behaviors of the proposed model, like mono or bi-cluster flocking,\nsticking, and collision avoidance, depending on the regularity and singularity\nof communication weight at the origin. In particular, we provide a sufficient\nframework to guarantee a positive lower bound of the distance between agents\nunder strongly singular communications.\n']","[('flocking behavior', 0.6503498554229736), ('cucker smale flocking', 0.6260586977005005), ('flocking', 0.5623850226402283), ('smale flocking', 0.5541673898696899), ('flock', 0.517275869846344), ('collective dynamics', 0.5159062743186951), ('flocks', 0.5038080215454102), ('asymptotic dynamics', 0.49501579999923706), ('collective motion', 0.4650108814239502), ('cucker smale type', 0.4436056613922119)]" 614,614,51,614_satellite communications_satellite communication_satellite networks_multi satellite,"['satellite communications', 'satellite communication', 'satellite networks', 'multi satellite', 'leo satellite communication', 'interference management', 'satellite', 'satellite systems', 'leo satellite', 'integrated satellite']","['Distributed Rate-Splitting Multiple Access for Multilayer Satellite\n Communications Future wireless networks, in particular, 5G and beyond, are anticipated to\ndeploy dense Low Earth Orbit (LEO) satellites to provide global coverage and\nbroadband connectivity. However, the limited frequency band and the coexistence\nof multiple constellations bring new challenges for interference management. In\nthis paper, we propose a robust multilayer interference management scheme for\nspectrum sharing in heterogeneous satellite networks with statistical channel\nstate information (CSI) at the transmitter (CSIT) and receivers (CSIR). In the\nproposed scheme, Rate-Splitting Multiple Access (RSMA), as a general and\npowerful framework for interference management and multiple access strategies,\nis implemented distributedly at GEO and LEO satellites, coined Distributed-RSMA\n(D-RSMA). By doing so, D-RSMA aims to mitigate the interference and boost the\nuser fairness of the overall multilayer satellite system. Specifically, we\nstudy the problem of jointly optimizing the GEO/LEO precoders and message\nsplits to maximize the minimum rate among User Terminals (UTs) subject to a\ntransmit power constraint at all satellites. A robust algorithm is proposed to\nsolve the original non-convex optimization problem. Numerical results\ndemonstrate the effectiveness and robustness towards network load and CSI\nuncertainty of our proposed D-RSMA scheme. Benefiting from the interference\nmanagement capability, D-RSMA provides significant max-min fairness performance\ngains compared to several benchmark schemes.\n', 'Holographic Metasurface-Based Beamforming for Multi-Altitude LEO\n Satellite Networks Low Earth Orbit (LEO) satellite networks are capable of improving the global\nInternet service coverage. In this context, we propose a hybrid beamforming\ndesign for holographic metasurface based terrestrial users in multi-altitude\nLEO satellite networks. Firstly, the holographic beamformer is optimized by\nmaximizing the downlink channel gain from the serving satellite to the\nterrestrial user. Then, the digital beamformer is designed by conceiving a\nminimum mean square error (MMSE) based detection algorithm for mitigating the\ninterference arriving from other satellites. To dispense with excessive\noverhead of full channel state information (CSI) acquisition of all satellites,\nwe propose a low-complexity MMSE beamforming algorithm that only relies on the\ndistribution of the LEO satellite constellation harnessing stochastic geometry,\nwhich can achieve comparable throughput to that of the algorithm based on the\nfull CSI in the case of a dense LEO satellite deployment. Furthermore, it\noutperforms the maximum ratio combining (MRC) algorithm, thanks to its\ninter-satellite interference mitigation capacity. The simulation results show\nthat our proposed holographic metasurface based hybrid beamforming architecture\nis capable of outperforming the state-of-the-art antenna array architecture in\nterms of its throughput, given the same physical size of the transceivers.\nMoreover, we demonstrate that the beamforming performance attained can be\nsubstantially improved by taking into account the mutual coupling effect,\nimposed by the dense placement of the holographic metasurface elements.\n', 'Rate-Splitting Multiple Access for GEO-LEO Coexisting Satellite Systems:\n A Traffic-Aware Throughput Maximization Precoder Design The frequency coexistence between geostationary orbit (GEO) and low earth\norbit (LEO) satellite systems is expected to be a promising approach for\nrelieving spectrum scarcity. However, it is essential to manage mutual\ninterference between GEO and LEO satellite systems for frequency coexistence.\nSpecifically, \\emph{in-line interference}, caused by LEO satellites moving near\nthe line-of-sight path between GEO satellite and GEO users (GUs), can\nsignificantly degrade GEO system throughput. This paper put forth a novel\nrate-splitting multiple access (RSMA) with a super-common message for GEO-LEO\ncoexisting satellite systems (CSS). By employing a super-common message that\nGUs can decode, GUs can mitigate the in-line interference by successive\ninterference cancellation (SIC). Moreover, we formulate a traffic-aware\nthroughput maximization (TTM) problem to satisfy the heterogeneous traffic\ndemands of users by minimizing total unmet throughput demands (or user\ndissatisfaction). By doing so, the TTM precoder can be flexibly adjusted\naccording to the interference leakage from LEO satellites to GUs and target\ntraffic demands. Numerical results confirm that our proposed method ensures\nseamless connectivity even in the GEO-LEO in-line interference regime under\nimperfect channel state information (CSI) at both the transmitter and receiver.\n']","[('satellite communications', 0.6399053335189819), ('satellite communication', 0.6159931421279907), ('satellite networks', 0.5898683667182922), ('multi satellite', 0.5765540599822998), ('leo satellite communication', 0.568963348865509), ('interference management', 0.4922533631324768), ('satellite', 0.48568403720855713), ('satellite systems', 0.4800630807876587), ('leo satellite', 0.4655263423919678), ('integrated satellite', 0.45009955763816833)]" 615,615,50,615_finite field elements_primitive polynomials_finite fields_elements finite field,"['finite field elements', 'primitive polynomials', 'finite fields', 'elements finite field', 'finite fields mathbb', 'mathbb f_q', 'finite field', 'finite field mathbb', 'mathbb finite field', 'finite fields let']","['Inverses of $r$-primitive $k$-normal elements over finite fields Let $r$, $n$ be positive integers, $k$ be a non-negative integer and $q$ be\nany prime power such that $r\\mid q^n-1.$ An element $\\alpha$ of the finite\nfield $\\mathbb{F}_{q^n}$ is called an {\\it $r$-primitive} element, if its\nmultiplicative order is $(q^n-1)/r$, and it is called a {\\it $k$-normal}\nelement over $\\mathbb{F}_q$, if the greatest common divisor of the polynomials\n$m_\\alpha(x)=\\sum_{i=1}^{n} \\alpha^{q^{i-1}}x^{n-i}$ and $x^n-1$ is of degree\n$k.$ In this article, we define the characteristic function for the set of\n$k$-normal elements, and with the help of this, we establish a sufficient\ncondition for the existence of an element $\\alpha$ in $\\mathbb{F}_{q^n}$, such\nthat $\\alpha$ and $\\alpha^{-1}$ both are simultaneously $r$-primitive and\n$k$-normal over $\\mathbb{F}_q$. Moreover, for $n>6k$, we show that there always\nexists an $r$-primitive and $k$-normal element $\\alpha$ such that $\\alpha^{-1}$\nis also $r$-primitive and $k$-normal in all but finitely many fields\n$\\mathbb{F}_{q^n}$ over $\\mathbb{F}_q$, where $q$ and $n$ are such that $r\\mid\nq^n-1$ and there exists a $k$-degree polynomial $g(x)\\mid x^n-1$ over\n$\\mathbb{F}_q$. In particular, we discuss the existence of an element $\\alpha$\nin $\\mathbb{F}_{q^n}$ such that $\\alpha$ and $\\alpha^{-1}$ both are\nsimultaneously $1$-primitive and $1$-normal over $\\mathbb{F}_q$.\n', 'About $r$- primitive and $k$-normal elements in finite fields In 2013, Huczynska, Mullen, Panario and Thomson introduced the concept of\n$k$-normal elements: an element $\\alpha \\in \\mathbb{F}_{q^n}$ is $k$-normal\nover $\\mathbb{F}_q$ if the greatest common divisor of the polynomials\n$g_{\\alpha}(x)= \\alpha x^{n-1}+\\alpha^qx^{n-2}+\\ldots\n+\\alpha^{q^{n-2}}x+\\alpha^{q^{n-1}}$ and $x^n-1$ in $\\mathbb{F}_{q^n}[x]$ has\ndegree $k$, generalizing the concept of normal elements (normal in the usual\nsense is $0$-normal). In this paper we discuss the existence of $r$-primitive,\n$k$-normal elements in $\\mathbb{F}_{q^n}$ over $\\mathbb{F}_{q}$, where an\nelement $\\alpha \\in \\mathbb{F}_{q^n}^*$ is $r$-primitive if its multiplicative\norder is $\\frac{q^n-1}{r}$. We provide many general results about the existence\nof this class of elements and we work a numerical example over finite fields of\ncharacteristic $11$.\n', 'Pairs of $r$-primitive and $k$-normal elements in finite fields Let $\\mathbb{F}_{q^n}$ be a finite field with $q^n$ elements and $r$ be a\npositive divisor of $q^n-1$. An element $\\alpha \\in \\mathbb{F}_{q^n}^*$ is\ncalled $r$-primitive if its multiplicative order is $(q^n-1)/r$. Also, $\\alpha\n\\in \\mathbb{F}_{q^n}$ is $k$-normal over $\\mathbb{F}_q$ if the greatest common\ndivisor of the polynomials $g_{\\alpha}(x) = \\alpha x^{n-1}+ \\alpha^q x^{n-2} +\n\\ldots + \\alpha^{q^{n-2}}x + \\alpha^{q^{n-1}}$ and $x^n-1$ in\n$\\mathbb{F}_{q^n}[x]$ has degree $k$. These concepts generalize the ideas of\nprimitive and normal elements, respectively. In this paper, we consider\nnon-negative integers $m_1,m_2,k_1,k_2$, positive integers $r_1,r_2$ and\nrational functions $F(x)=F_1(x)/F_2(x) \\in \\mathbb{F}_{q^n}(x)$ with $\\deg(F_i)\n\\leq m_i$ for $i\\in\\{ 1,2\\}$ satisfying certain conditions and we present\nsufficient conditions for the existence of $r_1$-primitive $k_1$-normal\nelements $\\alpha \\in \\mathbb{F}_{q^n}$ over $\\mathbb{F}_q$, such that\n$F(\\alpha)$ is an $r_2$-primitive $k_2$-normal element over $\\mathbb{F}_q$.\nFinally as an example we study the case where $r_1=2$, $r_2=3$, $k_1=2$,\n$k_2=1$, $m_1=2$ and $m_2=1$, with $n \\ge 7$.\n']","[('finite field elements', 0.5421686172485352), ('primitive polynomials', 0.5058491826057434), ('finite fields', 0.5045954585075378), ('elements finite field', 0.5003438591957092), ('finite fields mathbb', 0.4893413782119751), ('mathbb f_q', 0.48656943440437317), ('finite field', 0.48482733964920044), ('finite field mathbb', 0.4686537981033325), ('mathbb finite field', 0.4651802182197571), ('finite fields let', 0.46078377962112427)]" 616,616,50,616_representations lie groups_representations lie_irreducible unitary representation_real reductive groups,"['representations lie groups', 'representations lie', 'irreducible unitary representation', 'real reductive groups', 'real reductive group', 'irreducible representations', 'representations pi', 'representations compact', 'irreducible representation', 'unitary representation']","[""Symmetry breaking operators for real reductive groups of rank one For a pair of real reductive groups $G'\\subset G$ we consider the space ${\\rm\nHom}_{G'}(\\pi|_{G'},\\tau)$ of intertwining operators between spherical\nprincipal series representations $\\pi$ of $G$ and $\\tau$ of $G'$, also called\n\\emph{symmetry breaking operators}. Restricting to those pairs $(G,G')$ where\n${\\rm dim\\,Hom}_{G'}(\\pi|_{G'},\\tau)<\\infty$ and $G$ and $G'$ are of real rank\none, we classify all symmetry breaking operators explicitly in terms of their\ndistribution kernels. This generalizes previous work by Kobayashi--Speh for\n$(G,G')=({\\rm O}(1,n+1),{\\rm O}(1,n))$ to the reductive pairs $$ (G,G') = ({\\rm\nU}(1,n+1;\\mathbb{F}),{\\rm U}(1,m+1;\\mathbb{F})\\times F) \\qquad \\mbox{with\n$\\mathbb{F}=\\mathbb{C},\\mathbb{H},\\mathbb{O}$ and $F<{\\rm U}(n-m;\\mathbb{F})$.}\n$$ In most cases, all symmetry breaking operators can be constructed using one\nmeromorphic family of distributions whose poles and residues we describe in\ndetail. In addition to this family, there may occur some sporadic symmetry\nbreaking operators which we determine explicitly.\n"", 'On the direct integral decomposition in branching laws for real\n reductive groups The restriction of an irreducible unitary representation $\\pi$ of a real\nreductive group $G$ to a reductive subgroup $H$ decomposes into a direct\nintegral of irreducible unitary representations $\\tau$ of $H$ with\nmultiplicities $m(\\pi,\\tau)\\in\\mathbb{N}\\cup\\{\\infty\\}$. We show that on the\nsmooth vectors of $\\pi$, the direct integral is pointwise defined. This implies\nthat $m(\\pi,\\tau)$ is bounded above by the dimension of the space\n$\\operatorname{Hom}_H(\\pi^\\infty|_H,\\tau^\\infty)$ of intertwining operators\nbetween the smooth vectors, also called symmetry breaking operators, and\nprovides a precise relation between these two concepts of multiplicity.\n', ""Strong multiplicity one theorems for locally homogeneous spaces of\n compact type Let $G$ be a compact connected semisimple Lie group, let $K$ be a closed\nsubgroup of $G$, let $\\Gamma$ be a finite subgroup of $G$, and let $\\tau$ be a\nfinite-dimensional representation of $K$. For $\\pi$ in the unitary dual\n$\\widehat G$ of $G$, denote by $n_\\Gamma(\\pi)$ its multiplicity in\n$L^2(\\Gamma\\backslash G)$.\n We prove a strong multiplicity one theorem in the spirit of Bhagwat and\nRajan, for the $n_\\Gamma(\\pi)$ for $\\pi$ in the set $\\widehat G_\\tau$ of\nirreducible $\\tau$-spherical representations of $G$. More precisely, for\n$\\Gamma$ and $\\Gamma'$ finite subgroups of $G$, we prove that if\n$n_{\\Gamma}(\\pi)= n_{\\Gamma'}(\\pi)$ for all but finitely many $\\pi\\in \\widehat\nG_\\tau$, then $\\Gamma$ and $\\Gamma'$ are $\\tau$-representation equivalent, that\nis, $n_{\\Gamma}(\\pi)=n_{\\Gamma'}(\\pi)$ for all $\\pi\\in \\widehat G_\\tau$.\n Moreover, when $\\widehat G_\\tau$ can be written as a finite union of strings\nof representations, we prove a finite version of the above result. For any\nfinite subset $\\widehat {F}_{\\tau}$ of $\\widehat G_{\\tau}$ verifying some mild\nconditions, the values of the $n_\\Gamma(\\pi)$ for $\\pi\\in\\widehat F_{\\tau}$\ndetermine the $n_\\Gamma(\\pi)$'s for all $\\pi \\in \\widehat G_\\tau$. In\nparticular, for two finite subgroups $\\Gamma$ and $\\Gamma'$ of $G$, if\n$n_\\Gamma(\\pi) = n_{\\Gamma'}(\\pi)$ for all $\\pi\\in \\widehat F_{\\tau}$ then the\nequality holds for every $\\pi \\in \\widehat G_\\tau$. We use algebraic methods\ninvolving generating functions and some facts from the representation theory of\n$G$.\n""]","[('representations lie groups', 0.5242888331413269), ('representations lie', 0.4930185377597809), ('irreducible unitary representation', 0.4657241404056549), ('real reductive groups', 0.4617254436016083), ('real reductive group', 0.4566650986671448), ('irreducible representations', 0.4547811448574066), ('representations pi', 0.4515068829059601), ('representations compact', 0.44772660732269287), ('irreducible representation', 0.4431324005126953), ('unitary representation', 0.43975791335105896)]" 617,617,50,617_decoding performance_decoding_belief propagation decoder_based decoding,"['decoding performance', 'decoding', 'belief propagation decoder', 'based decoding', 'neural decoders', 'decoders', 'decoder', 'propagation bp decoding', 'based decoders', 'propagation decoder']","['Pruning and Quantizing Neural Belief Propagation Decoders We consider near maximum-likelihood (ML) decoding of short linear block\ncodes. In particular, we propose a novel decoding approach based on neural\nbelief propagation (NBP) decoding recently introduced by Nachmani et al. in\nwhich we allow a different parity-check matrix in each iteration of the\nalgorithm. The key idea is to consider NBP decoding over an overcomplete\nparity-check matrix and use the weights of NBP as a measure of the importance\nof the check nodes (CNs) to decoding. The unimportant CNs are then pruned. In\ncontrast to NBP, which performs decoding on a given fixed parity-check matrix,\nthe proposed pruning-based neural belief propagation (PB-NBP) typically results\nin a different parity-check matrix in each iteration. For a given complexity in\nterms of CN evaluations, we show that PB-NBP yields significant performance\nimprovements with respect to NBP. We apply the proposed decoder to the decoding\nof a Reed-Muller code, a short low-density parity-check (LDPC) code, and a\npolar code. PB-NBP outperforms NBP decoding over an overcomplete parity-check\nmatrix by 0.27-0.31 dB while reducing the number of required CN evaluations by\nup to 97%. For the LDPC code, PB-NBP outperforms conventional belief\npropagation with the same number of CN evaluations by 0.52 dB. We further\nextend the pruning concept to offset min-sum decoding and introduce a\npruning-based neural offset min-sum (PB-NOMS) decoder, for which we jointly\noptimize the offsets and the quantization of the messages and offsets. We\ndemonstrate performance 0.5 dB from ML decoding with 5-bit quantization for the\nReed-Muller code.\n', 'Boosting Learning for LDPC Codes to Improve the Error-Floor Performance Low-density parity-check (LDPC) codes have been successfully commercialized\nin communication systems due to their strong error correction capabilities and\nsimple decoding process. However, the error-floor phenomenon of LDPC codes, in\nwhich the error rate stops decreasing rapidly at a certain level, presents\nchallenges for achieving extremely low error rates and deploying LDPC codes in\nscenarios demanding ultra-high reliability. In this work, we propose training\nmethods for neural min-sum (NMS) decoders to eliminate the error-floor effect.\nFirst, by leveraging the boosting learning technique of ensemble networks, we\ndivide the decoding network into two neural decoders and train the post decoder\nto be specialized for uncorrected words that the first decoder fails to\ncorrect. Secondly, to address the vanishing gradient issue in training, we\nintroduce a block-wise training schedule that locally trains a block of weights\nwhile retraining the preceding block. Lastly, we show that assigning different\nweights to unsatisfied check nodes effectively lowers the error-floor with a\nminimal number of weights. By applying these training methods to standard LDPC\ncodes, we achieve the best error-floor performance compared to other decoding\nmethods. The proposed NMS decoder, optimized solely through novel training\nmethods without additional modules, can be integrated into existing LDPC\ndecoders without incurring extra hardware costs. The source code is available\nat https://github.com/ghy1228/LDPC_Error_Floor .\n', 'Pruning Neural Belief Propagation Decoders We consider near maximum-likelihood (ML) decoding of short linear block codes\nbased on neural belief propagation (BP) decoding recently introduced by\nNachmani et al.. While this method significantly outperforms conventional BP\ndecoding, the underlying parity-check matrix may still limit the overall\nperformance. In this paper, we introduce a method to tailor an overcomplete\nparity-check matrix to (neural) BP decoding using machine learning. We consider\nthe weights in the Tanner graph as an indication of the importance of the\nconnected check nodes (CNs) to decoding and use them to prune unimportant CNs.\nAs the pruning is not tied over iterations, the final decoder uses a different\nparity-check matrix in each iteration. For Reed-Muller and short low-density\nparity-check codes, we achieve performance within 0.27 dB and 1.5 dB of the ML\nperformance while reducing the complexity of the decoder.\n']","[('decoding performance', 0.5488951802253723), ('decoding', 0.5309605598449707), ('belief propagation decoder', 0.5270020961761475), ('based decoding', 0.5249950885772705), ('neural decoders', 0.5195695757865906), ('decoders', 0.510630190372467), ('decoder', 0.4980385899543762), ('propagation bp decoding', 0.49302297830581665), ('based decoders', 0.4834640324115753), ('propagation decoder', 0.4801415801048279)]" 618,618,50,618_crystal basis_kac moody algebras_crystal operators_quantum affine algebras,"['crystal basis', 'kac moody algebras', 'crystal operators', 'quantum affine algebras', 'moody algebras', 'kashiwara crystals', 'crystals type', 'crystal structure', 'crystal bases', 'demazure crystals']","[""Adapted Sequences and Polyhedral Realizations of Crystal Bases for\n highest weight modules The polyhedral realizations for crystal bases of the integrable highest\nweight modules of $U_q(\\mathfrak{g})$ have been introduced in ([T.Nakashima, J.\nAlgebra, vol.219, no. 2, (1999)]), which describe the crystal bases as sets of\nlattice points in the infinite $\\mathbb{Z}$-lattice $\\mathbb{Z}^{\\infty}$ given\nby some system of linear inequalities, where $\\mathfrak{g}$ is a symmetrizable\nKac-Moody Lie algebra. To construct the polyhedral realization, we need to fix\nan infinite sequence $\\iota$ from the indices of the simple roots. If the pair\n($\\iota$,$\\lambda$) ($\\lambda$: a dominant integral weight) satisfies the\n`ample' condition then there are some procedure to calculate the sets of linear\ninequalities.\n In this article, we show that if $\\iota$ is an adapted sequence (defined in\nour paper [Y.Kanakubo, T.Nakashima, arXiv:1904.10919]) then the pair ($\\iota$,\n$\\lambda$) satisfies the ample condition for any dominant integral weight\n$\\lambda$ in the case $\\mathfrak{g}$ is a classical Lie algebra. Furthermore,\nwe reveal the explicit forms of the polyhedral realizations of the crystal\nbases $B(\\lambda)$ associated with arbitrary adapted sequences $\\iota$ in terms\nof column tableaux. As an application, we will give a combinatorial description\nof the function $\\varepsilon_i^*$ on the crystal base $B(\\infty)$.\n"", 'A Demazure Character Formula for the Product Monomial Crystal The product monomial crystal was defined by Kamnitzer, Tingley, Webster,\nWeekes, and Yacobi for any semisimple simply-laced Lie algebra $\\mathfrak{g}$,\nand depends on a collection of parameters $\\mathbf{R}$. We show that a family\nof truncations of this crystal are Demazure crystals, and give a Demazure-type\nformula for the character of each truncation, and the crystal itself. This\ncharacter formula shows that the product monomial crystal is the crystal of a\ngeneralised Demazure module, as defined by Lakshmibai, Littelmann and Magyar.\nIn type $A$, we show the product monomial crystal is the crystal of a\ngeneralised Schur module associated to a column-convex diagram depending on\n$\\mathbf{R}$.\n', 'On Combinatorial Models for Affine Crystals The tableau model for Kirillov-Reshetikhin (KR) crystals, which are finite\ndimensional crystals corresponding to certain affine Lie algebras, is commonly\nused for its ease of crystal operator calculations. However, its simplicity\nmakes quite complex the calculation of statistics such as: keys (used to\nexpress Demazure characters), the crystal energy function (an affine grading on\ntensor products of KR crystals), and the combinatorial R-matrix (an affine\ncrystal isomorphism permuting factors in a tensor product of KR crystals). It\nhas been shown that these calculations are much simpler with the added\nstructure in the quantum alcove model for KR crystals. In this paper, we give\nan explicit description of the crystal isomorphism between the mentioned\nrealizations of KR crystals in all classical Lie types.\n']","[('crystal basis', 0.5591942667961121), ('kac moody algebras', 0.5395922064781189), ('crystal operators', 0.5387303829193115), ('quantum affine algebras', 0.5231804847717285), ('moody algebras', 0.49388808012008667), ('kashiwara crystals', 0.48609188199043274), ('crystals type', 0.4772756099700928), ('crystal structure', 0.47438162565231323), ('crystal bases', 0.46790051460266113), ('demazure crystals', 0.4634953439235687)]" 619,619,50,619_killing tensor_killing vector fields_killing fields_killing vectors,"['killing tensor', 'killing vector fields', 'killing fields', 'killing vectors', 'riemannian manifolds', 'riemannian manifold', 'conformal killing', 'killing vector', 'lorentzian manifolds', 'lorentzian manifold']","[""Killing vector fields on semi-Riemannian product manifolds Hano's theorem states that the space of Killing vector fields of a complete\nsimply connected Riemannian manifold is isomorphic to the direct sum of the\nKilling vector fields of the factors in its de Rham decomposition. We prove a\ngeneralisation of this theorem to manifolds with indefinite metrics that\nrequires an assumption on the factors, and show by example why this assumption\nis needed.\n"", 'Conformal Killing tensors and their Killing scales We address the problem of how to characterise when a rank-two conformal\nKilling tensor is the trace-free part of a Killing tensor for a metric in the\nconformal class. We call such a metric a Killing scale. Our approach is via\ndifferential prolongation using conformally invariant tractor calculus. First,\nwe show that there is a useful partial prolongation of the conformal Killing\nequation to a simplified equation for sections of some tractor bundle. We then\nuse this partial prolongation to provide such an invariant characterisation in\nterms of the scale tractor and this partial prolongation. This captures\ninvariantly the relevant Bertrand--Darboux equation. We show that Einstein\nKilling scales have a special place in the theory. On conformally flat\nmanifolds, we give the full prolongation of the conformally Killing equation to\na conformally invariant connection on a tractor bundle. Using this, we provide\na characterisation of (non-scalar flat) Einstein Killing scales by an algebraic\nequation for the scale tractors corresponding to such metrics. This also\nprovides an algebraic description of the linear subspace of conformal Killing\ntensors that are compatible with a given Einstein Killing scale. For\ncompleteness and to introduce the main ideas, we also study analogous questions\nfor conformal Killing vectors.\n', 'Quadratic Killing tensors on symmetric spaces which are not generated by\n Killing vector fields Every Killing tensor field on the space of constant curvature and on the\ncomplex projective space can be decomposed into the sum of symmetric tensor\nproducts of Killing vector fields (equivalently, every polynomial in the\nvelocities integral of the geodesic flow is a polynomial in the linear\nintegrals). This fact led to the natural question on whether this property is\nshared by Killing tensor fields on all Riemannian symmetric spaces. We answer\nthis question in the negative by constructing explicit examples of quadratic\nKilling tensor fields which are not quadratic forms in the Killing vector\nfields on the quaternionic projective spaces $\\mathbb{H} P^n, n \\ge 3$, and on\nthe Cayley projective plane $\\mathbb{O} P^2$.\n']","[('killing tensor', 0.7060989737510681), ('killing vector fields', 0.6658459901809692), ('killing fields', 0.5858469605445862), ('killing vectors', 0.5790470242500305), ('riemannian manifolds', 0.5774942636489868), ('riemannian manifold', 0.546369731426239), ('conformal killing', 0.5421743392944336), ('killing vector', 0.535679042339325), ('lorentzian manifolds', 0.5323808193206787), ('lorentzian manifold', 0.49343693256378174)]" 620,620,50,620_theories extending_constructive theory_valued models_intuitionistic,"['theories extending', 'constructive theory', 'valued models', 'intuitionistic', 'countable models', 'axiom choice', 'existence models', 'models theory', 'classical logic', 'axioms']","['Choice and independence of premise rules in intuitionistic set theory Choice and independence of premise principles play an important role in\ncharacterizing Kreisel\'s modified realizability and G\\""odel\'s Dialectica\ninterpretation. In this paper we show that a great many intuitionistic set\ntheories are closed under the corresponding rules for finite types over\n$\\mathbb{N}$. It is also shown that the existence property (or existential\ndefinability property) holds for statements of the form $\\exists y^{\\sigma}\\,\n\\varphi(y)$, where the variable $y$ ranges over objects of finite type\n$\\sigma$. This applies in particular to ${\\sf CZF}$ (Constructive\nZermelo-Fraenkel set theory) and ${\\sf IZF}$ (Intuitionistic Zermelo-Fraenkel\nset theory), two systems known not to have the general existence property. On\nthe technical side, the paper uses a method that amalgamates generic\nrealizability for set theory with truth, whereby the underlying partial\ncombinatory algebra is required to contain all objects of finite type.\n', 'Extensional realizability and choice for dependent types in\n intuitionistic set theory In ""Extensional realizability for intuitionistic set theory"", we introduced\nan extensional variant of generic realizability, where realizers act\nextensionally on realizers, and showed that this form of realizability provides\n""inner"" models of $\\sf CZF$ (constructive Zermelo-Fraenkel set theory) and $\\sf\nIZF$ (intuitionistic Zermelo-Fraenkel set theory), that further validate ${\\sf\nAC}_{\\sf FT}$ (the axiom of choice in all finite types). In this paper, we show\nthat extensional generic realizability validates several choice principles for\ndependent types, all exceeding ${\\sf AC}_{\\sf FT}$. We then show that adding\nsuch choice principles does not change the arithmetic part of either $\\sf CZF$\nor $\\sf IZF$.\n', ""Extensional realizability for intuitionistic set theory In generic realizability for set theories, realizers treat unbounded\nquantifiers generically. To this form of realizability, we add another layer of\nextensionality by requiring that realizers ought to act extensionally on\nrealizers, giving rise to a realizability universe $\\mathrm{V_{ex}}(A)$ in\nwhich the axiom of choice in all finite types ${\\sf AC}_{{\\sf FT}}$ is\nrealized, where $A$ stands for an arbitrary partial combinatory algebra. This\nconstruction furnishes 'inner models' of many set theories that additionally\nvalidate ${\\sf AC}_{{\\sf FT}}$, in particular it provides a self-validating\nsemantics for $\\sf CZF$ (Constructive Zermelo-Fraenkel set theory) and $\\sf\nIZF$ (Intuitionistic Zermelo-Fraenkel set theory). One can also add large set\naxioms and many other principles.\n""]","[('theories extending', 0.5012504458427429), ('constructive theory', 0.49250322580337524), ('valued models', 0.46664437651634216), ('intuitionistic', 0.4491322636604309), ('countable models', 0.4441967308521271), ('axiom choice', 0.4381404221057892), ('existence models', 0.42313843965530396), ('models theory', 0.4185433089733124), ('classical logic', 0.41770970821380615), ('axioms', 0.4058234989643097)]" 621,621,50,621_dimensional harmonic oscillator_quantum harmonic_dimensional harmonic_harmonic oscillator potential,"['dimensional harmonic oscillator', 'quantum harmonic', 'dimensional harmonic', 'harmonic oscillator potential', 'harmonic oscillator', 'coherent states', 'supersymmetric quantum mechanics', 'energy spectrum', 'excitation modes', 'quantization conditions']","['Confined One Dimensional Harmonic Oscillator as a Two-Mode System The one-dimensional harmonic oscillator in a box problem is possibly the\nsimplest example of a two-mode system. This system has two exactly solvable\nlimits, the harmonic oscillator and a particle in a (one-dimensional) box. Each\nof the two limits has a characteristic spectral structure describing the two\ndifferent excitation modes of the system. Near each of these limits, one can\nuse perturbation theory to achieve an accurate description of the eigenstates.\nAway from the exact limits, however, one has to carry out a matrix\ndiagonalization because the basis-state mixing that occurs is typically too\nlarge to be reproduced in any other way. An alternative to casting the problem\nin terms of one or the other basis set consists of using an ""oblique"" basis\nthat uses both sets. Through a study of this alternative in this\none-dimensional problem, we are able to illustrate practical solutions and\ninfer the applicability of the concept for more complex systems, such as in the\nstudy of complex nuclei where oblique-basis calculations have been successful.\nKeywords: one-dimensional harmonic oscillator, particle in a box, exactly\nsolvable models, two-mode system, oblique basis states, perturbation theory,\ncoherent states, adiabatic mixing.\n', 'Confined One Dimensional Harmonic Oscillator as a Two-Mode System The one-dimensional harmonic oscillator in a box problem is possibly the\nsimplest example of a two-mode system. This system has two exactly solvable\nlimits, the harmonic oscillator and a particle in a (one-dimensional) box. Each\nof the two limits has a characteristic spectral structure describing the two\ndifferent excitation modes of the system. Near each of these limits, one can\nuse perturbation theory to achieve an accurate description of the eigenstates.\nAway from the exact limits, however, one has to carry out a matrix\ndiagonalization because the basis-state mixing that occurs is typically too\nlarge to be reproduced in any other way. An alternative to casting the problem\nin terms of one or the other basis set consists of using an ""oblique"" basis\nthat uses both sets. Through a study of this alternative in this\none-dimensional problem, we are able to illustrate practical solutions and\ninfer the applicability of the concept for more complex systems, such as in the\nstudy of complex nuclei where oblique-basis calculations have been successful.\nKeywords: one-dimensional harmonic oscillator, particle in a box, exactly\nsolvable models, two-mode system, oblique basis states, perturbation theory,\ncoherent states, adiabatic mixing.\n', 'Confined One Dimensional Harmonic Oscillator as a Two-Mode System The one-dimensional harmonic oscillator in a box problem is possibly the\nsimplest example of a two-mode system. This system has two exactly solvable\nlimits, the harmonic oscillator and a particle in a (one-dimensional) box. Each\nof the two limits has a characteristic spectral structure describing the two\ndifferent excitation modes of the system. Near each of these limits, one can\nuse perturbation theory to achieve an accurate description of the eigenstates.\nAway from the exact limits, however, one has to carry out a matrix\ndiagonalization because the basis-state mixing that occurs is typically too\nlarge to be reproduced in any other way. An alternative to casting the problem\nin terms of one or the other basis set consists of using an ""oblique"" basis\nthat uses both sets. Through a study of this alternative in this\none-dimensional problem, we are able to illustrate practical solutions and\ninfer the applicability of the concept for more complex systems, such as in the\nstudy of complex nuclei where oblique-basis calculations have been successful.\nKeywords: one-dimensional harmonic oscillator, particle in a box, exactly\nsolvable models, two-mode system, oblique basis states, perturbation theory,\ncoherent states, adiabatic mixing.\n']","[('dimensional harmonic oscillator', 0.5852524042129517), ('quantum harmonic', 0.5241262316703796), ('dimensional harmonic', 0.4502199590206146), ('harmonic oscillator potential', 0.44647690653800964), ('harmonic oscillator', 0.4449795186519623), ('coherent states', 0.4237481653690338), ('supersymmetric quantum mechanics', 0.41242504119873047), ('energy spectrum', 0.40529268980026245), ('excitation modes', 0.40284332633018494), ('quantization conditions', 0.39904719591140747)]" 622,622,50,622_voting systems_majority voting_ballot_voting,"['voting systems', 'majority voting', 'ballot', 'voting', 'number voters', 'elections', 'voter', 'polling', 'votes', 'voters']","[""Tradeoffs in Hierarchical Voting Systems Condorcet's jury theorem states that the correct outcome is reached in direct\nmajority voting systems with sufficiently large electorates as long as each\nvoter's independent probability of voting for that outcome is greater than 0.5.\nYet, in situations where direct voting systems are infeasible, such as due to\nhigh implementation and infrastructure costs, hierarchical voting systems\nprovide a reasonable alternative. We study differences in outcome precision\nbetween hierarchical and direct voting systems for varying group sizes,\nabstention rates, and voter competencies. Using asymptotic expansions of the\nderivative of the reliability function (or Banzhaf number), we first prove that\nindirect systems differ most from their direct counterparts when group size and\nnumber are equal to each other, and therefore to $\\sqrt{N_{\\rm d}}$, where\n$N_{\\rm d}$ is the total number of voters in the direct system. In multitier\nsystems, we prove that this difference is maximized when group size equals\n$\\sqrt[n]{N_{\\rm d}}$, where $n$ is the number of hierarchical levels. Second,\nwe show that while direct majority rule always outperforms hierarchical voting\nfor homogeneous electorates that vote with certainty, as group numbers and size\nincrease, hierarchical majority voting gains in its ability to represent all\neligible voters. Furthermore, when voter abstention and competency are\ncorrelated within groups, hierarchical systems often outperform direct voting,\nwhich we show by using a generating function approach that is able to\nanalytically characterize heterogeneous voting systems.\n"", 'Recognizing distributed approval voting forms and correspondences Each voter $i \\in I$ has $\\alpha_i$ cards that (s)he distributes among the\ncandidates $a \\in A$ as a measure of approval. One (or several) candidate(s)\nwho received the maximum number of cards is (are) elected. We provide\npolynomial algorithms to recognize voting forms and voting correspondences\ngenerated by such voting schemes in cases when either the number of candidates\nor the number of voters is equal to $2$. We prove that for two voters, if\n$\\alpha_2 \\geq \\alpha_1-2\\geq 0$ then the unique voting correspondence has\ndistinct rows. We also characterize voting forms with distinct rows.\n', 'Noise Stability of Ranked Choice Voting We conjecture that Borda count is the ranked choice voting method that best\npreserves the outcome of an election with randomly corrupted votes, among all\nfair voting methods with small influences satisfying the Condorcet Loser\nCriterion. This conjecture is an adaptation of the Plurality is Stablest\nConjecture to the setting of ranked choice voting. Since the plurality function\ndoes not satisfy the Condorcet Loser Criterion, our new conjecture is not\ndirectly related to the Plurality is Stablest Conjecture. Nevertheless, we show\nthat the Plurality is Stablest Conjecture implies our new Borda count is\nStablest conjecture. We therefore deduce that Borda count is stablest for\nelections with three candidates when the corrupted votes are nearly\nuncorrelated with the original votes. We also adapt a dimension reduction\nargument to this setting, showing that the optimal ranked choice voting method\nis ""low-dimensional.""\n The Condorcet Loser Criterion asserts that a candidate must lose an election\nif each other candidate is preferred in head-to-head comparisons. Lastly, we\ndiscuss a variant of our conjecture with the Condorcet Winner Criterion as a\nconstraint instead of the Condorcet Loser Criterion. In this case, we have no\nguess for the most stable ranked choice voting method.\n']","[('voting systems', 0.7061023116111755), ('majority voting', 0.5919284820556641), ('ballot', 0.5442880392074585), ('voting', 0.5346370339393616), ('number voters', 0.5295928120613098), ('elections', 0.5253397226333618), ('voter', 0.5107036828994751), ('polling', 0.48946613073349), ('votes', 0.4821479320526123), ('voters', 0.48135024309158325)]" 623,623,50,623_fluid rigid body_viscous incompressible_incompressible viscous_incompressible viscous fluid,"['fluid rigid body', 'viscous incompressible', 'incompressible viscous', 'incompressible viscous fluid', 'incompressible navier stokes', 'viscous incompressible fluid', 'fluid rigid', 'navier stokes equations', 'viscous compressible fluid', 'rigid bodies']","['A uniqueness result for 3D incompressible fluid-rigid body interaction\n problem We study a 3D nonlinear moving boundary fluid-structure interaction problem\ndescribing the interaction of the fluid flow with a rigid body. The fluid flow\nis governed by 3D incompressible Navier-Stokes equations, while the motion of\nthe rigid body is described by a system of ordinary differential equations\ncalled Euler equations for the rigid body. The equations are fully coupled via\ndynamical and kinematic coupling conditions. We consider two different kinds of\nkinematic coupling conditions: no-slip and slip. In both cases we prove a\ngeneralization of the well-known weak-strong uniqueness result for the\nNavier-Stokes equations to the fluid-rigid body system. More precisely, we\nprove that weak solutions that additionally satisfy Prodi-Serrin $L^r-L^s$\ncondition are unique in the class of Leray-Hopf weak solutions.\n', 'The vanishing limit of a rigid body in three-dimensional viscous\n incompressible fluid We consider the evolution of a small rigid body in an incompressible viscous\nfluid filling the whole space $\\rline^3$. When the small rigid body shrinks to\na ""massless"" point in the sense that its density is constant, we prove that the\nsolution of the fluid-rigid body system converges to a solution of the\nNavier-Stokes equations in the full space. Based on some $L^p-L^q$ estimates of\nthe fluid-structure semigroup and a fixed point argument, we obtain a uniform\nestimate of velocity of the rigid body. This allows us to construct admissible\ntest functions which plays a key role in the procedure of passing to the limit.\n', 'On the small rigid body limit in 3D incompressible flows We consider the evolution of a small rigid body in an incompressible viscous\nfluid filling the whole space. The motion of the fluid is modelled by the\nNavier-Stokes equations, whereas the motion of the rigid body is described by\nthe conservation law of linear and angular momentum. Under the assumption that\nthe diameter of the rigid body tends to zero and that the density of the rigid\nbody goes to infinity, we prove that the solution of the fluid-rigid body\nsystem converges to a solution of the Navier-Stokes equations in the full space\nwithout rigid body.\n']","[('fluid rigid body', 0.6486569046974182), ('viscous incompressible', 0.6048112511634827), ('incompressible viscous', 0.60201096534729), ('incompressible viscous fluid', 0.6018893718719482), ('incompressible navier stokes', 0.6002814769744873), ('viscous incompressible fluid', 0.5932202339172363), ('fluid rigid', 0.5809428691864014), ('navier stokes equations', 0.5476133823394775), ('viscous compressible fluid', 0.540245532989502), ('rigid bodies', 0.5352464318275452)]" 624,624,50,624_drazin inverse_banach algebras_generalized inverses_generalized drazin,"['drazin inverse', 'banach algebras', 'generalized inverses', 'generalized drazin', 'banach algebra', 'banach algebra mathcal', 'inverse generalized', 'invertible elements', 'multilinear algebra', 'operator matrices']","['Drazin and g-Drazin invertibility of combinations of three Banach\n algebra elements Consider a complex unital Banach algebra $\\mathcal{A}.$ For\n$x_1,x_2,x_3\\in\\mathcal{A},$ in this paper, we establish that under certain\nassumptions on $x_1,x_2,x_3$, Drazin (resp. g-Drazin) invertibility of any\nthree elements among $x_1,x_2,x_3$ and $x_1+x_2+x_3\\text{ }(\\text{or\n}x_1x_2+x_1x_3+x_2x_3)$ ensure the Drazin (resp. g-Drazin) invertibility of the\nremaining one. As a consequence for two idempotents $p,q\\in\\mathcal{A},$ this\nresult indicates the equivalence between Drazin (resp. g-Drazin) invertibility\nof\n$$\\lambda_1p+\\gamma_1q-\\lambda_1pq+\\lambda_2\\left(pqp-(pq)^2\\right)+\\cdots+\\lambda_m\\left((pq)^{m-1}p-(pq)^m\\right)$$\nand\n$$\\lambda_1-\\lambda_1pq+\\lambda_2\\left(pqp-(pq)^2\\right)+\\cdots+\\lambda_m\\left((pq)^{m-1}p-(pq)^m\\right),$$\nwhere $\\gamma_1,\\lambda_i\\in\\mathbb{C}$ for $i=1,2,\\cdots,m,$ with\n$\\lambda_1\\gamma_1\\neq0.$ Furthermore, for $x_1,x_2$, we establish that the\nDrazin (resp. g-Drazin) invertibility of any two elements among $x_1,x_2$ and\n$x_1+x_2$ indicates the Drazin (resp. g-Drazin) invertibility of the remaining\none, provided that $x_1x_2=\\alpha(x_1+x_2)$ for some $\\alpha\\in\\mathbb{C}$.\nAdditionally, if it exists, we furnish a new formula to represent the Drazin\n(resp. g-Drazin) inverse of any element among $x_1,x_2$ and $x_1+x_2$, by using\nthe other two elements and their Drazin (resp. g-Drazin) inverse.\n', ""Some New Results on Pseudo n-Strong Drazin Inverses in Rings In this paper, we give a further study in-depth of the pseudo $n$-strong\nDrazin inverses in an associative unital ring $R$. The characterizations of\nelements $a,b\\in R$ for which $aa^{\\tiny{\\textcircled{\\qihao\nD}}}=bb^{\\tiny{\\textcircled{\\qihao D}}}$ are provided, and some new equivalent\nconditions on pseudo $n$-strong Drazin inverses are obtained. In particular, we\nshow that an element $a\\in R$ is pseudo $n$-strong Drazin invertible if, and\nonly if, $a$ is $p$-Drazin invertible and $a-a^{n+1}\\in \\sqrt{J(R)}$ if, and\nonly if, there exists $e^2=e\\in {\\rm comm}^2(a)$ such that $ae\\in \\sqrt{J(R)}$\nand $1-(a+e)^n\\in \\sqrt{J(R)}$. We also consider pseudo $n$-strong Drazin\ninverses with involution, and discuss the extended versions of Cline's formula\nand Jacobson's lemma of this new class of generalized inverses. Likewise, we\ndefine and explore the so-called {\\it pseudo $\\pi$-polar} rings and demonstrate\ntheir relationships with periodic rings and strongly $\\pi$-regular rings,\nrespectively.\n"", ""Extensions of Jacobson's lemma for generalized inverses in a ring Let $R$ be an associative ring with unit $1$, and $a, b, c\\in R$ satisfy\n$a(ba)^{2}=abaca=acaba=(ac)^{2}a$, this paper proves that $1-ac$ has\ngeneralized Drazin inverse (Drazin inverse, pseudo Drazin inverse,\nrespectively) if and only if $1-ba$ has generalized Drazin inverse (Drazin\ninverse, pseudo Drazin inverse, respectively). In particular, we obtain new\ncommon spectral properties for $ac$ and $ba$ in Banach algebras. As\napplications, new extension of Jacobson's lemma for B-Fredholm elements and\ngeneralized Fredholm elements in rings is established.\n""]","[('drazin inverse', 0.6052400469779968), ('banach algebras', 0.5553942322731018), ('generalized inverses', 0.5173655152320862), ('generalized drazin', 0.509171187877655), ('banach algebra', 0.4996313154697418), ('banach algebra mathcal', 0.4693065583705902), ('inverse generalized', 0.4282206594944), ('invertible elements', 0.41347047686576843), ('multilinear algebra', 0.41207945346832275), ('operator matrices', 0.40104711055755615)]" 625,625,50,625_reduced dynamics_nonlinear modes_nonlinear structures_nonlinear dynamics,"['reduced dynamics', 'nonlinear modes', 'nonlinear structures', 'nonlinear dynamics', 'systems spectral', 'nonlinear reduction', 'reduction nonlinear', 'reduced order models', 'periodic systems', 'finite element models']","['Nonlinear analysis of forced mechanical systems with internal resonance\n using spectral submanifolds, Part II: Bifurcation and quasi-periodic response In Part I of this paper, we have used spectral submanifold (SSM) theory to\nconstruct reduced-order models for harmonically excited mechanical systems with\ninternal resonances. In that setting, extracting forced response curves formed\nby periodic orbits of the full system was reduced to locating the solution\nbranches of equilibria of the corresponding reduced-order model. Here we use\nbifurcations of the equilibria of the reduced-order model to predict\nbifurcations of the periodic response of the full system. Specifically, we\nidentify Hopf bifurcations of equilibria and limit cycles in reduced models on\nSSMs to predict the existence of two-dimensional and three-dimensional\nquasi-periodic attractors and repellers in periodically forced mechanical\nsystems of arbitrary dimension. We illustrate the accuracy and efficiency of\nthese computations on finite-element models of beams and plates.\n', ""Nonlinear analysis of forced mechanical systems with internal resonance\n using spectral submanifolds, Part I: Periodic response and forced response\n curve We show how spectral submanifold theory can be used to construct\nreduced-order models for harmonically excited mechanical systems with internal\nresonances. Efficient calculations of periodic and quasi-periodic responses\nwith the reduced-order models are discussed in this paper and its companion,\nPart II, respectively. The dimension of a reduced-order model is determined by\nthe number of modes involved in the internal resonance, independently of the\ndimension of the full system. The periodic responses of the full system are\nobtained as equilibria of the reduced-order model on spectral submanifolds. The\nforced response curve of periodic orbits then becomes a manifold of equilibria,\nwhich can be easily extracted using parameter continuation. To demonstrate the\neffectiveness and efficiency of the reduction, we compute the forced response\ncurves of several high-dimensional nonlinear mechanical systems, including the\nfinite-element models of a von K\\'arm\\'an beam and a plate.\n"", 'Fast computation and characterization of forced response surfaces via\n spectral submanifolds and parameter continuation For mechanical systems subject to periodic excitation, forced response curves\n(FRCs) depict the relationship between the amplitude of the periodic response\nand the forcing frequency. For nonlinear systems, this functional relationship\nis different for different forcing amplitudes. Forced response surfaces (FRSs),\nwhich relate the response amplitude to both forcing frequency and forcing\namplitude, are then required in such settings. Yet, FRSs have been rarely\ncomputed in the literature due to the higher numerical effort they require.\nHere, we use spectral submanifolds (SSMs) to construct reduced-order models\n(ROMs) for high-dimensional mechanical systems and then use multidimensional\nmanifold continuation of fixed points of the SSM-based ROMs to efficiently\nextract the FRSs. Ridges and trenches in an FRS characterize the main features\nof the forced response. We show how to extract these ridges and trenches\ndirectly without computing the FRS via reduced optimization problems on the\nROMs. We demonstrate the effectiveness and efficiency of the proposed approach\nby calculating the FRSs and their ridges and trenches for a plate with a 1:1\ninternal resonance and for a shallow shell with a 1:2 internal resonance.\n']","[('reduced dynamics', 0.5322452187538147), ('nonlinear modes', 0.4609927535057068), ('nonlinear structures', 0.4592623710632324), ('nonlinear dynamics', 0.44371408224105835), ('systems spectral', 0.4374871551990509), ('nonlinear reduction', 0.4344729781150818), ('reduction nonlinear', 0.4294452965259552), ('reduced order models', 0.40673887729644775), ('periodic systems', 0.3959250748157501), ('finite element models', 0.3869994580745697)]" 626,626,50,626_strongly regular graphs_strongly regular graph_graphs strongly regular_regular graphs,"['strongly regular graphs', 'strongly regular graph', 'graphs strongly regular', 'regular graphs', 'regular graphs give', 'regular graph', 'regular graph vertices', 'graphs strongly', 'divisible design', 'graphs construction']","['Strongly regular graphs decomposable into a divisible design graph and a\n Hoffman coclique In 2022, the second author found a prolific construction of strongly regular\ngraphs, which is based on joining a coclique and a divisible design graph with\ncertain parameters. The construction produces strongly regular graphs with the\nsame parameters as the complement of the symplectic graph $\\mathsf{Sp}(2d,q)$.\n In this paper, we determine the parameters of strongly regular graphs which\nadmit a decomposition into a divisible design graph and a coclique attaining\nthe Hoffman bound. In particular, it is shown that when the least eigenvalue of\nsuch a strongly regular graph is a prime power, its parameters coincide with\nthose of the complement of $\\mathsf{Sp}(2d,q)$. Furthermore, a generalization\nof the construction is discussed.\n', '$q$-Analogs of divisible design graphs and Deza graphs Divisible design graphs were introduced in 2011 by Haemers, Kharaghani and\nMeulenberg. In this paper, we introduce the notion of $q$-analogs of divisible\ndesign graphs and show that all $q$-analogs of divisible design graphs come\nfrom spreads, and are actually $q$-analogs of strongly regular graphs. Deza\ngraphs were introduced by Erickson, Fernando, Haemers and Hardy in 1999. In\nthis paper, we introduce $q$-analogs of Deza graphs. Further, we determine\npossible parameters, give examples of $q$-analogs of Deza graphs and\ncharacterize all non-strongly regular $q$-analogs of Deza graphs with the\nsmallest parameters.\n', 'Deza graphs with parameters $(n,k,k-1,a)$ and $\\beta=1$ A Deza graph with parameters $(n,k,b,a)$ is a $k$-regular graph with $n$\nvertices in which any two vertices have $a$ or $b$ ($a\\leq b$) common\nneighbours. A Deza graph is strictly Deza if it has diameter $2$, and is not\nstrongly regular. In an earlier paper, the two last authors et el.\ncharacterized the strictly Deza graphs with $b=k-1$ and $\\beta > 1$, where\n$\\beta$ is the number of vertices with $b$ common neighbours with a given\nvertex. Here we deal with the case $\\beta=1$, thus we complete the\ncharacterization of strictly Deza graphs with $b=k-1$. It follows that all Deza\ngraphs with $b=k-1$ and $\\beta=1$ can be made from special strongly regular\ngraphs, and we present several examples of such strongly regular graphs.\n A divisible design graph is a special Deza graph, and a Deza graph with\n$\\beta=1$ is a divisible design graph. The present characterization reveals an\nerror in a paper on divisible design graphs by the second author et al. We\ndiscuss the cause and the consequences of this mistake and give the required\nerrata.\n']","[('strongly regular graphs', 0.7047820091247559), ('strongly regular graph', 0.6837820410728455), ('graphs strongly regular', 0.6784238219261169), ('regular graphs', 0.6591888070106506), ('regular graphs give', 0.6264156699180603), ('regular graph', 0.6234698295593262), ('regular graph vertices', 0.6172063946723938), ('graphs strongly', 0.5738462209701538), ('divisible design', 0.5359910130500793), ('graphs construction', 0.5079412460327148)]" 627,627,49,627_contact manifolds_contact manifold_reeb orbits_closed orbits,"['contact manifolds', 'contact manifold', 'reeb orbits', 'closed orbits', 'three manifold', 'transverse foliations', 'reeb flows', 'convex contact', 'flows dimension three', 'contact homology']","['Homoclinic orbits, Reeb chords and nice Birkhoff sections for Reeb flows\n in 3D We prove that for a $C^\\infty$-generic contact form defining a given\nco-oriented contact structure on a closed $3$-manifold, every hyperbolic\nperiodic Reeb orbit admits a transverse homoclinic connection in each of the\nbranches of its stable and unstable manifolds. We exploit this result to prove\nthat for a $C^\\infty$-generic contact form defining a given co-oriented contact\nstructure, given any finite collection $\\Gamma$ of periodic Reeb orbits and any\nLegendrian link $L$, there exists a global surface of section (embedded\nBirkhoff section) for the Reeb flow that contains $\\Gamma$ in its boundary, and\nthat contains in its interior a Legendrian link that is Legendrian isotopic to\n$L$ by a $C^0$-small isotopy. Finally we prove that if the Reeb vector field\nadmits a $\\partial$-strong Birkhoff section then every Legendrian knot has\ninfinitely many geometrically distinct Reeb chords, except possibly when the\nambient manifold is a lens space or the sphere and the Reeb flow has exactly\ntwo periodic orbits. In particular, $C^\\infty$-generically on the contact form\nthere are infinitely many geometrically distinct Reeb chords for every\nLegendrian knot. In the case of geodesic flows, every Legendrian knot has\ninfinitely many disjoint chords, without any further assumptions.\n', 'The action spectrum characterizes closed contact 3-manifolds all of\n whose Reeb orbits are closed A classical theorem due to Wadsley implies that, on a connected contact\nmanifold all of whose Reeb orbits are closed, there is a common period for the\nReeb orbits. In this paper we show that, for any Reeb flow on a closed\nconnected 3-manifold, the following conditions are actually equivalent: (1)\nevery Reeb orbit is closed; (2) all closed Reeb orbits have a common period;\n(3) the action spectrum has rank 1. We also show that, on a fixed closed\nconnected 3-manifold, a contact form with an action spectrum of rank 1 is\ndetermined (up to pull-back by diffeomorphisms) by the set of minimal periods\nof its closed Reeb orbits.\n', 'Contact three-manifolds with exactly two simple Reeb orbits It is known that every contact form on a closed three-manifold has at least\ntwo simple Reeb orbits, and a generic contact form has infinitely many. We show\nthat if there are exactly two simple Reeb orbits, then the contact form is\nnondegenerate. Combined with a previous result, this implies that the\nthree-manifold is diffeomorphic to the three-sphere or a lens space, and the\ntwo simple Reeb orbits are the core circles of a genus one Heegaard splitting.\nWe also obtain further information about the Reeb dynamics and the contact\nstructure. For example the Reeb flow has a disk-like global surface of section\nand so its dynamics are described by a pseudorotation; the contact struture is\nuniversally tight; and in the case of the three-sphere, the contact volume and\nthe periods and rotation numbers of the simple Reeb orbits satisfy the same\nrelations as for an irrational ellipsoid.\n']","[('contact manifolds', 0.5523893237113953), ('contact manifold', 0.5275592803955078), ('reeb orbits', 0.5185915231704712), ('closed orbits', 0.49824342131614685), ('three manifold', 0.4891386330127716), ('transverse foliations', 0.446301132440567), ('reeb flows', 0.43870604038238525), ('convex contact', 0.43625304102897644), ('flows dimension three', 0.427286833524704), ('contact homology', 0.4250692129135132)]" 628,628,49,628_isogeometric framework_based isogeometric analysis_isogeometric analysis_isogeometric galerkin,"['isogeometric framework', 'based isogeometric analysis', 'isogeometric analysis', 'isogeometric galerkin', 'galerkin isogeometric', 'spline functions', 'isogeometric analysis iga', 'isogeometric', 'spline spaces', 'spline space']","['$C^1$ isogeometric spline space for trilinearly parameterized\n multi-patch volumes We study the space of $C^1$ isogeometric spline functions defined on\ntrilinearly parameterized multi-patch volumes. Amongst others, we present a\ngeneral framework for the design of the $C^1$ isogeometric spline space and of\nan associated basis, which is based on the two-patch construction [7], and\nwhich works uniformly for any possible multi-patch configuration. The presented\nmethod is demonstrated in more detail on the basis of a particular subclass of\ntrilinear multi-patch volumes, namely for the class of trilinearly\nparameterized multi-patch volumes with exactly one inner edge. For this\nspecific subclass of trivariate multi-patch parameterizations, we further\nnumerically compute the dimension of the resulting $C^1$ isogeometric spline\nspace and use the constructed $C^1$ isogeometric basis functions to numerically\nexplore the approximation properties of the $C^1$ spline space by performing\n$L^2$ approximation.\n', '$C^s$-smooth isogeometric spline spaces over planar multi-patch\n parameterizations The design of globally $C^s$-smooth ($s \\geq 1$) isogeometric spline spaces\nover multi-patch geometries is a current and challenging topic of research in\nthe framework of isogeometric analysis. In this work, we extend the recent\nmethods [25,28] and [31-33] for the construction of $C^1$-smooth and\n$C^2$-smooth isogeometric spline spaces over particular planar multi-patch\ngeometries to the case of $C^s$-smooth isogeometric multi-patch spline spaces\nof an arbitrary selected smoothness $s \\geq 1$. More precisely, for any $s \\geq\n1$, we study the space of $C^s$-smooth isogeometric spline functions defined on\nplanar, bilinearly parameterized multi-patch domains, and generate a particular\n$C^s$-smooth subspace of the entire $C^s$-smooth isogeometric multi-patch\nspline space. We further present the construction of a basis for this\n$C^s$-smooth subspace, which consists of simple and locally supported\nfunctions. Moreover, we use the $C^s$-smooth spline functions to perform $L^2$\napproximation on bilinearly parameterized multi-patch domains, where the\nobtained numerical results indicate an optimal approximation power of the\nconstructed $C^s$-smooth subspace.\n', 'The Argyris isogeometric space on unstructured multi-patch planar\n domains Multi-patch spline parametrizations are used in geometric design and\nisogeometric analysis to represent complex domains. We deal with a particular\nclass of $C^0$ planar multi-patch spline parametrizations called\nanalysis-suitable $G^1$ (AS-$G^{1}$) multi-patch parametrizations (Collin,\nSangalli, Takacs; CAGD, 2016). This class of parametrizations has to satisfy\nspecific geometric continuity constraints, and is of importance since it allows\nto construct, on the multi-patch domain, $C^1$ isogeometric spaces with optimal\napproximation properties. It was demonstrated in (Kapl, Sangalli, Takacs; CAD,\n2018) that AS-$G^1$ multi-patch parametrizations are suitable for modeling\ncomplex planar multi-patch domains.\n In this work, we construct a basis, and an associated dual basis, for a\nspecific $C^1$ isogeometric spline space $\\mathcal{W}$ over a given AS-$G^1$\nmulti-patch parametrization. We call the space $\\mathcal{W}$ the Argyris\nisogeometric space, since it is $C^1$ across interfaces and $C^2$ at all\nvertices and generalizes the idea of Argyris finite elements to tensor-product\nsplines. The considered space $\\mathcal{W}$ is a subspace of the entire $C^1$\nisogeometric space $\\mathcal{V}^{1}$, which maintains the reproduction\nproperties of traces and normal derivatives along the interfaces. Moreover, it\nreproduces all derivatives up to second order at the vertices. In contrast to\n$\\mathcal{V}^{1}$, the dimension of $\\mathcal{W}$ does not depend on the domain\nparametrization, and $\\mathcal{W}$ admits a basis and dual basis which possess\na simple explicit representation and local support.\n We conclude the paper with some numerical experiments, which exhibit the\noptimal approximation order of the Argyris isogeometric space $\\mathcal{W}$ and\ndemonstrate the applicability of our approach for isogeometric analysis.\n']","[('isogeometric framework', 0.6271073222160339), ('based isogeometric analysis', 0.6059540510177612), ('isogeometric analysis', 0.5673235058784485), ('isogeometric galerkin', 0.5536587834358215), ('galerkin isogeometric', 0.5311634540557861), ('spline functions', 0.5261503458023071), ('isogeometric analysis iga', 0.5018710494041443), ('isogeometric', 0.4909915328025818), ('spline spaces', 0.4562542140483856), ('spline space', 0.45293575525283813)]" 629,629,49,629_positive mass asymptotically_dimensional asymptotically flat_static spacetimes_asymptotically flat initial,"['positive mass asymptotically', 'dimensional asymptotically flat', 'static spacetimes', 'asymptotically flat initial', 'minkowski space', 'asymptotically flat', 'spherically symmetric', 'flat asymptotically', 'spacetimes', 'null energy condition']","['A tilted spacetime positive mass theorem We show a spacetime positive mass theorem for asymptotically flat initial\ndata sets with a noncompact boundary. We develop a mass type invariant and a\nboundary dominant energy condition. Our proof is based on spinors.\n', 'Density and positive mass theorems for initial data sets with boundary We prove a harmonic asymptotics density theorem for asymptotically flat\ninitial data sets with compact boundary that satisfy the dominant energy\ncondition. We use this to settle the spacetime positive mass theorem, with\nrigidity, for initial data sets with apparent horizon boundary in dimensions\nless than $8$ without a spin assumption.\n', 'Stability of the Spacetime Positive Mass Theorem in Spherical Symmetry The rigidity statement of the positive mass theorem asserts that an\nasymptotically flat initial data set for the Einstein equations with zero ADM\nmass, and satisfying the dominant energy condition, must arise from an\nembedding into Minkowski space. In this paper we address the question of what\nhappens when the mass is merely small. In particular, we formulate a conjecture\nfor the stability statement associated with the spacetime version of the\npositive mass theorem, and give examples to show how it is basically sharp if\ntrue. This conjecture is then established under the assumption of spherical\nsymmetry in all dimensions. More precisely, it is shown that a sequence of\nasymptotically flat initial data satisfying the dominant energy condition,\nwithout horizons except possibly at an inner boundary, and with ADM masses\ntending to zero must arise from isometric embeddings into a sequence of static\nspacetimes converging to Minkowski space in the pointed volume preserving\nintrinsic flat sense. The difference of second fundamental forms coming from\nthe embeddings and initial data must converge to zero in $L^p$, $1\\leq p<2$. In\naddition some minor tangential results are also given, including the spacetime\nversion of the Penrose inequality with rigidity statement in all dimensions for\nspherically symmetric initial data, as well as symmetry inheritance properties\nfor outermost apparent horizons.\n']","[('positive mass asymptotically', 0.4849907457828522), ('dimensional asymptotically flat', 0.4799441993236542), ('static spacetimes', 0.45302969217300415), ('asymptotically flat initial', 0.4218403995037079), ('minkowski space', 0.4134734272956848), ('asymptotically flat', 0.40399083495140076), ('spherically symmetric', 0.37903881072998047), ('flat asymptotically', 0.37115025520324707), ('spacetimes', 0.36671486496925354), ('null energy condition', 0.36556077003479004)]" 630,630,49,630_hodge conjecture_conjecture hodge_variation hodge structures_hodge structures,"['hodge conjecture', 'conjecture hodge', 'variation hodge structures', 'hodge structures', 'hodge theory', 'mixed hodge structures', 'variation hodge structure', 'variations hodge', 'hodge structure', 'hodge numbers']","['Height Pairing on Higher Cycles and Mixed Hodge Structures For a smooth, projective complex variety, we introduce several mixed Hodge\nstructures associated to higher algebraic cycles. Most notably, we introduce a\nmixed Hodge structure for a pair of higher cycles which are in the refined\nnormalized complex and intersect properly. In a special case, this mixed Hodge\nstructure is an oriented biextension, and its height agrees with the higher\narchimedean height pairing introduced in a previous paper by the first two\nauthors. We also compute a non-trivial example of this height given by\nBloch-Wigner dilogarithm function. Finally we study the variation of mixed\nHodge structures of Hodge-Tate type, and show that the height extends\ncontinuously to degenerate situations.\n', 'On the distribution of the Hodge locus Given a polarizable $\\mathbb{Z}$-variation of Hodge structures $\\mathbb{V}$\nover a complex smooth quasi-projective base $S$, a classical result of Cattani,\nDeligne and Kaplan says that its Hodge locus (i.e. the locus where exceptional\nHodge tensors appear) is a countable union of irreducible algebraic\nsubvarieties of $S$, called the special subvarieties for $\\mathbb{V}$. Our main\nresult in this paper is that, if the level of $\\mathbb{V}$ is at least $3$,\nthis Hodge locus is in fact a finite union of such special subvarieties (hence\nis algebraic), at least if we restrict ourselves to the Hodge locus factorwise\nof positive period dimension. For instance the Hodge locus of positive period\ndimension of the universal family of degree $d$ smooth hypersurfaces in\n$\\mathbf{P}^{n+1}_\\mathbb{C}$, $n\\geq 3, d\\geq 5$ and $(n,d)\\neq (4,5)$, is\nalgebraic. On the other hand we prove that in level $1$ or $2$, the Hodge locus\nis analytically dense in $S^{an}$ as soon as it contains one typical special\nsubvariety. These results follow from a complete elucidation of the\ndistribution in $S$ of the special subvarieties in terms of typical/atypical\nintersections, with the exception of the atypical special subvarieties of zero\nperiod dimension.\n', 'On the fields of definition of Hodge loci A polarizable variation of Hodge structure over a smooth complex quasi\nprojective variety $S$ is said to be defined over a number field $L$ if $S$ and\nthe algebraic connection associated to the variation are both defined over $L$.\nConjecturally any special subvariety (also called ""an irreducible component of\nthe Hodge locus) for such variations is defined over $\\overline{\\mathbb{Q}}$,\nand its Galois conjugates are also special subvarieties. We prove this\nconjecture for special subvarieties satisfying a simple monodromy condition. As\na corollary we reduce the conjecture that special subvarieties for variation of\nHodge structures defined over a number field are defined over\n$\\overline{\\mathbb{Q}}$ to the case of special points.\n']","[('hodge conjecture', 0.6839228272438049), ('conjecture hodge', 0.6781579256057739), ('variation hodge structures', 0.6565886735916138), ('hodge structures', 0.6497602462768555), ('hodge theory', 0.6383296847343445), ('mixed hodge structures', 0.6348170042037964), ('variation hodge structure', 0.6319117546081543), ('variations hodge', 0.6293762922286987), ('hodge structure', 0.6284515261650085), ('hodge numbers', 0.6195225119590759)]" 631,631,49,631_moore penrose inverses_penrose generalized inverse_moore penrose inverse_penrose inverses,"['moore penrose inverses', 'penrose generalized inverse', 'moore penrose inverse', 'penrose inverses', 'matrix dual', 'inverse matrices', 'generalized inverses', 'inverse dual', 'penrose inverse', 'generalized inverse']","['A new generalized inverse of matrices from core-EP decomposition A new generalized inverse for a square matrix $H\\in\\mathbb{C}^{n\\times n}$,\ncalled CCE-inverse, is established by the core-EP decomposition and\nMoore-Penrose inverse $H^{\\dag}$. We propose some characterizations of the\nCCE-inverse. Furthermore, two canonical forms of the CCE-inverse are presented.\nAt last, we introduce the definitions of CCE-matrices and $k$-CCE matrices, and\nprove that CCE-matrices are the same as $i$-EP matrices studied by Wang and Liu\nin [The weak group matrix, Aequationes Mathematicae, 93(6): 1261-1273, 2019].\n', 'A Genuine Extension of The Moore-Penrose Inverse to Dual Matrices The Moore-Penrose inverse is a genuine extension of the matrix inverse. Given\na complex matrix, there uniquely exists another complex matrix satisfying the\nfour Moore-Penrose conditions, and if the original matrix is nonsingular, it is\nexactly the inverse of that matrix. In the last one and half decade, in the\nstudy of approximate synthesis in kinematic, two generalizations of the\nMoore-Penrose inverse appeared for dual real matrices,including Moore-Penrose\ndual generalized inverse and dual Moore-Penrose generalized inverse (DMPGI).\nDMPGI satisfies the four Moore-Penrose conditions, but does not exist for\nuncountably many dual real matrices. %Another generalization, called\nMoore-Penrose dual generalized inverse (MPDGI), is different from DMPGI even if\nDMPGI exists. In this paper, based upon the singular value decomposition of\ndual matrices, we extend the first Moore-Penrose condition to dual matrices and\nintroduce a genuine extension of the Moore-Penrose inverse to dual matrices,\nreferred to as GMPI. Given a dual complex matrix, its GMPI is the unique dual\ncomplex matrix which satisfy the first extended and the other three\nMoore-Penrose conditions. If the original matrix is a complex matrix, its GMPI\nis exactly the Moore-Penrose inverse of that matrix. And if the original matrix\nis a dual real matrix and its DMPGI exists, its GMPI coincides with its DMPGI.\n', 'Further results on weighted core-EP inverse of matrices In this paper, we introduce the notation of $E$-weighted core-EP and\n$F$-weighted dual core-EP inverse of matrices. We then obtain a few explicit\nexpressions for the weighted core-EP inverse of matrices through other\ngeneralized inverses. Further, we discuss the existence of generalized weighted\nMoore-Penrose inverse and additive properties of the weighted core-EP inverse\nof matrices. In addition to these, we propose the star weighted core-EP and\nweighted core-EP star class of matrices for solving the system of matrix\nequations. We further elaborate on this theory by producing a few\nrepresentation and characterization of star weighted core-EP and weighted\ncore-EP star classes of matrices.\n']","[('moore penrose inverses', 0.689298689365387), ('penrose generalized inverse', 0.6547641158103943), ('moore penrose inverse', 0.6485008001327515), ('penrose inverses', 0.6135396957397461), ('matrix dual', 0.5959499478340149), ('inverse matrices', 0.5952804088592529), ('generalized inverses', 0.594093918800354), ('inverse dual', 0.5851373076438904), ('penrose inverse', 0.5701401829719543), ('generalized inverse', 0.5562636852264404)]" 632,632,49,632_higgs bundles_higgs bundle_space higgs bundles_moduli space higgs,"['higgs bundles', 'higgs bundle', 'space higgs bundles', 'moduli space higgs', 'higgs sheaves', 'parabolic higgs', 'bundle moduli', 'bundles', 'bundles smooth', 'parabolic bundles']","[""On Fourier-Mukai transforms of upward flows for Hitchin systems We consider the moduli space of semistable Higgs bundles on a smooth\nprojective curve. Motivated by mirror symmetry, Hausel and Hitchin showed that\nover an open of the locus of smooth Hitchin fibers, the duality of\nDonagi-Pantev intertwines certain Lagrangian upward flows with hyperholomorphic\nvector bundles constructed from universal Higgs bundles. Using Arinkin's sheaf\nand some codimension estimates, we show a generalization of this result over\nthe entire Hitchin base, for Higgs bundles of arbitrary degree.\n"", 'Higgs bundles -- Recent applications We present an overview of some recent applications of Higgs bundles and the\nHitchin fibration.\n', 'Generalizations of parabolic Higgs bundles, real structures and\n integrability We introduce a notion of quasi-antisymmetric Higgs $G$-bundles over curves\nwith marked points. They are endowed with additional structures, which replace\nthe parabolic structures at marked points in the parabolic Higgs bundles. The\nlatter means that the coadjoint orbits are attached to the marked points. The\nmoduli spaces of parabolic Higgs bundles are the phase spaces of complex\ncompletely integrable systems. In our case the coadjoint orbits are replaced by\nthe cotangent bundles over some special symmetric spaces in such a way that the\nmoduli space of the modified Higgs bundles are still phase spaces of complex\ncompletely integrable systems. We show that the moduli space of the parabolic\nHiggs bundles is the symplectic quotient of the moduli space of the\nquasi-antisymmetric Higgs bundle with respect to the action of product of\nCartan subgroups. Also, by changing the symmetric spaces we introduce\nquasi-compact and quasi-normal Higgs bundles. Then the fixed point sets of real\ninvolutions acting on their moduli spaces are the phase spaces of real\ncompletely integrable systems. Several examples are given including integrable\nextensions of the ${\\rm SL}(2)$ Euler-Arnold top, two-body elliptic\nCalogero-Moser system and the rational ${\\rm SL}(2)$ Gaudin system together\nwith its real reductions.\n']","[('higgs bundles', 0.7563750147819519), ('higgs bundle', 0.732689380645752), ('space higgs bundles', 0.7094482183456421), ('moduli space higgs', 0.6554529666900635), ('higgs sheaves', 0.6346598267555237), ('parabolic higgs', 0.6053459048271179), ('bundle moduli', 0.5976796746253967), ('bundles', 0.5951946377754211), ('bundles smooth', 0.5913069844245911), ('parabolic bundles', 0.5884205102920532)]" 633,633,49,633_quantum graphs quantum_quantum graphs_graphs quantum_graph quantum,"['quantum graphs quantum', 'quantum graphs', 'graphs quantum', 'graph quantum', 'quantum graph', 'classical graphs', 'graphs isomorphic', 'graph isomorphism', 'cayley graphs abelian', 'isomorphism graphs']","[""Almost all trees have quantum symmetry From the work of Erd\\H{o}s and R\\'{e}nyi from 1963 it is known that almost\nall graphs have no symmetry. In 2017, Lupini, Man\\v{c}inska and Roberson proved\na quantum counterpart: Almost all graphs have no quantum symmetry. Here, the\nnotion of quantum symmetry is phrased in terms of Banica's definition of\nquantum automorphism groups of finite graphs from 2005, in the framework of\nWoronowicz's compact quantum groups. Now, Erd\\H{o}s and R\\'{e}nyi also proved a\ncomplementary result in 1963: Almost all trees do have symmetry. The crucial\npoint is the almost sure existence of a cherry in a tree. But even more is\ntrue: We almost surely have two cherries in a tree - and we derive that almost\nall trees have quantum symmetry. We give an explicit proof of this quantum\ncounterpart of Erd\\H{o}s and R\\'{e}nyi's result on trees.\n"", ""On the quantum symmetry of distance-transitive graphs In this article, we study quantum automorphism groups of distance-transitive\ngraphs. We show that the odd graphs, the Hamming graphs $H(n,3)$, the Johnson\ngraphs $J(n,2)$ and the Kneser graphs $K(n,2)$ do not have quantum symmetry. We\nalso give a table with the quantum automorphism groups of all cubic\ndistance-transitive graphs. Furthermore, with one graph missing, we can now\ndecide whether or not a distance-regular graph of order $\\leq 20$ has quantum\nsymmetry. Moreover, we prove that the Hoffman-Singleton graph has no quantum\nsymmetry. On a final note, we present an example of a pair of graphs with the\nsame intersection array (the Shrikhande graph and the $4 \\times 4$ rook's\ngraph), where one of them has quantum symmetry and the other one does not.\n"", 'Solution group representations as quantum symmetries of graphs In 2019, Aterias et al. constructed pairs of quantum isomorphic,\nnon-isomorphic graphs from linear constraint systems. This article deals with\nquantum automorphisms and quantum isomorphisms of colored versions of those\ngraphs. We show that the quantum automorphism group of such a colored graph is\nthe dual of the homogeneous solution group of the underlying linear constraint\nsystem. Given a vertex- and edge-colored graph with certain properties, we\nconstruct an uncolored graph that has the same quantum automorphism group as\nthe colored graph we started with. Using those results, we obtain the first\nknown example of a graph that has quantum symmetry and finite quantum\nautomorphism group. Furthermore, we construct a pair of quantum isomorphic,\nnon-isomorphic graphs that both have no quantum symmetry.\n']","[('quantum graphs quantum', 0.7812669277191162), ('quantum graphs', 0.7809606790542603), ('graphs quantum', 0.776302695274353), ('graph quantum', 0.7402753233909607), ('quantum graph', 0.7167310118675232), ('classical graphs', 0.5911139845848083), ('graphs isomorphic', 0.5778074264526367), ('graph isomorphism', 0.5770379304885864), ('cayley graphs abelian', 0.5731438398361206), ('isomorphism graphs', 0.5714489817619324)]" 634,634,49,634_material models_physics informed neural_material parameters_solid mechanics,"['material models', 'physics informed neural', 'material parameters', 'solid mechanics', 'microstructures', 'recurrent neural network', 'neural networks', 'heterogeneous materials', 'microstructure', 'neural network']","['A Microstructure-based Graph Neural Network for Accelerating Multiscale\n Simulations Simulating the mechanical response of advanced materials can be done more\naccurately using concurrent multiscale models than with single-scale\nsimulations. However, the computational costs stand in the way of the practical\napplication of this approach. The costs originate from microscale Finite\nElement (FE) models that must be solved at every macroscopic integration point.\nA plethora of surrogate modeling strategies attempt to alleviate this cost by\nlearning to predict macroscopic stresses from macroscopic strains, completely\nreplacing the microscale models. In this work, we introduce an alternative\nsurrogate modeling strategy that allows for keeping the multiscale nature of\nthe problem, allowing it to be used interchangeably with an FE solver for any\ntime step. Our surrogate provides all microscopic quantities, which are then\nhomogenized to obtain macroscopic quantities of interest. We achieve this for\nan elasto-plastic material by predicting full-field microscopic strains using a\ngraph neural network (GNN) while retaining the microscopic constitutive\nmaterial model to obtain the stresses. This hybrid data-physics graph-based\napproach avoids the high dimensionality originating from predicting full-field\nresponses while allowing non-locality to arise. By training the GNN on a\nvariety of meshes, it learns to generalize to unseen meshes, allowing a single\nmodel to be used for a range of microstructures. The embedded microscopic\nconstitutive model in the GNN implicitly tracks history-dependent variables and\nleads to improved accuracy. We demonstrate for several challenging scenarios\nthat the surrogate can predict complex macroscopic stress-strain paths. As the\ncomputation time of our method scales favorably with the number of elements in\nthe microstructure compared to the FE method, our method can significantly\naccelerate FE2 simulations.\n', 'Learning Memory and Material Dependent Constitutive Laws We propose and study a neural operator framework for learning memory- and\nmaterial microstructure-dependent constitutive laws for heterogeneous\nmaterials. We work in the two-scale setting where homogenization theory\nprovides a systematic approach to deriving macroscale constitutive laws,\nobviating the need to resolve complex microstructure repeatedly. However, the\nunit cell problems defining these constitutive models are typically not\namenable to explicit evaluation. It is therefore of interest to learn\nconstitutive models from data generated by the unit cell problem. Our proposed\nframework models homogenized constitutive laws with both memory- and\nmicrostructure-dependence through the use of Markovian recurrent and Fourier\nneural operators. The homogenization problem for Kelvin-Voigt viscoelastic\nmaterials is studied to provide firm theoretical foundations for our model. The\ntheoretical properties of the cell problem in this Kelvin-Voigt setting\nmotivate the proposed learning framework; and are also used to prove a\nuniversal approximation theorem for the learned macroscale constitutive model.\nNumerical experiments show that the proposed learning framework accurately\nlearns memory- and microstructure-dependent viscoelastic and\nelasto-viscoplastic constitutive models, beyond the setting of the theory.\nFurthermore, we show that the learned constitutive models can be successfully\ndeployed in macroscale simulation of material deformation for different\nmicrostructures without retraining.\n', 'Physically recurrent neural network for rate and path-dependent\n heterogeneous materials in a finite strain framework In this work, a hybrid physics-based data-driven surrogate model for the\nmicroscale analysis of heterogeneous material is investigated. The proposed\nmodel benefits from the physics-based knowledge contained in the constitutive\nmodels used in the full-order micromodel by embedding them in a neural network.\nFollowing previous developments, this paper extends the applicability of the\nphysically recurrent neural network (PRNN) by introducing an architecture\nsuitable for rate-dependent materials in a finite strain framework. In this\nmodel, the homogenized deformation gradient of the micromodel is encoded into a\nset of deformation gradients serving as input to the embedded constitutive\nmodels. These constitutive models compute stresses, which are combined in a\ndecoder to predict the homogenized stress, such that the internal variables of\nthe history-dependent constitutive models naturally provide physics-based\nmemory for the network. To demonstrate the capabilities of the surrogate model,\nwe consider a unidirectional composite micromodel with transversely isotropic\nelastic fibers and elasto-viscoplastic matrix material. The extrapolation\nproperties of the surrogate model trained to replace such micromodel are tested\non loading scenarios unseen during training, ranging from different\nstrain-rates to cyclic loading and relaxation. Speed-ups of three orders of\nmagnitude with respect to the runtime of the original micromodel are obtained.\n']","[('material models', 0.5387968420982361), ('physics informed neural', 0.4200875759124756), ('material parameters', 0.4154379963874817), ('solid mechanics', 0.403278648853302), ('microstructures', 0.373250812292099), ('recurrent neural network', 0.37243789434432983), ('neural networks', 0.3667760491371155), ('heterogeneous materials', 0.3565627336502075), ('microstructure', 0.3552679121494293), ('neural network', 0.35131001472473145)]" 635,635,49,635_nonlinear boussinesq_viscous boussinesq_two dimensional boussinesq_boussinesq equations,"['nonlinear boussinesq', 'viscous boussinesq', 'two dimensional boussinesq', 'boussinesq equations', 'boussinesq system', 'dimensional boussinesq system', 'boussinesq approximation', 'dimensional boussinesq', 'boussinesq', 'stability sobolev']","[""On the Boussinesq equations with non-monotone temperature profiles In this article we consider the asymptotic stability of the two-dimensional\nBoussinesq equations with partial dissipation near a combination of Couette\nflow and temperature profiles $T(y)$. As a first main result we show that if\n$T'$ is of size at most $\\nu^{1/3}$ in a suitable norm, then the linearized\nBoussinesq equations with only vertical dissipation of the velocity but not of\nthe temperature are stable. Thus, mixing enhanced dissipation can suppress\nRayleigh-B\\'enard instability in this linearized case. We further show that\nthese results extend to the (forced) nonlinear equations with vertical\ndissipation in both temperature and velocity.\n"", 'On Enhanced Dissipation for the Boussinesq Equations In this article we consider the stability and damping problem for the 2D\nBoussinesq equations with partial dissipation near a two parameter family of\nstationary solutions which includes Couette flow and hydrostatic balance.\n In the first part we show that for the linearized problem in an infinite\nperiodic channel the evolution is asymptotically stable if any diffusion\ncoefficient is non-zero. In particular, this imposes weaker conditions than for\nexample vertical diffusion. Furthermore, we study the interaction of shear\nflow, hydrostatic balance and partial dissipation.\n In a second part we adapt the methods used by Bedrossian, Vicol and Wang in\nthe Navier-Stokes problem and combine them with cancellation properties of the\nBoussinesq equations to establish small data stability and enhanced dissipation\nresults for the nonlinear Boussinesq problem with full dissipation.\n', 'The stabilizing effect of the temperature on buoyancy-driven fluids The Boussinesq system for buoyancy driven fluids couples the momentum\nequation forced by the buoyancy with the convection-diffusion equation for the\ntemperature. One fundamental issue on the Boussinesq system is the stability\nproblem on perturbations near the hydrostatic balance. This problem can be\nextremely difficult when the system lacks full dissipation. This paper solves\nthe stability problem for a two-dimensional Boussinesq system with only\nvertical dissipation and horizontal thermal diffusion. We establish the\nstability for the nonlinear system and derive precise large-time behavior for\nthe linearized system. The results presented in this paper reveal a remarkable\nphenomenon for buoyancy driven fluids. That is, the temperature actually\nsmooths and stabilizes the fluids. If the temperature were not present, the\nfluid is governed by the 2D Navier-Stokes with only vertical dissipation and\nits stability remains open. It is the coupling and interaction between the\ntemperature and the velocity in the Boussinesq system that makes the stability\nproblem studied here possible. Mathematically the system can be reduced to\ndegenerate and damped wave equations that fuel the stabilization.\n']","[('nonlinear boussinesq', 0.665182888507843), ('viscous boussinesq', 0.660558819770813), ('two dimensional boussinesq', 0.6447146534919739), ('boussinesq equations', 0.6434515714645386), ('boussinesq system', 0.5950853824615479), ('dimensional boussinesq system', 0.588531494140625), ('boussinesq approximation', 0.5642362833023071), ('dimensional boussinesq', 0.5635280013084412), ('boussinesq', 0.5125750303268433), ('stability sobolev', 0.446853905916214)]" 636,636,48,636_optimal beamforming_output mimo_mimo_user mimo,"['optimal beamforming', 'output mimo', 'mimo', 'user mimo', 'beamforming design', 'beamforming', 'passive beamforming', 'channel state information', 'alternating optimization', 'transmit power']","['Reconfigurable Intelligent Surface-Aided MISO Systems with Statistical\n CSI: Channel Estimation, Analysis and Optimization This paper investigates the reconfigurable reflecting surface (RIS)-aided\nmultiple-input-single-output (MISO) systems with imperfect channel state\ninformation (CSI), where RIS-related channels are modeled by Rician fading.\nConsidering the overhead and complexity in practical systems, we employ the\nlow-complexity maximum ratio combining (MRC) beamforming at the base station\n(BS), and configure the phase shifts of the RIS based on long-term statistical\nCSI. Specifically, we first estimate the overall channel matrix based on the\nlinear minimum mean square error (LMMSE) estimator, and evaluate the\nperformance of MSE and normalized MSE (NMSE). Then, with the estimated channel,\nwe derive the closed-form expressions of the ergodic rate. The derived\nexpressions show that with Rician RIS-related channels, the rate can maintain\nat a non-zero value when the transmit power is scaled down proportionally to\n$1/M$ or $1/N^2$, where $M$ and $N$ are the number of antennas and reflecting\nelements, respectively. However, if all the RIS-related channels are fully\nRayleigh, the transmit power of each user can only be scaled down\nproportionally to $1/\\sqrt{M}$ or $1/N$. Finally, numerical results verify the\npromising benefits from the RIS to traditional MISO systems.\n', 'Statistical CSI Based Beamforming for Reconfigurable Intelligent Surface\n Aided MISO Systems with Channel Correlation Reconfigurable intelligent surface (RIS) is a promising candidate technology\nof the upcoming Sixth Generation (6G) communication system for its ability to\nprovide unprecedented spectral and energy efficiency increment through passive\nbeamforming. However, it is challenging to obtain instantaneous channel state\ninformation (I-CSI) for RIS, which obliges us to use statistical channel state\ninformation (S-CSI) to achieve passive beamforming. In this paper, RIS-aided\nmultiple-input single-output (MISO) multi-user downlink communication system\nwith correlated channels is investigated. Then, we formulate the problem of\njoint beamforming design at the AP and RIS to maximize the sum ergodic spectral\nefficiency (ESE) of all users to improve the network capacity. Since it is too\nhard to compute sum ESE, an ESE approximation is adopted to reformulate the\nproblem into a more tractable form. Then, we present two joint beamforming\nalgorithms, namely the singular value decomposition-gradient descent (SVD-GD)\nalgorithm and the fractional programming-gradient descent (FP-GD) algorithm.\nSimulation results show the effectiveness of our proposed algorithms and\nvalidate that 2-bits quantizer is enough for RIS phase shifts implementation.\n', 'Sum-Rate Maximization of RIS-Aided Multi-User MIMO Systems With\n Statistical CSI This paper investigates a reconfigurable intelligent surface (RIS)-aided\nmulti-user multiple-input multiple-output (MIMO) system by considering only the\nstatistical channel state information (CSI) at the base station (BS). We aim to\nmaximize its sum-rate via the joint optimization of beamforming at the BS and\nphase shifts at the RIS. However, the multi-user MIMO transmissions and the\nspatial correlations make the optimization cumbersome. For tractability, a\ndeterministic approximation is derived for the sum-rate under a large number of\nthe reflecting elements. By adopting the approximate sum-rate for maximization,\nthe optimal designs of the transmit beamforming and the phase shifts can be\ndecoupled and solved in closed-forms individually. More specifically, the\nglobal optimality of the transmit beamforming can be guaranteed by using the\nwater-filling algorithm and a sub-optimal solution of phase shifts can be\nobtained by using the projected gradient ascent (PGA) algorithm. By comparing\nto the case of the instantaneous CSI assumed at the BS, the proposed algorithm\nbased on statistical CSI can achieve comparable performance but with much lower\ncomplexity and signaling overhead, which is more affordable and appealing for\npractical applications. Moreover, the impact of spatial correlation is\nthoroughly examined by using majorization theory.\n']","[('optimal beamforming', 0.5271108746528625), ('output mimo', 0.4996911287307739), ('mimo', 0.4373053014278412), ('user mimo', 0.3997352421283722), ('beamforming design', 0.39768052101135254), ('beamforming', 0.3865744173526764), ('passive beamforming', 0.37881696224212646), ('channel state information', 0.3676014542579651), ('alternating optimization', 0.35944581031799316), ('transmit power', 0.33343833684921265)]" 637,637,48,637_operator manifolds_dirac operators_dirac operator_associated dirac operator,"['operator manifolds', 'dirac operators', 'dirac operator', 'associated dirac operator', 'compact manifolds boundary', 'manifolds boundary', 'manifold boundary', 'riemannian spin manifold', 'boundary spectral', 'dimensional compact manifolds']","['Dirac-Witten Operators and the Kastler-Kalau-Walze type theorem for\n manifolds with boundary In this paper, we obtain two Lichnerowicz type formulas for the Dirac-Witten\noperators. And we give the proof of Kastler-Kalau-Walze type theorems for the\nDirac-Witten operators on 4-dimensional and 6- dimensional compact manifolds\nwith (resp.without) boundary\n', 'A Kastler-Kalau-Walze type theorem for the $J$-twist of the Dirac\n operator with torsion In this paper, we give a Lichnerowicz type formula for the $J$-twist of the\nDirac operator with torsion. And we prove a Kastler-Kalau-Walze type theorem\nfor the $J$-twist of the Dirac operator with torsion on 4-dimensional and\n6-dimensional almost product Riemannian spin manifold with boundary.\n', 'The generalized noncommutative residue and the Kastler-Kalau-Walze type\n theorem In this paper, we define the generalized noncommutative residue of the Dirac\noperator. And we give the proof of Kastler-Kalau-Walze type theorems for the\ngeneralized noncommutative residue on 4-dimensional and 6-dimensional compact\nmanifolds with (resp.without) boundary.\n']","[('operator manifolds', 0.6125748753547668), ('dirac operators', 0.5824159383773804), ('dirac operator', 0.5689877867698669), ('associated dirac operator', 0.5537378191947937), ('compact manifolds boundary', 0.5478976964950562), ('manifolds boundary', 0.535584568977356), ('manifold boundary', 0.5294363498687744), ('riemannian spin manifold', 0.5041033029556274), ('boundary spectral', 0.48290345072746277), ('dimensional compact manifolds', 0.4828580319881439)]" 638,638,48,638_kink solutions_kinks_kink_soliton dynamics,"['kink solutions', 'kinks', 'kink', 'soliton dynamics', 'field theories dimensions', 'field theory models', 'field theories', 'field theory', 'scalar field theories', 'theories dimensions']","['Deformations of Kink Tails We study the asymptotic properties of kinks in connection with the\ndeformation procedure. We show that, upon deformation of the field-theoretic\nmodel, the asymptotics of kinks can change or remain unchanged, depending on\nthe properties of the deforming function. The cases of both explicit and\nimplicit kinks are considered. In addition, we show that the the deformation\nprocedure can be applied to the important case of implicit kinks. We also prove\nthat for any kink with a power-law tail, the stability potential decreases as\nthe inverse square of the coordinate. The physical consequences of the\ndeformation are discussed: the change of the kink mass, as well as the\nasymptotic behavior of the kink-antikink force.\n', ""Exotic Final States in the $\\varphi^8$ Multi-Kink Collisions We study final states in the scattering of kinks and antikinks of the\n$\\varphi^8$ field-theoretic model. We use the initial conditions in the form of\ntwo, three or four static or moving kinks. In the numerical experiments we\nobserve a number of different processes such as emergence of static and moving\noscillons, change of the kink's topological sector, scattering of an oscillon\nby a kink, production of kink-antikink pairs in oscillon-oscillon collisions.\nIn antikink-kink collisions for asymmetric kinks, we found resonance phenomena\n-- escape windows.\n"", 'Classification of kink clusters for scalar fields in dimension 1+1 We consider a real scalar field equation in dimension 1+1 with an even,\npositive self-interaction potential having two non-degenerate zeros (vacua) 1\nand -1. Such a model admits non-trivial static solutions called kinks and\nantikinks. We define a kink n-cluster to be a solution approaching, for large\npositive times, a superposition of n alternating kinks and antikinks whose\nvelocities converge to $0$. They can be equivalently characterized as the\nsolutions of minimal possible energy containing n transitions between the\nvacua, or as the solutions whose kinetic energy decays to 0 in large time.\n Our first main result is a determination of the main-order asymptotic\nbehavior of any kink n-cluster. The proof relies on a reduction,using\nappropriately chosen modulation parameters, to an n-body problem with\nattractive exponential interactions. We then construct a kink n-cluster for any\nprescribed initial positions of the kinks and antikinks, provided that their\nmutual distances are sufficiently large. Next, we prove that the set of all the\nkink n-clusters is an n-dimensional topological manifold, and we show how it\ncan be parametrized by the positions of the kinks in the configuration. The\nproof relies on energy estimates and the contraction mapping principle, using\nthe Lyapunov-Schmidt reduction technique. Finally, we show that kink clusters\nare universal profiles for the formation/collapse of multikink configurations.\nIn this sense, they can be interpreted as forming the stable/unstable manifold\nof the multikink state given by a superposition of n infinitely separated\nalternating kinks and antikinks.\n']","[('kink solutions', 0.5317065715789795), ('kinks', 0.4455612301826477), ('kink', 0.40807467699050903), ('soliton dynamics', 0.3889233469963074), ('field theories dimensions', 0.36036422848701477), ('field theory models', 0.34937357902526855), ('field theories', 0.3376745581626892), ('field theory', 0.3282959759235382), ('scalar field theories', 0.3231489658355713), ('theories dimensions', 0.32046443223953247)]" 639,639,48,639_deep learning dl_deep learning_network dnn_wireless communications,"['deep learning dl', 'deep learning', 'network dnn', 'wireless communications', 'wireless channel', 'wireless communication', 'deep neural networks', 'deep learning based', 'deep neural network', 'deep neural']","['Science-Informed Deep Learning (ScIDL) With Applications to Wireless\n Communications Given the extensive and growing capabilities offered by deep learning (DL),\nmore researchers are turning to DL to address complex challenges in\nnext-generation (xG) communications. However, despite its progress, DL also\nreveals several limitations that are becoming increasingly evident. One\nsignificant issue is its lack of interpretability, which is especially critical\nfor safety-sensitive applications. Another significant consideration is that DL\nmay not comply with the constraints set by physics laws or given security\nstandards, which are essential for reliable DL. Additionally, DL models often\nstruggle outside their training data distributions, which is known as poor\ngeneralization. Moreover, there is a scarcity of theoretical guidance on\ndesigning DL algorithms. These challenges have prompted the emergence of a\nburgeoning field known as science-informed DL (ScIDL). ScIDL aims to integrate\nexisting scientific knowledge with DL techniques to develop more powerful\nalgorithms. The core objective of this article is to provide a brief tutorial\non ScIDL that illustrates its building blocks and distinguishes it from\nconventional DL. Furthermore, we discuss both recent applications of ScIDL and\npotential future research directions in the field of wireless communications.\n', 'From Multilayer Perceptron to GPT: A Reflection on Deep Learning\n Research for Wireless Physical Layer Most research studies on deep learning (DL) applied to the physical layer of\nwireless communication do not put forward the critical role of the\naccuracy-generalization trade-off in developing and evaluating practical\nalgorithms. To highlight the disadvantage of this common practice, we revisit a\ndata decoding example from one of the first papers introducing DL-based\nend-to-end wireless communication systems to the research community and\npromoting the use of artificial intelligence (AI)/DL for the wireless physical\nlayer. We then put forward two key trade-offs in designing DL models for\ncommunication, namely, accuracy versus generalization and compression versus\nlatency. We discuss their relevance in the context of wireless communications\nuse cases using emerging DL models including large language models (LLMs).\nFinally, we summarize our proposed evaluation guidelines to enhance the\nresearch impact of DL on wireless communications. These guidelines are an\nattempt to reconcile the empirical nature of DL research with the rigorous\nrequirement metrics of wireless communications systems.\n', 'Robust Deep Learning-Based Physical Layer Communications: Strategies and\n Approaches Deep learning (DL) has emerged as a transformative technology with immense\npotential to reshape the sixth-generation (6G) wireless communication network.\nBy utilizing advanced algorithms for feature extraction and pattern\nrecognition, DL provides unprecedented capabilities in optimizing the network\nefficiency and performance, particularly in physical layer communications.\nAlthough DL technologies present the great potential, they also face\nsignificant challenges related to the robustness, which are expected to\nintensify in the complex and demanding 6G environment. Specifically, current DL\nmodels typically exhibit substantial performance degradation in dynamic\nenvironments with time-varying channels, interference of noise and different\nscenarios, which affect their effectiveness in diverse real-world applications.\nThis paper provides a comprehensive overview of strategies and approaches for\nrobust DL-based methods in physical layer communications. First we introduce\nthe key challenges that current DL models face. Then we delve into a detailed\nexamination of DL approaches specifically tailored to enhance robustness in 6G,\nwhich are classified into data-driven and model-driven strategies. Finally, we\nverify the effectiveness of these methods by case studies and outline future\nresearch directions.\n']","[('deep learning dl', 0.594598114490509), ('deep learning', 0.5073696970939636), ('network dnn', 0.493927538394928), ('wireless communications', 0.47367873787879944), ('wireless channel', 0.4652799665927887), ('wireless communication', 0.4507967233657837), ('deep neural networks', 0.44675058126449585), ('deep learning based', 0.4457560181617737), ('deep neural network', 0.4436316192150116), ('deep neural', 0.4425448477268219)]" 640,640,48,640_novikov algebras_algebras associative algebras_zinbiel algebras_dimensional associative algebras,"['novikov algebras', 'algebras associative algebras', 'zinbiel algebras', 'dimensional associative algebras', 'associative algebras', 'algebras derived', 'non associative algebras', 'algebras obtained', 'algebras describe', 'associative algebras associative']","['On Pre-Novikov Algebras and Derived Zinbiel Variety For a non-associative algebra $A$ with a derivation $d$, its derived algebra\n$A^{(d)}$ is the same space equipped with new operations $a\\succ b = d(a)b$,\n$a\\prec b = ad(b)$, $a,b\\in A$. Given a variety ${\\rm Var}$ of algebras, its\nderived variety is generated by all derived algebras $A^{(d)}$ for all $A$ in\n${\\rm Var}$ and for all derivations $d$ of $A$. The same terminology is applied\nto binary operads governing varieties of non-associative algebras. For example,\nthe operad of Novikov algebras is the derived one for the operad of\n(associative) commutative algebras. We state a sufficient condition for every\nalgebra from a derived variety to be embeddable into an appropriate\ndifferential algebra of the corresponding variety. We also find that for ${\\rm\nVar} = {\\rm Zinb}$, the variety of Zinbiel algebras, there exist algebras from\nthe derived variety (which coincides with the class of pre-Novikov algebras)\nthat cannot be embedded into a Zinbiel algebra with a derivation.\n', 'Novikov algebras and their primitive ideals The aim of this paper is to study the primitive ideals of Novikov algebras.\nIn terms of modular maximal right ideals, a characterization of the primitive\nideals of a Novikov algebra has been obtained. We prove a Chevalley-Jacobson\ndensity-type theorem for primitive Novikov algebras. We obtain some\nequivalences between prime, simple, and primitive Novikov algebras. We describe\na subalgebra of a Novikov algebra as a Novikov algebra of endomorphisms.\n', 'On quadratic Novikov algebras A quadratic Novikov algebra is a Novikov algebra $(A, \\circ)$ with a\nsymmetric and nondegenerate bilinear form $B(\\cdot,\\cdot)$ satisfying $B(a\\circ\nb, c)=-B(b, a\\circ c+c\\circ a)$ for all $a$, $b$, $c\\in A$. This notion\nappeared in the theory of Novikov bialgebras. In this paper, we first\ninvestigate some properties of quadratic Novikov algebras and give a\ndecomposition theorem of quadratic Novikov algebras. Then we present a\nclassification of quadratic Novikov algebras of dimensions $2$ and $3$ over\n$\\mathbb{C}$ up to isomorphism. Finally, a construction of quadratic Novikov\nalgebras called double extension is presented and we show that any quadratic\nNovikov algebra containing a nonzero isotropic ideal can be obtained by double\nextensions. Based on double extension, an example of quadratic Novikov algebras\nof dimension 4 is given.\n']","[('novikov algebras', 0.8179489374160767), ('algebras associative algebras', 0.6548816561698914), ('zinbiel algebras', 0.6365542411804199), ('dimensional associative algebras', 0.632917582988739), ('associative algebras', 0.6126910448074341), ('algebras derived', 0.6126843690872192), ('non associative algebras', 0.6072324514389038), ('algebras obtained', 0.590986967086792), ('algebras describe', 0.5573858618736267), ('associative algebras associative', 0.5507645606994629)]" 641,641,48,641_isometric deformations_finite element formulation_finite element implementation_isogeometric analysis,"['isometric deformations', 'finite element formulation', 'finite element implementation', 'isogeometric analysis', 'elasticity', 'elastic', 'isogeometric', 'element formulation', 'thin shells', 'thin structures']","['An efficient displacement-based isogeometric formulation for\n geometrically exact viscoelastic beams We propose a novel approach to the linear viscoelastic problem of\nshear-deformable geometrically exact beams. The generalized Maxwell model for\none-dimensional solids is here efficiently extended to the case of arbitrarily\ncurved beams undergoing finite displacement and rotations. High efficiency is\nachieved by combining a series of distinguishing features, that are i) the\nformulation is displacement-based, therefore no additional unknowns, other than\nincremental displacements and rotations, are needed for the internal variables\nassociated with the rate-dependent material; ii) the governing equations are\ndiscretized in space using the isogeometric collocation method, meaning that\nelements integration is totally bypassed; iii) finite rotations are updated\nusing the incremental rotation vector, leading to two main benefits: minimum\nnumber of rotation unknowns (the three components of the incremental rotation\nvector) and no singularity problems; iv) the same $\\rm SO(3)$-consistent\nlinearization of the governing equations and update procedures as for\nnon-rate-dependent linear elastic material can be used; v) a standard\nsecond-order accurate time integration scheme is made consistent with the\nunderlying geometric structure of the kinematic problem. Moreover, taking full\nadvantage of the isogeometric analysis features, the formulation permits\naccurately representing beams and beam structures with highly complex initial\nshape and topology, paving the way for a large number of potential applications\nin the field of architectured materials, meta-materials, morphing/programmable\nobjects, topological optimizations, etc. Numerical applications are finally\npresented in order to demonstrate attributes and potentialities of the proposed\nformulation.\n', 'Fast and accurate elastic analysis of laminated composite plates via\n isogeometric collocation and an equilibrium-based stress recovery approach A novel approach which combines isogeometric collocation and an\nequilibrium-based stress recovery technique is applied to analyze laminated\ncomposite plates. Isogeometric collocation is an appealing strong form\nalternative to standard Galerkin approaches, able to achieve high order\nconvergence rates coupled with a significantly reduced computational cost.\nLaminated composite plates are herein conveniently modeled considering only one\nelement through the thickness with homogenized material properties. This\nguarantees accurate results in terms of displacements and in-plane stress\ncomponents. To recover an accurate out-of-plane stress state, equilibrium is\nimposed in strong form as a post-processing correction step, which requires the\nshape functions to be highly continuous. This continuity demand is fully\ngranted by isogeometric analysis properties, and excellent results are obtained\nusing a minimal number of collocation points per direction, particularly for\nincreasing values of length-to-thickness plate ratio and number of layers.\n', 'Unified high-order multi-scale method for mechanical behavior simulation\n and strength prediction of composite plate and shell structures The complicated mesoscopic configurations of composite plate and shell\nstructures requires a huge amount of computational overhead for directly\nsimulating their mechanical problems. In this paper, a unified high-order\nmulti-scale method, which can effectively simulate the mechanical behavior and\npredict yield strength of composite plates and shells, is developed. Firstly,\nthrough the multiscale asymptotic analysis of multi-scale elastic equations in\nthe orthogonal curvilinear coordinate system, a high-order multi-scale model is\nestablished, which can uniformly and effectively analyze the mechanical\nbehavior of composite plate and shell structures. Moreover, the error\nestimation of the high-order multi-scale solutions is derived. Then, combining\nwith the material strength theory, a high-order multi-scale model for the\nstrength prediction of composite plate and shell structures is established.\nNext, based on the established high-order multi-scale model, a multi-scale\nalgorithm is developed which can not only efficiently and accurately simulate\nthe mechanical behaviors of composite plate and shell structures, but also\npredict their yield strength. Finally, the effectiveness of the established\nhigh-order multi-scale method is verified by extensive numerical experiments.\nThe numerical experimental results indicate that the high-order multi-scale\nmethod can more accurately capture the meso-scale oscillatory behaviors of\ncomposite plate and shell structures. The unified high-order multi-scale method\nestablished in this paper is not only suitable for the prediction of mechanical\nproperties of composite plate and shell structures, but also can be further\nextended to the prediction of multi-field coupling properties of composite\nplate and shell structures.\n']","[('isometric deformations', 0.45764923095703125), ('finite element formulation', 0.4503491222858429), ('finite element implementation', 0.43359628319740295), ('isogeometric analysis', 0.4302140474319458), ('elasticity', 0.39450255036354065), ('elastic', 0.3767453134059906), ('isogeometric', 0.36888420581817627), ('element formulation', 0.3669884502887726), ('thin shells', 0.35813066363334656), ('thin structures', 0.3505023121833801)]" 642,642,48,642_moduli spaces curves_cycles moduli spaces_moduli space curves_moduli spaces,"['moduli spaces curves', 'cycles moduli spaces', 'moduli space curves', 'moduli spaces', 'tautological ring', 'moduli space mathcal', 'classes moduli space', 'tautological classes', 'moduli spaces stable', 'curves genus']","[""Logarithmic tautological rings of the moduli spaces of curves We define the logarithmic tautological rings of the moduli spaces of Deligne-Mumford stable curves (together with a set of additive generators lifting the decorated strata classes of the standard tautological rings). While these algebras are infinite dimensional, a connection to polyhedral combinatorics via a new theory of homological piecewise polynomials allows an effective study. A complete calculation is given in genus 0 via the algebra of piecewise polynomials on the cone stack of the associated Artin fan (lifting Keel's presentation of the Chow ring of $\\overline{\\mathcal{M}}_{0,n}$). Counterexamples to the simplest generalizations in genus 1 are presented. We show, however, that the structure of the log tautological rings is determined by the complete knowledge of all relations in the standard tautological rings of the moduli spaces of curves. In particular, Pixton's conjecture concerning relations in the standard tautological rings lifts to a complete conjecture for relations in the log tautological rings of the moduli spaces of curves. Several open questions are discussed.\n We develop the entire theory of logarithmic tautological classes in the context of arbitrary smooth normal crossings pairs $(X,D)$ with explicit formulas for intersection products. As a special case, we give an explicit set of additive generators of the full logarithmic Chow ring of $(X,D)$ in terms of Chow classes on the strata of $X$ and piecewise polynomials on the cone stack."", 'On the Chow and cohomology rings of moduli spaces of stable curves In this paper, we ask: for which $(g, n)$ is the rational Chow or cohomology\nring of $\\overline{\\mathcal{M}}_{g,n}$ generated by tautological classes? This\nquestion has been fully answered in genus $0$ by Keel (the Chow and cohomology\nrings are tautological for all $n$) and genus $1$ by Belorousski (the rings are\ntautological if and only if $n \\leq 10$). For $g \\geq 2$, work of van Zelm\nshows the Chow and cohomology rings are not tautological once $2g + n \\geq 24$,\nleaving finitely many open cases. Here, we prove that the Chow and cohomology\nrings of $\\overline{\\mathcal{M}}_{g,n}$ are isomorphic and generated by\ntautological classes for $g = 2$ and $n \\leq 9$ and for $3 \\leq g \\leq 7$ and\n$2g + n \\leq 14$. For such $(g, n)$, this implies that the tautological ring is\nGorenstein and $\\overline{\\mathcal{M}}_{g,n}$ has polynomial point count.\n', 'The H-tautological ring We extend the theory of tautological classes on moduli spaces of stable\ncurves to the more general setting of moduli spaces of admissible Galois covers\nof curves, introducing the so-called H-tautological ring. The main new feature\nis the existence of restriction-corestriction morphisms remembering\nintermediate quotients of Galois covers, which are a rich source of new\nclasses. In particular, our new framework includes classes of Harris-Mumford\nadmissible covers on moduli spaces of curves, which are known in some (and\nspeculatively many more) examples to lie outside the usual tautological ring.\nWe give additive generators for the H-tautological ring and show that their\nintersections may be algorithmically computed, building on work of Schmitt-van\nZelm. As an application, we give a method for computing integrals of\nHarris-Mumford loci against tautological classes of complementary dimension,\nrecovering and giving a mild generalization of a recent quasi-modularity result\nof the author for covers of elliptic curves.\n']","[('moduli spaces curves', 0.617355227470398), ('cycles moduli spaces', 0.5926262140274048), ('moduli space curves', 0.5921061038970947), ('moduli spaces', 0.5677377581596375), ('tautological ring', 0.5574291944503784), ('moduli space mathcal', 0.5452510714530945), ('classes moduli space', 0.5432203412055969), ('tautological classes', 0.5414977073669434), ('moduli spaces stable', 0.5370203852653503), ('curves genus', 0.5263619422912598)]" 643,643,48,643_graph homology_graph complex_moduli spaces curves_cohomology moduli,"['graph homology', 'graph complex', 'moduli spaces curves', 'cohomology moduli', 'cohomology moduli spaces', 'moduli space curves', 'cohomology moduli space', 'weight cohomology', 'moduli spaces', 'supported cohomology']","['Weight 11 compactly supported cohomology of moduli spaces of curves We study the weight 11 part of the compactly supported cohomology of the\nmoduli space of curves $M_{g,n}$, using graph complex techniques, with\nparticular attention to the case $n = 0$. As applications, we prove new\nnonvanishing results for the cohomology of $M_g$, and exponential growth with\n$g$, in a wide range of degrees.\n', ""Hairy graphs to ribbon graphs via a fixed source graph complex We show that the hairy graph complex $(HGC_{n,n},d)$ appears as an associated\ngraded complex of the oriented graph complex $(OGC_{n+1},d)$, subject to the\nfiltration on the number of targets, or equivalently sources, called the fixed\nsource graph complex. The fixed source graph complex $(OGC_1,d_0)$ maps into\nthe ribbon graph complex $RGC$, which models the moduli space of Riemann\nsurfaces with marked points. The full differential $d$ on the oriented graph\ncomplex $OGC_{n+1}$ corresponds to the deformed differential $d+h$ on the hairy\ngraph complex $HGC_{n,n}$, where $h$ adds a hair. This deformed complex\n$(HGC_{n,n},d+h)$ is already known to be quasi-isomorphic to standard\nKontsevich's graph complex $GC^2_n$. This gives a new connection between the\nstandard and the oriented version of Kontsevich's graph complex.\n"", 'Oriented hairy graphs and moduli spaces of curves We discuss a graph complex formed by directed acyclic graphs with external\nlegs. This complex comes in particular with a map to the ribbon graph complex\ncomputing the (compactly supported) cohomology of the moduli space of points\n$\\mathcal M_{g,n}$, extending an earlier result of Merkulov-Willwacher. It is\nfurthermore quasi-isomorphic to the hairy graph complex computing the weight 0\npart of the compactly supported cohomology of $\\mathcal{M}_{g,n}$ according to\nChan-Galatius-Payne. Hence we can naturally connect the works\nChan-Galatius-Payne and of Merkulov-Willwacher and the ribbon graph complex and\nobtain a fairly satisfying picture of how all the pieces and various graph\ncomplexes fit together, at least in weight zero.\n']","[('graph homology', 0.5695045590400696), ('graph complex', 0.523385226726532), ('moduli spaces curves', 0.519324779510498), ('cohomology moduli', 0.5177637338638306), ('cohomology moduli spaces', 0.5176759362220764), ('moduli space curves', 0.5149717330932617), ('cohomology moduli space', 0.5088376998901367), ('weight cohomology', 0.46872538328170776), ('moduli spaces', 0.44646593928337097), ('supported cohomology', 0.4440521001815796)]" 644,644,48,644_optimal stopping problems_optimal stopping_optimal stopping time_stopping problems,"['optimal stopping problems', 'optimal stopping', 'optimal stopping time', 'stopping problems', 'stopping times', 'stochastic control problems', 'stopping time', 'stochastic control', 'singular stochastic control', 'stopping']","['On the continuity of optimal stopping surfaces for jump-diffusions We show that optimal stopping surfaces $(t,y)\\mapsto x_*(t,y)$ arising from\ntime-inhomogeneous optimal stopping problems on two-dimensional jump-diffusions\n$(X,Y)$ are continuous (jointly in time and space) under mild monotonicity and\nregularity assumptions of local nature.\n', 'Exact optimal stopping for multidimensional linear switching diffusions The paper studies a class of multidimensional optimal stopping problems with\ninfinite horizon for linear switching diffusions. There are two main novelties\nin the optimal problems considered: the underlying stochastic process has\ndiscontinuous paths and the cost function is not necessarily integrable on the\nentire time horizon, where the latter is often a key assumption in classical\noptimal stopping theory for diffusions, cf. [22, Corollary 2.9]. Under\nrelatively mild conditions, we show, for the class of multidimensional optimal\nstopping problems under consideration, that the first entry time of the\nstopping region is an optimal stopping time. Further, we prove that the\ncorresponding optimal stopping boundaries can be represented as the unique\nsolution to a nonlinear integral equation. We conclude with an application of\nour results to the problem of quickest real-time detection of a Markovian\ndrift.\n', 'On the monotonicity of the stopping boundary for time-inhomogeneous\n optimal stopping problems We consider a class of time-inhomogeneous optimal stopping problems and we\nprovide sufficient conditions on the data of the problem that guarantee\nmonotonicity of the optimal stopping boundary. In our setting,\ntime-inhomogeneity stems not only from the reward function but, in particular,\nfrom the time dependence of the drift coefficient of the one-dimensional\nstochastic differential equation (SDE) which drives the stopping problem. In\norder to obtain our results, we mostly employ probabilistic arguments: we use a\ncomparison principle between solutions of the SDE computed at different\nstarting times, and martingale methods of optimal stopping theory. We also show\na variant of the main theorem, which weakens one of the assumptions and\nadditionally relies on the renowned connection between optimal stopping and\nfree-boundary problems.\n']","[('optimal stopping problems', 0.7586783170700073), ('optimal stopping', 0.7324041724205017), ('optimal stopping time', 0.7295541763305664), ('stopping problems', 0.5962411165237427), ('stopping times', 0.592441976070404), ('stochastic control problems', 0.5237237215042114), ('stopping time', 0.5132967233657837), ('stochastic control', 0.4982474446296692), ('singular stochastic control', 0.4735577702522278), ('stopping', 0.46595627069473267)]" 645,645,48,645_finite mixture models_mixture models_finite mixtures_finite mixture,"['finite mixture models', 'mixture models', 'finite mixtures', 'finite mixture', 'mixture components', 'process mixture', 'mixture distribution', 'mixtures', 'mixture', 'bayesian nonparametric']","[""Evidence estimation in finite and infinite mixture models and\n applications Estimating the model evidence - or mariginal likelihood of the data - is a\nnotoriously difficult task for finite and infinite mixture models and we\nreexamine here different Monte Carlo techniques advocated in the recent\nliterature, as well as novel approaches based on Geyer (1994) reverse logistic\nregression technique, Chib (1995) algorithm, and Sequential Monte Carlo (SMC).\nApplications are numerous. In particular, testing for the number of components\nin a finite mixture model or against the fit of a finite mixture model for a\ngiven dataset has long been and still is an issue of much interest, albeit yet\nmissing a fully satisfactory resolution. Using a Bayes factor to find the right\nnumber of components K in a finite mixture model is known to provide a\nconsistent procedure. We furthermore establish the consistence of the Bayes\nfactor when comparing a parametric family of finite mixtures against the\nnonparametric 'strongly identifiable' Dirichlet Process Mixture (DPM) model.\n"", 'Clustering consistency with Dirichlet process mixtures Dirichlet process mixtures are flexible non-parametric models, particularly\nsuited to density estimation and probabilistic clustering. In this work we\nstudy the posterior distribution induced by Dirichlet process mixtures as the\nsample size increases, and more specifically focus on consistency for the\nunknown number of clusters when the observed data are generated from a finite\nmixture. Crucially, we consider the situation where a prior is placed on the\nconcentration parameter of the underlying Dirichlet process. Previous findings\nin the literature suggest that Dirichlet process mixtures are typically not\nconsistent for the number of clusters if the concentration parameter is held\nfixed and data come from a finite mixture. Here we show that consistency for\nthe number of clusters can be achieved if the concentration parameter is\nadapted in a fully Bayesian way, as commonly done in practice. Our results are\nderived for data coming from a class of finite mixtures, with mild assumptions\non the prior for the concentration parameter and for a variety of choices of\nlikelihood kernels for the mixture.\n', 'Bayesian mixture models (in)consistency for the number of clusters Bayesian nonparametric mixture models are common for modeling complex data.\nWhile these models are well-suited for density estimation, recent results\nproved posterior inconsistency of the number of clusters when the true number\nof components is finite, for the Dirichlet process and Pitman--Yor process\nmixture models. We extend these results to additional Bayesian nonparametric\npriors such as Gibbs-type processes and finite-dimensional representations\nthereof. The latter include the Dirichlet multinomial process, the recently\nproposed Pitman-Yor, and normalized generalized gamma multinomial processes. We\nshow that mixture models based on these processes are also inconsistent in the\nnumber of clusters and discuss possible solutions. Notably, we show that a\npost-processing algorithm introduced for the Dirichlet process can be extended\nto more general models and provides a consistent method to estimate the number\nof components.\n']","[('finite mixture models', 0.7649624347686768), ('mixture models', 0.7097166180610657), ('finite mixtures', 0.6440296769142151), ('finite mixture', 0.6124605536460876), ('mixture components', 0.5371478796005249), ('process mixture', 0.5222703218460083), ('mixture distribution', 0.5168867707252502), ('mixtures', 0.5009558200836182), ('mixture', 0.49402764439582825), ('bayesian nonparametric', 0.4731227159500122)]" 646,646,48,646_solutions critical regularity_global well posedness_local well posedness_critical sobolev space,"['solutions critical regularity', 'global well posedness', 'local well posedness', 'critical sobolev space', 'muskat', 'viscosities', 'critical sobolev', 'viscosity', 'invariant sobolev', 'posedness']","['Global well-posedness for the three dimensional Muskat problem in the\n critical Sobolev space We prove that the 3D stable Muskat problem is globally well-posed in the\ncritical Sobolev space $\\dot H^2 \\cap \\dot W^{1,\\infty}$ provided that the\nsemi-norm $\\Vert f_0 \\Vert_{\\dot H^{2}}$ is small enough. Consequently, this\nallows the Lipschitz semi-norm to be arbitrarily large. The proof is based on a\nnew formulation of the 3D Muskat problem that allows to capture the hidden\noscillatory nature of the problem. The latter formulation allows to prove the\n$\\dot H^{2}$ {\\emph{a priori}} estimates. In the literature, all the known\nglobal existence results for the 3D Muskat problem are for small slopes (less\nthan 1). This is the first arbitrary large slope theorem for the 3D stable\nMuskat problem.\n', 'The vanishing surface tension limit of the Muskat problem The Muskat problem, in its general setting, concerns the interface evolution\nbetween two incompressible fluids of different densities and viscosities in\nporous media. The interface motion is driven by gravity and capillarity forces,\nwhere the latter is due to surface tension. To leading order, both the Muskat\nproblems with and without surface tension effect are scaling invariant in the\nSobolev space $H^{1+\\frac{d}{2}}(\\mathbb{R}^d)$, where $d$ is the dimension of\nthe interface. We prove that for any subcritical data satisfying the\nRayleigh-Taylor condition, solutions of the Muskat problem with surface tension\n$\\frak{s}$ converge to the unique solution of the Muskat problem without\nsurface tension locally in time with the rate $\\sqrt{\\frak{s}}$ when\n$\\frak{s}\\to 0$. This allows for initial interfaces that have unbounded or even\nnot locally square integrable curvature. If in addition the initial curvature\nis square integrable, we obtain the convergence with optimal rate $\\frak{s}$.\n', 'Regularity of solutions to the Muskat equation In this paper, we show that if a solution to the Muskat problem in the case\nof different densities and the same viscosity is sufficiently smooth, then it\nmust be analytic except at the points where a turnover of the fluids happens.\n']","[('solutions critical regularity', 0.5123879313468933), ('global well posedness', 0.5032236576080322), ('local well posedness', 0.4764489531517029), ('critical sobolev space', 0.43991535902023315), ('muskat', 0.4362015724182129), ('viscosities', 0.4263180196285248), ('critical sobolev', 0.4258410930633545), ('viscosity', 0.41092169284820557), ('invariant sobolev', 0.40665072202682495), ('posedness', 0.3878284990787506)]" 647,647,48,647_gradient estimates positive_emery ricci curvature_riemannian manifolds nonnegative_manifolds nonnegative ricci,"['gradient estimates positive', 'emery ricci curvature', 'riemannian manifolds nonnegative', 'manifolds nonnegative ricci', 'gradient estimates nonlinear', 'equations riemannian manifolds', 'type gradient estimate', 'gradient estimates', 'curvature conditions', 'equations riemannian']","[""Gradient estimates for nonlinear elliptic equations involving the Witten\n Laplacian on smooth metric measure spaces and implications This article presents new local and global gradient estimates of Li-Yau type\nfor positive solutions to a class of nonlinear elliptic equations on smooth\nmetric measure spaces involving the Witten Laplacian. The estimates are derived\nunder natural lower bounds on the associated Bakry-\\'Emery Ricci curvature\ntensor and find utility in proving general Harnack inequalities and\nLiouville-type theorems to mention a few. The results here unify, extend and\nimprove various existing results in the literature for special nonlinearities\nalready of huge interest and applications. Some important consequences are\npresented and discussed.\n"", ""Souplet-Zhang and Hamilton type gradient estimates for nonlinear\n elliptic equations on smooth metric measure spaces In this article we present new gradient estimates for positive solutions to a\nclass of nonlinear elliptic equations involving the f-Laplacian on a smooth\nmetric measure space. The gradient estimates of interest are of Souplet-Zhang\nand Hamilton types respectively and are established under natural lower bounds\non the generalised Bakry-\\'Emery Ricci curvature tensor. From these estimates\nwe derive amongst other things Harnack inequalities and general global\nconstancy and Liouville-type theorems. The results and approach undertaken here\nprovide a unified treatment and extend and improve various existing results in\nthe literature. Some implications and applications are presented and discussed.\n"", 'Some gradient estimates for nonlinear heat-type equations on smooth\n metric measure spaces with compact boundary In this paper we prove some Hamilton type and Li-Yau type gradient estimates\non positive solutions to generalized nonlinear parabolic equations on smooth\nmetric measure space with compact boundary. The geometry of the space in terms\nof lower bounds on the weighted Bakry-Emery Ricci curvature tensor and weighted\nmean curvature of the boundary are key in proving generalized local and global\ngradient estimates. Various applications of these gradient estimates in terms\nof parabolic Harnack inequalities and Liouville type results are discussed.\nFurther consequences to some specific models informed by the nature of the\nnonlinearities are highlighted.\n']","[('gradient estimates positive', 0.5724435448646545), ('emery ricci curvature', 0.557473361492157), ('riemannian manifolds nonnegative', 0.5491749048233032), ('manifolds nonnegative ricci', 0.5454241037368774), ('gradient estimates nonlinear', 0.5448678731918335), ('equations riemannian manifolds', 0.5429112315177917), ('type gradient estimate', 0.5013286471366882), ('gradient estimates', 0.4995534420013428), ('curvature conditions', 0.49858906865119934), ('equations riemannian', 0.49735406041145325)]" 648,648,48,648_string amplitudes_string theory_selberg integrals_superstring theory,"['string amplitudes', 'string theory', 'selberg integrals', 'superstring theory', 'modular forms', 'amplitudes', 'eisenstein series', 'holomorphic modular forms', 'modular invariant', 'scattering amplitudes']","[""Integrating three-loop modular graph functions and transcendentality of\n string amplitudes Modular graph functions (MGFs) are $\\mathrm{SL}(2,\\mathbb{Z})$-invariant\nfunctions on the Poincar\\'e upper half-plane associated with Feynman graphs of\na conformal scalar field on a torus. The low-energy expansion of genus-one\nsuperstring amplitudes involves suitably regularized integrals of MGFs over the\nfundamental domain for $\\mathrm{SL}(2,\\mathbb{Z})$. In earlier work, these\nintegrals were evaluated for all MGFs up to two loops and for higher loops up\nto weight six. These results led to the conjectured uniform transcendentality\nof the genus-one four-graviton amplitude in Type II superstring theory. In this\npaper, we explicitly evaluate the integrals of several infinite families of\nthree-loop MGFs and investigate their transcendental structure. Up to weight\nseven, the structure of the integral of each individual MGF is consistent with\nthe uniform transcendentality of string amplitudes. Starting at weight eight,\nthe transcendental weights obtained for the integrals of individual MGFs are no\nlonger consistent with the uniform transcendentality of string amplitudes.\nHowever, in all the cases we examine, the violations of uniform\ntranscendentality take on a special form given by the integrals of triple\nproducts of non-holomorphic Eisenstein series. If Type II superstring\namplitudes do exhibit uniform transcendentality, then the special combinations\nof MGFs which enter the amplitudes must be such that these integrals of triple\nproducts of Eisenstein series precisely cancel one another. Whether this indeed\nis the case poses a novel challenge to the conjectured uniform\ntranscendentality of genus-one string amplitudes.\n"", 'Single-valued integration and superstring amplitudes in genus zero We study open and closed string amplitudes at tree-level in string\nperturbation theory using the methods of single-valued integration which were\ndeveloped in the prequel to this paper. Using dihedral coordinates on the\nmoduli spaces of curves of genus zero with marked points, we define a canonical\nregularisation of both open and closed string perturbation amplitudes at tree\nlevel, and deduce that they admit a Laurent expansion in Mandelstam variables\nwhose coefficients are multiple zeta values (resp. single-valued multiple zeta\nvalues). Furthermore, we prove the existence of a motivic Laurent expansion\nwhose image under the period map is the open string expansion, and whose image\nunder the single-valued period map is the closed string expansion. This proves\nthe recent conjecture of Stieberger that closed string amplitudes are the\nsingle-valued projections of (motivic lifts of) open string amplitudes.\n Finally, applying a variant of the single-valued formalism for cohomology\nwith coefficients yields the KLT formula expressing closed string amplitudes as\nquadratic expressions in open string amplitudes.\n', 'Modular Graph Forms and Scattering Amplitudes in String Theory In this thesis, we investigate the low-energy expansion of scattering\namplitudes of closed strings at one-loop level (i.e. at genus one) in a\nten-dimensional Minkowski background using a special class of functions called\nmodular graph forms. These allow for a systematic evaluation of the low-energy\nexpansion and satisfy many non-trivial algebraic and differential relations. We\nstudy these relations in detail, leading to basis decompositions for a large\nnumber of modular graph forms which greatly reduce the complexity of the\nexpansions of the integrals appearing in the amplitude. One of the results of\nthis thesis is a Mathematica package which automatizes these simplifications.\nWe use these techniques to compute the leading low-energy orders of the\nscattering amplitude of four gluons in the heterotic string at one-loop level.\n Furthermore, we study a generating function which conjecturally contains the\ntorus integrals of all perturbative closed-string theories. We write this\ngenerating function in terms of iterated integrals of holomorphic Eisenstein\nseries and use this approach to arrive at a more rigorous characterization of\nthe space of modular graph forms than was possible before.\n For tree-level string amplitudes, the single-valued map of multiple zeta\nvalues maps open-string amplitudes to closed-string amplitudes. The definition\nof a suitable one-loop generalization, a so-called elliptic single-valued map,\nis an active area of research and we provide a new perspective on this topic\nusing our generating function of torus integrals.\n The original version of this thesis, as submitted in June 2020 to the\nHumboldt University Berlin, is available under the DOI 10.18452/21829. The\npresent text contains minor updates compared to this version, reflecting\nfurther developments in the literature, in particular concerning the\nconstruction of an elliptic single-valued map.\n']","[('string amplitudes', 0.5842167735099792), ('string theory', 0.5353040099143982), ('selberg integrals', 0.4911847710609436), ('superstring theory', 0.466799795627594), ('modular forms', 0.4596395790576935), ('amplitudes', 0.4548826217651367), ('eisenstein series', 0.43109026551246643), ('holomorphic modular forms', 0.42609816789627075), ('modular invariant', 0.4138498306274414), ('scattering amplitudes', 0.4048449397087097)]" 649,649,48,649_finite element methods_multiscale methods_multiscale finite element_multiscale basis functions,"['finite element methods', 'multiscale methods', 'multiscale finite element', 'multiscale basis functions', 'multiscale pdes', 'multiscale basis', 'multiscale problems', 'generalized multiscale finite', 'heterogeneous multiscale', 'generalized multiscale']","['Iterative Oversampling Technique for Constraint Energy Minimizing\n Generalized Multiscale Finite Element Method in the Mixed Formulation In this paper, we develop an iterative scheme to construct multiscale basis\nfunctions within the framework of the Constraint Energy Minimizing Generalized\nMultiscale Finite Element Method (CEM-GMsFEM) for the mixed formulation. The\niterative procedure starts with the construction of an energy minimizing\nsnapshot space that can be used for approximating the solution of the model\nproblem. A spectral decomposition is then performed on the snapshot space to\nform global multiscale space. Under this setting, each global multiscale basis\nfunction can be split into a non-decaying and a decaying parts. The\nnon-decaying part of a global basis is localized and it is fixed during the\niteration. Then, one can approximate the decaying part via a modified\nRichardson scheme with an appropriately defined preconditioner. Using this set\nof iterative-based multiscale basis functions, first-order convergence with\nrespect to the coarse mesh size can be shown if sufficiently many times of\niterations with regularization parameter being in an appropriate range are\nperformed. Numerical results are presented to illustrate the effectiveness and\nefficiency of the proposed computational multiscale method.\n', 'An iterative constraint energy minimizing generalized multiscale finite\n element method for contact problem This work presents an Iterative Constraint Energy Minimizing Generalized\nMultiscale Finite Element Method (ICEM-GMsFEM) for solving the contact problem\nwith high contrast coefficients. The model problem can be characterized by a\nvariational inequality, where we add a penalty term to convert this problem\ninto a non-smooth and non-linear unconstrained minimizing problem. The\ncharacterization of the minimizer satisfies the variational form of a mixed\nDirilect-Neumann-Robin boundary value problem. So we apply CEM-GMsFEM\niteratively and introduce special boundary correctors along with multiscale\nspaces to achieve an optimal convergence rate. Numerical results are conducted\nfor different highly heterogeneous permeability fields, validating the fast\nconvergence of the CEM-GMsFEM iteration in handling the contact boundary and\nillustrating the stability of the proposed method with different sets of\nparameters. We also prove the fast convergence of the proposed iterative\nCEM-GMsFEM method and provide an error estimate of the multiscale solution\nunder a mild assumption.\n', 'Constraint energy minimizing generalized multiscale finite element\n method for convection diffusion equation In this paper we present and analyze a constraint energy minimizing\ngeneralized multiscale finite element method for convection diffusion equation.\nTo define the multiscale basis functions, we first build an auxiliary\nmultiscale space by solving local spectral problems motivated by analysis. Then\nconstraint energy minimization performed in oversampling domains is exploited\nto construct the multiscale space. The resulting multiscale basis functions\nhave a good decay property even for high contrast diffusion and convection\ncoefficients. Furthermore, if the number of oversampling layer is chosen\nproperly, we can prove that the convergence rate is proportional to the coarse\nmesh size. Our analysis also indicates that the size of the oversampling domain\nweakly depends on the contrast of the heterogeneous coefficients. Several\nnumerical experiments are presented illustrating the performances of our\nmethod.\n']","[('finite element methods', 0.5890632271766663), ('multiscale methods', 0.583855926990509), ('multiscale finite element', 0.563180685043335), ('multiscale basis functions', 0.5604422092437744), ('multiscale pdes', 0.5568943619728088), ('multiscale basis', 0.5313199162483215), ('multiscale problems', 0.5289488434791565), ('generalized multiscale finite', 0.4912639260292053), ('heterogeneous multiscale', 0.4824080169200897), ('generalized multiscale', 0.48219993710517883)]" 650,650,47,650_dedekind domains_noetherian domains_dedekind domain_valuation rings,"['dedekind domains', 'noetherian domains', 'dedekind domain', 'valuation rings', 'maximal ideals', 'noetherian domain', 'local rings', 'noetherian rings', 'associated prime ideals', 'minimal prime ideals']","['Revisiting G-Dedekind domains Let $R$ be an integral domain with $qf(R)=K$ and let $F(R)$ be the set of\nnonzero fractional ideals of $R.$ Call $R$ a dually compact domain (DCD) if for\neach $I\\in F(R)$ the ideal $I_{v}=(I^{-1})^{-1}$ is a finite intersection of\nprincipal fractional ideals. We characterize DCDs and show that the class of\nDCDs properly contains various classes of integral domains, such as Noetherian,\nMori and Krull domains. In addition we show that a Schreier DCD is a GCD domain\nwith the property that for each $A\\in F(R)$ the ideal $A_{v}$ is principal. We\nshow that a domain $R$ is G-Dedekind domain (i.e. has the property that $A_{v}$\nis invertible for each $A\\in F(R)$) if and only if $R$ is a DCD satisfying the\nproperty $\\ast :$ for all pairs of subsets\n$\\{a_{1},...,a_{m}\\},\\{b_{1},...b_{n}\\}\\subseteq K\\backslash \\{0\\},$ $(\\cap\n_{i=1}^{m}(a_{i})(\\cap _{j=1}^{n}(b_{j}))=\\cap _{i,j=1}^{m,n}a_{i}b_{j}$. We\ndiscuss what the appropriate name for G-Dedekind domains and related notions\nshould be. We also make some observations about how the DCDs behave under\nlocalizations and polynomial ring extensions.\n', 'Constructing Noncatenary Quasi-Excellent Precompletions Let $T$ be a local (Noetherian) ring and let $Q_1$ and $Q_2$ be prime ideals\nof $T$. We find sufficient conditions for there to exist a quasi-excellent\nlocal subring $B$ of $T$ satisfying the following conditions: (1) the\ncompletion of $B$ at its maximal ideal is isomorphic to the completion of $T$\nat its maximal ideal, (2) $B \\cap Q_1 = B \\cap Q_2$, (3) the set of prime\nideals of $T/(Q_1 \\cap Q_2)$ of positive height is the same as the set of prime\nideals of $B/(B \\cap Q_1)$ of positive height when viewed as partially ordered\nsets, and (4) for $i = 1$ and for $i = 2$, there is a coheight preserving\nbijection between the minimal prime ideals of $T_{Q_i}$ and the minimal prime\nideals of $B_{B \\cap Q_1}$. Intuitively, this means that $T$ contains a\nquasi-excellent local subring in which $Q_1$ and $Q_2$ are ""glued together"" and\nsuch that both the completion and desirable properties of the prime spectrum\nare preserved. We use this result to show that certain complete local rings are\nthe completion of a quasi-excellent local ring whose prime spectrum, when\nviewed as a partially ordered set, contains interesting noncatenary finite\nsubsets.\n', 'Boundness in almost Dedekind domains We study different form of boundness for ideals of almost Dedekind domains,\ngeneralizing the notions of critical ideals, radical factorization, and\nSP-domains. We show that every almost Dedekind domain has at least one\nnoncritical maximal ideals and, indeed, the set of noncritical maximal ideals\nis dense in the maximal space, with respect to the constructible topology; as a\nconsequence, we show that every almost Dedekind domain is SP-scattered, and in\nparticular that the group $\\mathrm{Inv}(D)$ of invertible ideals of an almost\nDedekind domain $D$ is always free. If $D$ is an almost Dedekind domain with\nnonzero Jacobson radical, we also show that there is at least one element whose\nideal function is bounded.\n']","[('dedekind domains', 0.6730853915214539), ('noetherian domains', 0.6150155067443848), ('dedekind domain', 0.6040382385253906), ('valuation rings', 0.5932872295379639), ('maximal ideals', 0.5797446966171265), ('noetherian domain', 0.5792582631111145), ('local rings', 0.5577030777931213), ('noetherian rings', 0.5438986420631409), ('associated prime ideals', 0.5276409387588501), ('minimal prime ideals', 0.5226598978042603)]" 651,651,47,651_clifford algebras_clifford algebra_clifford geometric_geometric algebras,"['clifford algebras', 'clifford algebra', 'clifford geometric', 'geometric algebras', 'geometric algebra', 'algebras arbitrary dimension', 'clifford', 'quaternions', 'heisenberg algebra', 'algebras arbitrary']","[""Development of the Method of Averaging in Clifford Geometric Algebras We develop the method of averaging in Clifford (geometric) algebras suggested\nby the author in previous papers. We consider operators constructed using two\ndifferent sets of anticommuting elements of real or complexified Clifford\nalgebras. These operators generalize Reynolds operators from the representation\ntheory of finite groups. We prove a number of new properties of these\noperators. Using the generalized Reynolds operators, we give a complete proof\nof the generalization of Pauli's theorem to the case of Clifford algebras of\narbitrary dimension. The results can be used in geometry, physics, engineering,\ncomputer science, and other applications.\n"", 'Algorithmic computation of multivector inverses and characteristic\n polynomials in non-degenerate Clifford algebras The power of Clifford or, geometric, algebra lies in its ability to represent\ngeometric operations in a concise and elegant manner. Clifford algebras provide\nthe natural generalizations of complex, dual numbers and quaternions into\nnon-commutative multivectors. The paper demonstrates an algorithm for the\ncomputation of inverses of such numbers in a non-degenerate Clifford algebra of\nan arbitrary dimension. The algorithm is a variation of the\nFaddeev-LeVerrier-Souriau algorithm and is implemented in the open-source\nComputer Algebra System Maxima. Symbolic and numerical examples in different\nClifford algebras are presented.\n', 'On computing the determinant, other characteristic polynomial\n coefficients, and inverse in Clifford algebras of arbitrary dimension In this paper, we solve the problem of computing the inverse in Clifford\nalgebras of arbitrary dimension. We present basis-free formulas of different\ntypes (explicit and recursive) for the determinant, other characteristic\npolynomial coefficients, adjugate, and inverse in real Clifford algebras (or\ngeometric algebras) over vector spaces of arbitrary dimension $n$. The formulas\ninvolve only the operations of multiplication, summation, and operations of\nconjugation without explicit use of matrix representation. We use methods of\nClifford algebras (including the method of quaternion typification proposed by\nthe author in previous papers and the method of operations of conjugation of\nspecial type presented in this paper) and generalizations of numerical methods\nof matrix theory (the Faddeev-LeVerrier algorithm based on the Cayley-Hamilton\ntheorem; the method of calculating the characteristic polynomial coefficients\nusing Bell polynomials) to the case of Clifford algebras in this paper. We\npresent the construction of operations of conjugation of special type and study\nrelations between these operations and the projection operations onto fixed\nsubspaces of Clifford algebras. We use this construction in the analytical\nproof of formulas for the determinant, other characteristic polynomial\ncoefficients, adjugate, and inverse in Clifford algebras. The basis-free\nformulas for the inverse give us basis-free solutions to linear algebraic\nequations, which are widely used in computer science, image and signal\nprocessing, physics, engineering, control theory, etc. The results of this\npaper can be used in symbolic computation.\n']","[('clifford algebras', 0.8155835270881653), ('clifford algebra', 0.7903597950935364), ('clifford geometric', 0.7011298537254333), ('geometric algebras', 0.6247924566268921), ('geometric algebra', 0.5542518496513367), ('algebras arbitrary dimension', 0.5370621085166931), ('clifford', 0.5250276923179626), ('quaternions', 0.5174680352210999), ('heisenberg algebra', 0.44475841522216797), ('algebras arbitrary', 0.433689683675766)]" 652,652,47,652_factor models_factor analysis_matrix factor_decomposition factor,"['factor models', 'factor analysis', 'matrix factor', 'decomposition factor', 'principal components analysis', 'principal component analysis', 'latent factors', 'factors factor', 'high dimensional factor', 'component analysis pca']","[""Factor Strength Estimation in Vector and Matrix Time Series Factor\n Models Most factor modelling research in vector or matrix-valued time series assume\nall factors are pervasive/strong and leave weaker factors and their\ncorresponding series to the noise. Weaker factors can in fact be important to a\ngroup of observed variables, for instance a sector factor in a large portfolio\nof stocks may only affect particular sectors, but can be important both in\ninterpretations and predictions for those stocks. While more recent factor\nmodelling researches do consider ``local'' factors which are weak factors with\nsparse corresponding factor loadings, there are real data examples in the\nliterature where factors are weak because of weak influence on most/all\nobserved variables, so that the corresponding factor loadings are not sparse\n(non-local). As a first in the literature, we propose estimators of factor\nstrengths for both local and non-local weak factors, and prove their\nconsistency with rates of convergence spelt out for both vector and\nmatrix-valued time series factor models. Factor strength has an important\nindication in what estimation procedure of factor models to follow, as well as\nthe estimation accuracy of various estimators (Chen and Lam, 2024). Simulation\nresults show that our estimators have good performance in recovering the true\nfactor strengths, and an analysis on the NYC taxi traffic data indicates the\nexistence of weak factors in the data which may not be localized.\n"", ""Statistical properties of matrix decomposition factor analysis Numerous estimators have been proposed for factor analysis, and their statistical properties have been extensively studied. In the early 2000s, a novel matrix factorization-based approach, known as Matrix Decomposition Factor Analysis (MDFA), was introduced and has been actively developed in computational statistics. The MDFA estimator offers several advantages, including the guarantee of proper solutions (i.e., no Heywood cases) and the extensibility to $\\ell_0$-sparse estimation. However, the MDFA estimator does not appear to be formulated as a classical M-estimator or a minimum discrepancy function estimator. and the statistical properties of the MDFA estimator have remained largely unexplored. Although the MDFA estimator minimizes a loss function resembling that of principal component analysis (PCA), it empirically behaves more like consistent estimators used in factor analysis than like PCA itself. This raises a fundamental question: Can matrix decomposition factor analysis truly be regarded as ``factor analysis''? To address this problem, we establish the consistency and asymptotic normality of the MDFA estimator. Notably, the MDFA estimator can be formulated as a semiparametric profile likelihood estimator, and we derive the explicit form of the profile likelihood. Surprisingly, we discover that the profile likelihood is the squared Bures-Wasserstein distance between the sample covariance matrix and the modeled covariance matrix. Thus, the MDFA estimator is finally a minimum discrepancy function estimator in factor analysis, and we can easily extend MDFA for structural equation modeling (SEM). Numerical experiments demonstrate that MDFA performs competitively with other established estimators, suggesting it is a theoretically grounded and computationally appealing alternative for factor analysis."", 'Quasi Maximum Likelihood Estimation of High-Dimensional Factor Models: A\n Critical Review We review Quasi Maximum Likelihood estimation of factor models for\nhigh-dimensional panels of time series. We consider two cases: (1) estimation\nwhen no dynamic model for the factors is specified (Bai and Li, 2012, 2016);\n(2) estimation based on the Kalman smoother and the Expectation Maximization\nalgorithm thus allowing to model explicitly the factor dynamics (Doz et al.,\n2012, Barigozzi and Luciani, 2019). Our interest is in approximate factor\nmodels, i.e., when we allow for the idiosyncratic components to be mildly\ncross-sectionally, as well as serially, correlated. Although such setting\napparently makes estimation harder, we show, in fact, that factor models do not\nsuffer of the {\\it curse of dimensionality} problem, but instead they enjoy a\n{\\it blessing of dimensionality} property. In particular, given an approximate\nfactor structure, if the cross-sectional dimension of the data, $N$, grows to\ninfinity, we show that: (i) identification of the model is still possible, (ii)\nthe mis-specification error due to the use of an exact factor model\nlog-likelihood vanishes. Moreover, if we let also the sample size, $T$, grow to\ninfinity, we can also consistently estimate all parameters of the model and\nmake inference. The same is true for estimation of the latent factors which can\nbe carried out by weighted least-squares, linear projection, or Kalman\nfiltering/smoothing. We also compare the approaches presented with: Principal\nComponent analysis and the classical, fixed $N$, exact Maximum Likelihood\napproach. We conclude with a discussion on efficiency of the considered\nestimators.\n']","[('factor models', 0.5944709777832031), ('factor analysis', 0.4926369786262512), ('matrix factor', 0.48232969641685486), ('decomposition factor', 0.4792507290840149), ('principal components analysis', 0.476398229598999), ('principal component analysis', 0.4733233153820038), ('latent factors', 0.4731725752353668), ('factors factor', 0.4594159424304962), ('high dimensional factor', 0.45731741189956665), ('component analysis pca', 0.443287193775177)]" 653,653,47,653_greedy basis_weak greedy_greedy algorithms_greedy approximation,"['greedy basis', 'weak greedy', 'greedy algorithms', 'greedy approximation', 'greedy type', 'variants greedy', 'greedy', 'chebyshev greedy', 'bases quasi', 'bases banach spaces']","['Weak weight-semi-greedy Markushevich bases We introduce and study the notion of weak weight-semi-greedy Markushevich\nbases - which extends the concepts of weight semi-greedy and weak semi-greedy\nMarkushevich bases. In particular, we study conditions under which such bases\nare weight almost greedy. We also define the notion of weak weight almost\ngreedy bases, and prove that this formally weaker concept is equivalent to that\nconcept of weight almost greedy bases. Finally, we study some parameters\ninvolving the weak thresholding and Chebyshevian greedy algorithms.\n', 'Performance of the Thresholding Greedy Algorithm with Larger Greedy Sums The goal of this paper is to study the performance of the Thresholding Greedy\nAlgorithm (TGA) when we increase the size of greedy sums by a constant factor\n$\\lambda\\geqslant 1$. We introduce the so-called $\\lambda$-almost greedy and\n$\\lambda$-partially greedy bases. The case when $\\lambda = 1$ gives us the\nclassical definitions of almost greedy and (strong) partially greedy bases. We\nshow that a basis is almost greedy if and only if it is $\\lambda$-almost greedy\nfor all (some) $\\lambda \\geqslant 1$. However, for each $\\lambda > 1$, there\nexists an unconditional basis that is $\\lambda$-partially greedy but is not\n$1$-partially greedy. Furthermore, we investigate and give examples when a\nbasis is\n 1. not almost greedy with constant $1$ but is $\\lambda$-almost greedy with\nconstant $1$ for some $\\lambda > 1$, and\n 2. not strong partially greedy with constant $1$ but is $\\lambda$-partially\ngreedy with constant $1$ for some $\\lambda > 1$.\n Finally, we prove various characterizations of different greedy-type bases.\n', 'Bidemocratic bases and their connections with other greedy-type bases In nonlinear greedy approximation theory, bidemocratic bases have\ntraditionally played the role of dualizing democratic, greedy, quasi-greedy, or\nalmost greedy bases. In this article we shift the viewpoint and study them for\ntheir own sake, just as we would with any other kind of greedy-type bases. In\nparticular we show that bidemocratic bases need not be quasi-greedy, despite\nthe fact that they retain a strong unconditionality flavor which brings them\nvery close to being quasi-greedy. Our constructive approach gives that for each\n$1 0$, or let $m_i=1$ if there are no such matrices. We prove\nthat the joint spectral radius $\\rho(\\Sigma)$ is bounded by \\[\n \\max_i \\sqrt[m_i]{\\max_{A_1,\\dots,A_{m_i}\\in\\Sigma} (A_1\\dots A_{m_i})_{i,i}}\n\\le \\rho(\\Sigma) \\le \\max_i \\sqrt[m_i]{\\left(\\frac{UD}{V}\\right)^{3D^2}\n\\max_{A_1,\\dots,A_{m_i}\\in\\Sigma} (A_1\\dots A_{m_i})_{i,i}}. \\]\n', ""On the joint spectral radius of nonnegative matrices We give an effective bound of the joint spectral radius $\\rho(\\Sigma)$ for a\nfinite set $\\Sigma$ of nonnegative matrices: For every $n$,\n \\[\n \\sqrt[n]{\\left(\\frac{V}{UD}\\right)^{D} \\max_C \\max_{i,j\\in C}\n\\max_{A_1,\\dots,A_n\\in\\Sigma}(A_1\\dots A_n)_{i,j}} \\le \\rho(\\Sigma)\n \\le \\sqrt[n]{D \\max_C \\max_{i,j\\in C} \\max_{A_1,\\dots,A_n\\in\\Sigma}(A_1\\dots\nA_n)_{i,j}},\n \\] where $D\\times D$ is the dimension of the matrices, $U,V$ are respectively\nthe largest entry and the smallest entry over all the positive entries of the\nmatrices in $\\Sigma$, and $C$ is taken over all strongly connected components\nin the dependency graph. The dependency graph is a directed graph where the\nvertices are the dimensions and there is an edge from $i$ to $j$ if and only if\n$A_{i,j}\\ne 0$ for some matrix $A\\in\\Sigma$.\n Furthermore, a bound on the norm is also given: If $\\rho(\\Sigma)>0$ then\nthere exist a nonnegative integer $r$ and two positive numbers $\\alpha,\\beta$\nso that for every $n$,\n \\[\n \\alpha n^r{\\rho(\\Sigma)}^n \\le \\max_{A_1,\\dots,A_n\\in\\Sigma} \\|A_1\\dots A_n\\|\n\\le \\beta n^r{\\rho(\\Sigma)}^n.\n \\]\n Corollaries of the approach include a simple proof for the joint spectral\ntheorem for finite sets of nonnegative matrices and the convergence rate of\nsome sequences. The method in use is mostly based on Fekete's lemma, for both\nsubmultiplicative and supermultiplicative sequences.\n""]","[('totally nonnegative matrices', 0.6510918736457825), ('nonnegative matrices', 0.630473792552948), ('matrices max', 0.5688862800598145), ('nonnegative matrix', 0.5662618279457092), ('positive semidefinite matrices', 0.5654721856117249), ('hadamard product matrices', 0.49042069911956787), ('largest eigenvalue matrix', 0.4834378957748413), ('joint spectral radius', 0.4725141227245331), ('spectral radius', 0.46222877502441406), ('semidefinite matrices', 0.45765089988708496)]" 669,669,46,669_spanning trees graphs_disjoint spanning trees_trees spanning_spanning trees,"['spanning trees graphs', 'disjoint spanning trees', 'trees spanning', 'spanning trees', 'spanning trees graph', 'number spanning trees', 'graph spanning tree', 'spanning tree graph', 'spanning tree', 'trees graphs']","['Spectral conditions for spanning $k$-trees or $k$-ended-trees of graphs Let $G$ be a connected graph of order $n$. a spanning $k$-tree of $G$ is a\nspanning tree with the maximum degree at most $k$ and a spanning $k$-ended-tree\nof $G$ is a spanning tree with at most $k$ leaves, where $k\\geq2$ is an\ninteger. In this paper, we prove some tight spectral conditions for the\nexistence of a spanning $k$-tree in $t$-connected graphs. Some of our results\ngeneralize the result of Fan, Goryainov, Huang and Lin (2022) and improve the\nspectral condition for a Hamilton path of Fiedler and Nikiforov (2010). For\nwhether $t$-connected graphs contain a spanning $k$-ended-tree, we present two\nspectral conditions which are improvements of the results of Ao, Liu and Yuan\n(2023).\n', ""Fan's condition for completely independent spanning trees Spanning trees $T_1,T_2, \\dots,T_k$ of $G$ are $k$ completely independent\nspanning trees if, for any two vertices $u,v\\in V(G)$, the paths from $u$ to\n$v$ in these $k$ trees are pairwise edge-disjoint and internal vertex-disjoint.\nHasunuma proved that determining whether a graph contains $k$ completely\nindependent spanning trees is NP-complete, even for $k = 2$. Araki posed the\nquestion of whether certain known sufficient conditions for hamiltonian cycles\nare also also guarantee two completely independent spanning trees? In this\npaper, we affirmatively answer this question for the Fan-type condition.\nPrecisely, we proved that if $G$ is a connected graph such that each pair of\nvertices at distance 2 has degree sum at least $|V(G)|$, then $G$ has two\ncompletely independent spanning trees.\n"", 'Completely Independent Spanning Trees in Line Graphs Completely independent spanning trees in a graph $G$ are spanning trees of\n$G$ such that for any two distinct vertices of $G$, the paths between them in\nthe spanning trees are pairwise edge-disjoint and internally vertex-disjoint.\nIn this paper, we present a tight lower bound on the maximum number of\ncompletely independent spanning trees in $L(G)$, where $L(G)$ denotes the line\ngraph of a graph $G$. Based on a new characterization of a graph with $k$\ncompletely independent spanning trees, we also show that for any complete graph\n$K_n$ of order $n \\geq 4$, there are $\\lfloor \\frac{n+1}{2} \\rfloor$ completely\nindependent spanning trees in $L(K_n)$ where the number $\\lfloor \\frac{n+1}{2}\n\\rfloor$ is optimal, such that $\\lfloor \\frac{n+1}{2} \\rfloor$ completely\nindependent spanning trees still exist in the graph obtained from $L(K_n)$ by\ndeleting any vertex (respectively, any induced path of order at most\n$\\frac{n}{2}$) for $n = 4$ or odd $n \\geq 5$ (respectively, even $n \\geq 6$).\nConcerning the connectivity and the number of completely independent spanning\ntrees, we moreover show the following, where $\\delta(G)$ denotes the minimum\ndegree of $G$. $\\ $ $\\bullet$ Every $2k$-connected line graph $L(G)$ has $k$\ncompletely independent spanning trees if $G$ is not super edge-connected or\n$\\delta(G) \\geq 2k$. $\\ $ $\\bullet$ Every $(4k-2)$-connected line graph $L(G)$\nhas $k$ completely independent spanning trees if $G$ is regular. $\\ $ $\\bullet$\nEvery $(k^2+2k-1)$-connected line graph $L(G)$ with $\\delta(G) \\geq k+1$ has\n$k$ completely independent spanning trees.\n']","[('spanning trees graphs', 0.6725278496742249), ('disjoint spanning trees', 0.6711954474449158), ('trees spanning', 0.6540799736976624), ('spanning trees', 0.6407349705696106), ('spanning trees graph', 0.6203998327255249), ('number spanning trees', 0.6183883547782898), ('graph spanning tree', 0.5963211059570312), ('spanning tree graph', 0.5842069983482361), ('spanning tree', 0.5718297362327576), ('trees graphs', 0.5562441349029541)]" 670,670,46,670_domino tilings_polygonal domains_limit shapes_tilings,"['domino tilings', 'polygonal domains', 'limit shapes', 'tilings', 'lozenge tilings', 'lattice paths', 'limit shape', 'aztec diamond', 'dominoes', 'shapes']","['Fluctuations of the Arctic curve in the tilings of the Aztec diamond on\n restricted domains We consider uniform random domino tilings of the restricted Aztec diamond\nwhich is obtained by cutting off an upper triangular part of the Aztec diamond\nby a horizontal line. The restriction line asymptotically touches the arctic\ncircle that is the limit shape of the north polar region in the unrestricted\nmodel. We prove that the rescaled boundary of the north polar region in the\nrestricted domain converges to the Airy$_2$ process conditioned to stay below a\nparabola with explicit continuous statistics and the finite dimensional\ndistribution kernels. The limit is the hard-edge tacnode process which was\nfirst discovered in the framework of non-intersecting Brownian bridges. The\nproof relies on a random walk representation of the correlation kernel of the\nnon-intersecting line ensemble which corresponds to a random tiling.\n', ""Domino tilings of the Aztec diamond with doubly periodic weightings In this paper we consider domino tilings of the Aztec diamond with doubly\nperiodic weightings. In particular a family of models which, for any $ k \\in\n\\mathbb{N} $, includes models with $ k $ smooth regions is analyzed as the size\nof the Aztec diamond tends to infinity. We use a non-intersecting paths\nformulation and give a double integral formula for the correlation kernel of\nthe Aztec diamond of finite size. By a classical steepest descent analysis of\nthe correlation kernel we obtain the local behavior in the smooth and rough\nregions as the size of the Aztec diamond tends to infinity. From the mentioned\nlimit the macroscopic picture such as the arctic curves and in particular the\nnumber of smooth regions is deduced. Moreover we compute the limit of the\nheight function and as a consequence we confirm, in the setting of this paper,\nthat the limit in the rough region fulfills the complex Burgers' equation, as\nstated by Kenyon and Okounkov.\n"", ""Boundary dents, the arctic circle and the arctic ellipse The original motivation for this paper goes back to the mid-1990's, when\nJames Propp was interested in natural situations when the number of domino\ntilings of a region increases if some of its unit squares are deleted. Guided\nin part by the intuition one gets from earlier work on parallels between the\nnumber of tilings of a region with holes and the 2D Coulomb energy of the\ncorresponding system of electric charges, we consider Aztec diamond regions\nwith unit square defects along two adjacent sides. We show that for large\nregions, if these defects are at fixed distances from a corner, the ratio\nbetween the number of domino tilings of the Aztec diamond with defects and the\nnumber of tilings of the entire Aztec diamond approaches a Delannoy number.\n When the locations of the defects are not fixed but instead approach given\npoints on the boundary of the scaling limit $S$ (a square) of the Aztec\ndiamonds, we prove that, provided the line segment connecting these points is\noutside the circle inscribed in $S$, this ratio has the same asymptotics as the\nDelannoy number corresponding to the locations of the defects; if the segment\ncrosses the circle, the asymptotics is radically different. We use this to\ndeduce (under the assumption that an arctic curve exists) that the arctic curve\nfor domino tilings of Aztec diamonds is the circle inscribed in $S$. We also\ndiscuss counterparts of this phenomenon for lozenge tilings of hexagons.\n""]","[('domino tilings', 0.5201013684272766), ('polygonal domains', 0.4523870050907135), ('limit shapes', 0.43485257029533386), ('tilings', 0.4267529845237732), ('lozenge tilings', 0.40705642104148865), ('lattice paths', 0.3934832811355591), ('limit shape', 0.3914043605327606), ('aztec diamond', 0.39038532972335815), ('dominoes', 0.370918333530426), ('shapes', 0.37035173177719116)]" 671,671,46,671_dimensional coulomb gases_2d coulomb gas_coulomb gases_two dimensional coulomb,"['dimensional coulomb gases', '2d coulomb gas', 'coulomb gases', 'two dimensional coulomb', 'coulomb gas', '2d coulomb', 'dimensional coulomb', 'coulomb', 'gas particles', 'fluctuations linear']","['Two-Dimensional Coulomb Gas on an Elliptic Annulus It is well-known that two-dimensional Coulomb gases at a special inverse\ntemperature $\\beta = 2$ can be analyzed by using the orthogonal polynomial\nmethod borrowed from the theory of random matrices. In this paper, such Coulomb\ngas molecules are studied when they are distributed on an elliptic annulus, and\nthe asymptotic forms of the molecule correlation functions in the thermodynamic\nlimit are evaluated. For that purpose, two-dimensional orthogonality relations\nof the Chebyshev polynomials on an elliptic annulus are utilized.\n', 'The two-dimensional Coulomb plasma: quasi-free approximation and central\n limit theorem For the two-dimensional one-component Coulomb plasma, we derive an asymptotic\nexpansion of the free energy up to order $N$, the number of particles of the\ngas, with an effective error bound $N^{1-\\kappa}$ for some constant $\\kappa >\n0$. This expansion is based on approximating the Coulomb gas by a quasi-free\nYukawa gas. Further, we prove that the fluctuations of the linear statistics\nare given by a Gaussian free field at any positive temperature. Our proof of\nthis central limit theorem uses a loop equation for the Coulomb gas, the free\nenergy asymptotics, and rigidity bounds on the local density fluctuations of\nthe Coulomb gas, which we obtained in a previous paper.\n', 'Non-rigidity Properties of the Coulomb Gas We prove existence of infinite volume $d$-dimensional Coulomb gases which are\nnot number rigid for $d \\geq 3$. This makes the Coulomb gas the Gibbs point\nprocess with the longest range pairwise interaction (i.e.\\ with the smallest\n$s$ in the interaction kernel $g(x) = |x|^{-s}$) for which number non-rigidity\nhas been proved in $d \\geq 3$. We rule out properties stronger than number\nrigidity for the two-dimensional Coulomb gas.\n']","[('dimensional coulomb gases', 0.6818965077400208), ('2d coulomb gas', 0.633505642414093), ('coulomb gases', 0.6008849143981934), ('two dimensional coulomb', 0.5432865619659424), ('coulomb gas', 0.5276135802268982), ('2d coulomb', 0.5086796283721924), ('dimensional coulomb', 0.5066767930984497), ('coulomb', 0.3974767029285431), ('gas particles', 0.37467896938323975), ('fluctuations linear', 0.34853002429008484)]" 672,672,46,672_ordinals_ordinal_reflection principles_transfinite induction,"['ordinals', 'ordinal', 'reflection principles', 'transfinite induction', 'linear orders', 'theoretic', 'order type', 'well ordering', 'consistency strength', 'base theory']","[""The Order of Reflection Extending Aanderaa's classical result that $\\pi^1_1<\\sigma^1_1$, we determine\nthe order between any two patterns of iterated $\\Sigma^1_1$- and\n$\\Pi^1_1$-reflection. We show that this \\emph{linear reflection order} is a\nprewellordering of length $\\omega^\\omega$. This requires considering the\nrelationship between linear and some \\emph{non-linear} reflection patterns,\nsuch as $\\sigma^1_1\\wedge\\pi^1_1$, the pattern of simultaneous $\\Sigma^1_1$-\nand $\\Pi^1_1$-reflection.\n"", 'A characterization of ordinal analysis Ordinal analysis induces a partition of $\\Sigma^1_1$-definable and\n$\\Pi^1_1$-sound theories whereby two theories are equivalent if they have the\nsame proof-theoretic ordinal. We show that no equivalence relation $\\equiv$ is\nfiner than the ordinal analysis partition if both: (1) $T\\equiv U$ whenever $T$\nand $U$ prove the same $\\Pi^1_1$ sentences; (2) $T\\equiv T+U$ for every set $U$\nof true $\\Sigma^1_1$ sentences. In fact, no such equivalence relation makes a\nsingle distinction that the ordinal analysis partition does not make.\n', 'Reflection ranks and ordinal analysis It is well-known that natural axiomatic theories are well-ordered by\nconsistency strength. However, it is possible to construct descending chains of\nartificial theories with respect to consistency strength. We provide an\nexplanation of this well-orderness phenomenon by studying a coarsening of the\nconsistency strength order, namely, the $\\Pi^1_1$ reflection strength order. We\nprove that there are no descending sequences of $\\Pi^1_1$ sound extensions of\n$\\mathsf{ACA}_0$ in this order. Accordingly, we can attach a rank in this\norder, which we call reflection rank, to any $\\Pi^1_1$ sound extension of\n$\\mathsf{ACA}_0$. We prove that for any $\\Pi^1_1$ sound theory $T$ extending\n$\\mathsf{ACA}_0^+$, the reflection rank of $T$ equals the proof-theoretic\nordinal of $T$. We also prove that the proof-theoretic ordinal of $\\alpha$\niterated $\\Pi^1_1$ reflection is $\\varepsilon_\\alpha$. Finally, we use our\nresults to provide straightforward well-foundedness proofs of ordinal notation\nsystems based on reflection principles.\n']","[('ordinals', 0.5226213335990906), ('ordinal', 0.4730663299560547), ('reflection principles', 0.4057880938053131), ('transfinite induction', 0.40332359075546265), ('linear orders', 0.35559695959091187), ('theoretic', 0.33820316195487976), ('order type', 0.3327895998954773), ('well ordering', 0.32798832654953003), ('consistency strength', 0.3257976472377777), ('base theory', 0.3227144479751587)]" 673,673,46,673_equivariant homotopy theory_equivariant stable homotopy_equivariant homotopy_equivariant stable,"['equivariant homotopy theory', 'equivariant stable homotopy', 'equivariant homotopy', 'equivariant stable', 'equivariant cohomology', 'stable homotopy theory', 'equivariant algebraic', 'genuine equivariant', 'equivariant', 'categories twisted']","['Twisted ambidexterity in equivariant homotopy theory We develop the concept of twisted ambidexterity in a parametrized presentably\nsymmetric monoidal $\\infty$-category, which generalizes the notion of\nambidexterity by Hopkins and Lurie and the Wirthm\\""uller isomorphisms in\nequivariant stable homotopy theory, and is closely related to Costenoble-Waner\nduality. Our main result establishes the parametrized $\\infty$-category of\ngenuine $G$-spectra for a compact Lie group $G$ as the universal example of a\npresentably symmetric monoidal $\\infty$-category parametrized over $G$-spaces\nwhich is both stable and satisfies twisted ambidexterity for compact\n$G$-spaces. We further extend this result to the settings of orbispectra and\nproper genuine $G$-spectra for a Lie group $G$ which is not necessarily\ncompact.\n', 'The Adams isomorphism revisited We establish abstract Adams isomorphisms in an arbitrary equivariantly\npresentable equivariantly semiadditive global category. This encompasses the\nwell-known Adams isomorphism in equivariant stable homotopy theory, and applies\nmore generally in the settings of $G$-Mackey functors, $G$-global homotopy\ntheory, and equivariant Kasparov categories.\n', 'Proper equivariant stable homotopy theory This monograph introduces a framework for genuine proper equivariant stable\nhomotopy theory for Lie groups. The adjective `proper\' alludes to the feature\nthat equivalences are tested on compact subgroups, and that the objects are\nbuilt from equivariant cells with compact isotropy groups; the adjective\n`genuine\' indicates that the theory comes with appropriate transfers and\nWirthm\\""uller isomorphisms, and the resulting equivariant cohomology theories\nsupport the analog of an $RO(G)$-grading.\n Our model for genuine proper $G$-equivariant stable homotopy theory is the\ncategory of orthogonal $G$-spectra; the equivalences are those morphisms that\ninduce isomorphisms of equivariant stable homotopy groups for all compact\nsubgroups of $G$. This class of $\\pi_*$-isomorphisms is part of a symmetric\nmonoidal stable model structure and the associated tensor triangulated homotopy\ncategory is compactly generated. Every orthogonal $G$-spectrum represents an\nequivariant cohomology theory on the category of $G$-spaces, depending only on\nthe `proper $G$-homotopy type\', tested by fixed points under all compact\nsubgroups.\n An important special case are infinite discrete groups. For these, our\ngenuine equivariant theory is related to finiteness properties, in the sense of\ngeometric group theory; for example, the $G$-sphere spectrum is a compact\nobject in the equivariant homotopy category if the universal space for proper\n$G$-actions has a finite $G$-CW-model. For discrete groups, the represented\nequivariant cohomology theories on finite proper $G$-CW-complexes admit a more\nexplicit description in terms of parameterized equivariant homotopy theory,\nsuitably stabilized by $G$-vector bundles. Via this description, we can\nidentify the previously defined $G$-cohomology theories of equivariant stable\ncohomotopy and equivariant K-theory as cohomology theories represented by\nspecific orthogonal $G$-spectra.\n']","[('equivariant homotopy theory', 0.6713151335716248), ('equivariant stable homotopy', 0.6552557349205017), ('equivariant homotopy', 0.5968698859214783), ('equivariant stable', 0.5821713209152222), ('equivariant cohomology', 0.5689070820808411), ('stable homotopy theory', 0.5538592338562012), ('equivariant algebraic', 0.5185088515281677), ('genuine equivariant', 0.49710813164711), ('equivariant', 0.4875231981277466), ('categories twisted', 0.48527204990386963)]" 674,674,46,674_ultradifferentiable functions_ultradifferentiable_weighted spaces_gelfand shilov spaces,"['ultradifferentiable functions', 'ultradifferentiable', 'weighted spaces', 'gelfand shilov spaces', 'spaces weighted', 'weight functions', 'weight matrices', 'weight functions omega', 'ultradistributions', 'shilov spaces']","['Equality of ultradifferentiable classes by means of indices of mixed\n O-regular variation We characterize the equality between ultradifferentiable function classes\ndefined in terms of abstractly given weight matrices and in terms of the\ncorresponding matrix of associated weight functions by using new growth\nindices. These indices, defined by means of weight sequences and (associated)\nweight functions, are extending the notion of O-regular variation to a mixed\nsetting. Hence we are extending the known comparison results concerning classes\ndefined in terms of a single weight sequence and of a single weight function\nand give also these statements an interpretation expressed in O-regular\nvariation.\n', ""On the projective description of spaces of ultradifferentiable functions\n of Roumieu type We provide a projective description of the space\n$\\mathcal{E}^{\\{\\mathfrak{M}\\}}(\\Omega)$ of ultradifferentiable functions of\nRoumieu type, where $\\Omega$ is an arbitrary open set in $\\mathbb{R}^d$ and\n$\\mathfrak{M}$ is a weight matrix satisfying the analogue of Komatsu's\ncondition $(M.2)'$. In particular, we obtain in a unified way projective\ndescriptions of ultradifferentiable classes defined via a single weight\nsequence (Denjoy-Carleman approach) and via a weight function\n(Braun-Meise-Taylor approach) under considerably weaker assumptions than in\nearlier versions of these results.\n"", 'On generalized definitions of ultradifferentiable classes We show that the ultradifferentiable-like classes of smooth functions\nintroduced and studied by S. Pilipovi\\\'c, N. Teofanov and F. Tomi\\\'c are\nspecial cases of the general framework of spaces of ultradifferentiable\nfunctions defined in terms of weight matrices in the sense of A. Rainer and the\nthird author. We study classes ""beyond geometric growth factors"" defined in\nterms of a weight sequence and an exponent sequence, prove that these new types\nadmit a weight matrix representation and transfer known results from the\nmatrix-type to such a non-standard ultradifferentiable setting.\n']","[('ultradifferentiable functions', 0.6510055661201477), ('ultradifferentiable', 0.5697295069694519), ('weighted spaces', 0.4668366611003876), ('gelfand shilov spaces', 0.41453787684440613), ('spaces weighted', 0.40318599343299866), ('weight functions', 0.40149012207984924), ('weight matrices', 0.37983012199401855), ('weight functions omega', 0.3728023171424866), ('ultradistributions', 0.37005814909935), ('shilov spaces', 0.3489963710308075)]" 675,675,46,675_sequences arbitrary_sequences various_binary alphabets_sequences well,"['sequences arbitrary', 'sequences various', 'binary alphabets', 'sequences well', 'sequences', 'sequences can', 'bruijn', 'finite alphabet', 'binary strings', 'de bruijn']","['To Infinity and Beyond: Continuing De Bruijn Sequences by Extending the\n Alphabet This article presents proof that the reverse of the Prefer Max De Bruijn\nsequence can be expanded into an infinite De Bruijn sequence by increasing the\nsize of the alphabet. Furthermore, we show that every De Bruijn sequence\npossessing this characteristic exhibits behavior similar to that of the reverse\nof the Prefer Max De Bruijn sequence.\n', 'Generalized Orthogonal de Bruijn and Kautz Sequences A de Bruijn sequence of order $k$ over a finite alphabet is a cyclic sequence\nwith the property that it contains every possible $k$-sequence as a substring\nexactly once. Orthogonal de Bruijn sequences are collections of de Bruijn\nsequences of the same order, $k$, satisfying the joint constraint that every\n$(k+1)$-sequence appears as a substring in at most one of the sequences in the\ncollection. Both de Bruijn and orthogonal de Bruijn sequences have found\nnumerous applications in synthetic biology, although the latter remain largely\nunexplored in the coding theory literature. Here we study three relevant\npractical generalizations of orthogonal de Bruijn sequences where we relax\neither the constraint that every $(k+1)$-sequence appears exactly once, or that\nthe sequences themselves are de Bruijn rather than balanced de Bruijn\nsequences. We also provide lower and upper bounds on the number of fixed-weight\northogonal de Bruijn sequences. The paper concludes with parallel results for\northogonal nonbinary Kautz sequences, which satisfy similar constraints as de\nBruijn sequences except for only being required to cover all subsequences of\nlength $k$ whose maximum runlength equals to one.\n', ""Using alternating de Bruijn sequences to construct de Bruijn tori A de Bruijn torus is the two dimensional generalization of a de Bruijn\nsequence. While some methods exist to generate these tori, only a few methods\nof construction are known. We present a novel method to generate de Bruijn tori\nwith rectangular windows by combining two variants de Bruijn sequences called\n`Alternating de Bruijn sequences' and `De Bruijn families'.\n""]","[('sequences arbitrary', 0.5277830362319946), ('sequences various', 0.5040925145149231), ('binary alphabets', 0.4802943170070648), ('sequences well', 0.45780467987060547), ('sequences', 0.4460950791835785), ('sequences can', 0.4451020061969757), ('bruijn', 0.43534377217292786), ('finite alphabet', 0.42908141016960144), ('binary strings', 0.4246056377887726), ('de bruijn', 0.42257237434387207)]" 676,676,46,676_knowledge graph_knowledge graphs_knowledge structure_graph embedding,"['knowledge graph', 'knowledge graphs', 'knowledge structure', 'graph embedding', 'knowledge', 'digital transformation', 'entities', 'semantic', 'embedding', 'ontologies']","[""Knowledge Sheaves: A Sheaf-Theoretic Framework for Knowledge Graph\n Embedding Knowledge graph embedding involves learning representations of entities --\nthe vertices of the graph -- and relations -- the edges of the graph -- such\nthat the resulting representations encode the known factual information\nrepresented by the knowledge graph and can be used in the inference of new\nrelations. We show that knowledge graph embedding is naturally expressed in the\ntopological and categorical language of \\textit{cellular sheaves}: a knowledge\ngraph embedding can be described as an approximate global section of an\nappropriate \\textit{knowledge sheaf} over the graph, with consistency\nconstraints induced by the knowledge graph's schema. This approach provides a\ngeneralized framework for reasoning about knowledge graph embedding models and\nallows for the expression of a wide range of prior constraints on embeddings.\nFurther, the resulting embeddings can be easily adapted for reasoning over\ncomposite relations without special training. We implement these ideas to\nhighlight the benefits of the extensions inspired by this new perspective.\n"", 'Representation-Enhanced Neural Knowledge Integration with Application to\n Large-Scale Medical Ontology Learning A large-scale knowledge graph enhances reproducibility in biomedical data\ndiscovery by providing a standardized, integrated framework that ensures\nconsistent interpretation across diverse datasets. It improves generalizability\nby connecting data from various sources, enabling broader applicability of\nfindings across different populations and conditions. Generating reliable\nknowledge graph, leveraging multi-source information from existing literature,\nhowever, is challenging especially with a large number of node sizes and\nheterogeneous relations. In this paper, we propose a general theoretically\nguaranteed statistical framework, called RENKI, to enable simultaneous learning\nof multiple relation types. RENKI generalizes various network models widely\nused in statistics and computer science. The proposed framework incorporates\nrepresentation learning output into initial entity embedding of a neural\nnetwork that approximates the score function for the knowledge graph and\ncontinuously trains the model to fit observed facts. We prove nonasymptotic\nbounds for in-sample and out-of-sample weighted MSEs in relation to the\npseudo-dimension of the knowledge graph function class. Additionally, we\nprovide pseudo-dimensions for score functions based on multilayer neural\nnetworks with ReLU activation function, in the scenarios when the embedding\nparameters either fixed or trainable. Finally, we complement our theoretical\nresults with numerical studies and apply the method to learn a comprehensive\nmedical knowledge graph combining a pretrained language model representation\nwith knowledge graph links observed in several medical ontologies. The\nexperiments justify our theoretical findings and demonstrate the effect of\nweighting in the presence of heterogeneous relations and the benefit of\nincorporating representation learning in nonparametric models.\n', 'Exploring the Enablers of Digital Transformation in Small and\n Medium-Sized Enterprise Recently, digital transformation has caught much attention of both academics\nand practitioners. With the advent of digital technologies,\nsmall-and-medium-sized enterprises (SMEs) have obtained the capacity to\ninitiate digital transformation initiatives in a similar fashion to large-sized\norganizations. The innate characteristics of digital technologies also favor\nSMEs in promoting initiation of digital transformation. However, the process\ndigital transformation in SMEs remains a black box and the existing findings of\ndigital transformation in SMEs are limited and remain fragmented. Considering\nthe important contribution SMEs can offer to nations and economies; it is\ntimely and relevant to conduct a profound analysis on digital transformation in\nSMEs. By conducting a thorough review of existing related literature in\nmanagement, information systems, and business disciplines, this book chapter\naims to understand both internal and external enablers of the digital\ntransformation in SMEs.\n']","[('knowledge graph', 0.5521101355552673), ('knowledge graphs', 0.544510543346405), ('knowledge structure', 0.47052285075187683), ('graph embedding', 0.4194835126399994), ('knowledge', 0.37838512659072876), ('digital transformation', 0.3639223575592041), ('entities', 0.3392196595668793), ('semantic', 0.32359397411346436), ('embedding', 0.31296077370643616), ('ontologies', 0.31196537613868713)]" 677,677,46,677_sobolev spaces_sobolev space_order sobolev spaces_sobolev mappings,"['sobolev spaces', 'sobolev space', 'order sobolev spaces', 'sobolev mappings', 'sobolev functions', 'metric measure spaces', 'spaces metric measure', 'functions sobolev', 'measure spaces', 'sobolev']","[""Capacitary density and removable sets for Newton-Sobolev functions in\n metric spaces In a complete metric space equipped with a doubling measure and supporting a\n$(1,1)$-Poincar\\'e inequality, we show that every set satisfying a suitable\ncapacitary density condition is removable for Newton-Sobolev functions.\n"", ""Characterizations of Sobolev functions via Besov-type energy functionals\n in fractals In the spirit of the ground-breaking result of Bourgain--Brezis--Mironescu,\nwe establish some characterizations of Sobolev functions in metric measure\nspaces including fractals like the Vicsek set, the Sierpi\\'{n}ski gasket and\nthe Sierpi\\'{n}ski carpet. As corollaries of our characterizations, we present\nequivalent norms on the Korevaar--Schoen--Sobolev space, and show that the\ndomain of a $p$-energy form is identified with a Besov-type function space\nunder a suitable $(p,p)$-Poincar\\'e inequality, capacity upper bound and the\nvolume doubling property.\n"", ""Korevaar-Schoen-Sobolev spaces and critical exponents in metric measure\n spaces We present developments in the theory of Korevaar-Schoen-Sobolev spaces on\nmetric measure spaces. While this theory coincides with those of Cheeger and\nShanmugalingam if the space is doubling and satisfies a Poincar\\'e inequality,\nit offers new perspectives in the context of fractals for which the approach by\nweak upper gradients is inadequate.\n""]","[('sobolev spaces', 0.6500704288482666), ('sobolev space', 0.6323177218437195), ('order sobolev spaces', 0.5821227431297302), ('sobolev mappings', 0.5393475294113159), ('sobolev functions', 0.5092771053314209), ('metric measure spaces', 0.4995458722114563), ('spaces metric measure', 0.49579089879989624), ('functions sobolev', 0.4951194226741791), ('measure spaces', 0.49142980575561523), ('sobolev', 0.47453442215919495)]" 678,678,46,678_extremum seeking_global minimiser_real time optimization_optimal point,"['extremum seeking', 'global minimiser', 'real time optimization', 'optimal point', 'time optimization', 'convergence optimum', 'extremum', 'local extrema', 'optimum', 'vector control']","['Extremum Seeking with Intermittent Measurements: A Lie-brackets Approach Extremum seeking systems are powerful methods able to steer the input of a\n(dynamical) cost function towards an optimizer, without any prior knowledge of\nthe cost function. To achieve their objective, they typically combine\ntime-periodic signals with the on-line measurement of the cost. However, in\nsome practical applications, the cost can only be measured during some regular\ntime-intervals, and not continuously, contravening the classical extremum\nseeking framework. In this paper, we first analyze how existing Lie-bracket\nbased extremum seeking systems behave when being fed with intermittent\nmeasurements, instead of continuous ones. We then propose two modifications of\nthose schemes to improve both the convergence time and the steady-state\naccuracy in presence of intermittent measurements. The performances of the\ndifferent schemes are compared on a case study.\n', 'Extremum Seeking for Stefan PDE with Moving Boundary This paper presents the design and analysis of the extremum seeking for\nstatic maps with input passed through a partial differential equation (PDE) of\nthe diffusion type defined on a time-varying spatial domain whose boundary\nposition is governed by an ordinary differential equation (ODE). This is the\nfirst effort to pursue an extension of extremum seeking from the heat PDE to\nthe Stefan PDE. We compensate the average-based actuation dynamics by a\ncontroller via backstepping transformation for the moving boundary, which is\nutilized to transform the original coupled PDE-ODE into a target system whose\nexponential stability of the average equilibrium of the average system is\nproved. The discussion for the delay-compensated extremum seeking control of\nthe Stefan problem is also presented and illustrated with numerical\nsimulations.\n', 'Extremum Seeking with High-Order Lie Bracket Approximations: Achieving\n Exponential Decay Rate This paper focuses on the further development of the Lie bracket\napproximation approach for extremum seeking systems. Classical results in this\narea provide extremum seeking algorithms with exponential convergence rates for\nquadratic-like cost functions, and polynomial decay rates for cost functions of\nhigher degrees. This paper proposes a novel control design approach that\nensures the motion of the extremum seeking system along directions associated\nwith higher-order Lie brackets, thereby ensuring exponential convergence for\ncost functions that are polynomial-like but with degree greater than two.\n']","[('extremum seeking', 0.6340025067329407), ('global minimiser', 0.5283120274543762), ('real time optimization', 0.4873504936695099), ('optimal point', 0.4580681622028351), ('time optimization', 0.44141092896461487), ('convergence optimum', 0.4265473484992981), ('extremum', 0.3648635149002075), ('local extrema', 0.3552035391330719), ('optimum', 0.35024601221084595), ('vector control', 0.35014981031417847)]" 679,679,46,679_metastable states_spin models_metastable behavior_curie weiss,"['metastable states', 'spin models', 'metastable behavior', 'curie weiss', 'metastability', 'phase transition', 'field spin', 'mean field spin', 'spins', 'glauber dynamics']","['Critical Regime in a Curie-Weiss Model with two Groups and Heterogeneous\n Coupling We discuss a Curie-Weiss model with two groups in the critical regime. This\nis the region where the central limit theorem does not hold any more but the\nmean magnetization still goes to zero as the number of spins grows. We show\nthat the total magnetization normalized by $N^{3/4}$ converges to a non-trivial\ndistribution which is not Gaussian, just as in the single-group Curie-Weiss\nmodel.\n', 'Energy Landscape and Metastability of Curie-Weis-Potts Model In this paper, we thoroughly analyze the energy landscape of the\nCurie-Weiss-Potts model, which is a ferromagnetic spin system consisting of q\n$\\ge$ 3 spins defined on complete graphs. In particular, for the\nCurie-Weiss-Potts model with q $\\ge$ 3 spins and zero external field, we\ncompletely characterize all critical temperatures and phase transitions in view\nof the global structure of the energy landscape. We observe that there are\nthree critical temperatures and four different regimes for q < 5, whereas there\nare four critical temperatures and five different regimes for q $\\ge$ 5. Our\nanalysis extends the investigations performed in [M. Costeniuc, R. S. Ellis, H.\nTouchette: J. Math. Phys (2005)]; they provide the precise characterization of\nthe second critical temperatures for all q $\\ge$ 3 and in [Landim and Seo: J.\nStat. Phys. (2016)], which provides a complete analysis of the energy landscape\nfor q = 3. Based on our precise analysis of the energy landscape, we also\nperform a quantitative investigation of the metastable behavior of the\nheat-bath Glauber dynamics associated with the Curie-Weiss-Potts model.\n', 'Energy landscape of the two-component Curie-Weiss-Potts model with three\n spins In this paper, we investigate the energy landscape of the two-component spin\nsystems, known as the Curie-Weiss-Potts model, which is a generalization of the\nCurie-Weiss model consisting of $q\\ge3$ spins. In the energy landscape of a\nmulti-component model, the most important element is the relative strength\nbetween the inter-component interaction strength and the component-wise\ninteraction strength. If the inter-component interaction is stronger than the\ncomponent-wise interaction, we can expect all the components to be synchronized\nin the course of metastable transition. However, if the inter-component\ninteraction is relatively weaker, then the components will be desynchronized in\nthe course of metastable transition. For the two-component Curie-Weiss model,\nthe phase transition from synchronization to desynchronization has been\nprecisely characterized in studies owing to its mean-field nature. The purpose\nof this paper is to extend this result to the Curie-Weiss-Potts model with\nthree spins. We observe that the nature of the phase transition for the\nthree-spin case is entirely different from the two-spin case of the Curie-Weiss\nmodel, and the proof as well as the resulting phase diagram is fundamentally\ndifferent and exceedingly complicated.\n']","[('metastable states', 0.5133627653121948), ('spin models', 0.501051664352417), ('metastable behavior', 0.438105046749115), ('curie weiss', 0.41267672181129456), ('metastability', 0.4103182256221771), ('phase transition', 0.40998661518096924), ('field spin', 0.4018949568271637), ('mean field spin', 0.37668511271476746), ('spins', 0.37124577164649963), ('glauber dynamics', 0.3604836165904999)]" 680,680,46,680_cohomology groups_co homology groups_homology groups_equivariant homology,"['cohomology groups', 'co homology groups', 'homology groups', 'equivariant homology', 'lie group', 'connected lie group', 'cohomology', 'torsion homology', 'co homology', 'second homotopy group']","[""Spaces of commuting elements in the classical groups Let $G$ be the classical group, and let Hom$(\\mathbb{Z}^m,G)$ denote the\nspace of commuting $m$-tuples in $G$. First, we refine the formula for the\nPoincar\\'e series of Hom$(\\mathbb{Z}^m,G)$ due to Ramras and Stafa by assigning\n(signed) integer partitions to (signed) permutations. Using the refined\nformula, we determine the top term of the Poincar\\'e series, and apply it to\nprove the dependence of the topology of Hom$(\\mathbb{Z}^m,G)$ on the parity of\n$m$ and the rational hyperbolicity of Hom$(\\mathbb{Z}^m,G)$ for $m\\ge 2$. Next,\nwe give a minimal generating set of the cohomology of Hom$(\\mathbb{Z}^m,G)$ and\ndetermine the cohomology in low dimensions. We apply these results to prove\nhomological stability for Hom$(\\mathbb{Z}^m,G)$ with the best possible stable\nrange. Baird proved that the cohomology of Hom$(\\mathbb{Z}^m,G)$ is identified\nwith a certain ring of invariants of the Weyl group of $G$, and our approach is\na direct calculation of this ring of invariants.\n"", 'Torsion in the space of commuting elements in a Lie group Let $G$ be a compact connected Lie group, and let\n$\\mathrm{Hom}(\\mathbb{Z}^m,G)$ be the space of pairwise commuting $m$-tuples in\n$G$. We study the problem of which primes $p$ $\\mathrm{Hom}(\\mathbb{Z}^m,G)_1$,\nthe connected component of $\\mathrm{Hom}(\\mathbb{Z}^m,G)$ containing the\nelement $(1,\\ldots,1)$, has $p$-torsion in homology. We will prove that\n$\\mathrm{Hom}(\\mathbb{Z}^m,G)_1$ for $m\\ge 2$ has $p$-torsion in homology if\nand only if $p$ divides the order of the Weyl group of $G$ for $G=SU(n)$ and\nsome exceptional groups. We will also compute the top homology of\n$\\mathrm{Hom}(\\mathbb{Z}^m,G)_1$ and show that $\\mathrm{Hom}(\\mathbb{Z}^m,G)_1$\nalways has 2-torsion in homology whenever $G$ is simply-connected and simple.\nOur computation is based on a new homotopy decomposition of\n$\\mathrm{Hom}(\\mathbb{Z}^m,G)_1$, which is of independent interest and enables\nus to connect torsion in homology to the combinatorics of the Weyl group.\n', 'On the second homotopy group of spaces of commuting elements in Lie\n groups Let $G$ be a compact connected Lie group and $n\\geqslant 1$ an integer.\nConsider the space of ordered commuting $n$-tuples in $G$,\n$Hom(\\mathbb{Z}^n,G)$, and its quotient under the adjoint action,\n$Rep(\\mathbb{Z}^n,G):=Hom(\\mathbb{Z}^n,G)/G$. In this article we study and in\nmany cases compute the homotopy groups $\\pi_2(Hom(\\mathbb{Z}^n,G))$. For $G$\nsimply--connected and simple we show that $\\pi_2(Hom(\\mathbb{Z}^2,G))\\cong\n\\mathbb{Z}$ and $\\pi_2(Rep(\\mathbb{Z}^2,G))\\cong \\mathbb{Z}$, and that on these\ngroups the quotient map $Hom(\\mathbb{Z}^2,G)\\to Rep(\\mathbb{Z}^2,G)$ induces\nmultiplication by the Dynkin index of $G$. More generally we show that if $G$\nis simple and $Hom(\\mathbb{Z}^2,G)_{1}\\subseteq Hom(\\mathbb{Z}^2,G)$ is the\npath--component of the trivial homomorphism, then\n$H_2(Hom(\\mathbb{Z}^2,G)_{1};\\mathbb{Z})$ is an extension of the Schur\nmultiplier of $\\pi_1(G)^2$ by $\\mathbb{Z}$. We apply our computations to prove\nthat if $B_{com}G_{1}$ is the classifying space for commutativity at the\nidentity component, then $\\pi_4(B_{com}G_{1})\\cong \\mathbb{Z}\\oplus\n\\mathbb{Z}$, and we construct examples of non-trivial transitionally\ncommutative structures on the trivial principal $G$-bundle over the sphere\n$\\mathbb{S}^{4}$.\n']","[('cohomology groups', 0.58210688829422), ('co homology groups', 0.5480575561523438), ('homology groups', 0.5344223380088806), ('equivariant homology', 0.479054719209671), ('lie group', 0.4762938618659973), ('connected lie group', 0.4609653353691101), ('cohomology', 0.44665074348449707), ('torsion homology', 0.4388989806175232), ('co homology', 0.4356512725353241), ('second homotopy group', 0.4312891364097595)]" 681,681,46,681_lattice gauge theories_lattice gauge theory_lattice gauge_yang mills theory,"['lattice gauge theories', 'lattice gauge theory', 'lattice gauge', 'yang mills theory', 'gauge theories', 'yang mills theories', 'wilson loops', 'wilson loop', 'gauge theory', 'yang mills higgs']","['Wilson lines in the Abelian lattice Higgs model Lattice gauge theories are lattice approximations of the Yang-Mills theory in\nphysics. The abelian lattice Higgs model is one of the simplest examples of a\nlattice gauge theory interacting with an external field. In a previous\npaper~\\cite{flv2021}, we calculated the leading order term of the expected\nvalue of Wilson loop observables in the low-temperature regime of the abelian\nlattice Higgs model on $ \\mathbb{Z}^4 ,$ with structure group $G = \\mathbb{Z}_n\n$ for some $ n \\geq 2. $ In the absence of a Higgs field, these are important\nobservables since they exhibit a phase transition which can be interpreted as\ndistinguishing between regions with and without quark confinement. However, in\nthe presence of a Higgs field, this is no longer the case, and a more relevant\nfamily of observables are so-called open Wilson lines. In this paper, we extend\nand refine the ideas introduced in~\\cite{flv2021} to calculate the leading\norder term of the expected value of the more general Wilson line observables.\nUsing our main result, we then calculate the leading order term of several\nnatural ratios of expected values and confirm the behavior predicted by\nphysicists.\n', 'Pure perimeter laws for Wilson lines observables Several recent papers have studied the decay rate of the expectation of\nWilson loop and Wilson line observables in lattice gauge theory and the lattice\nHiggs model. These results have all been perturbative in the sense that the\nparameters need to scale with the length of the loop or line for the error term\nto be smaller than the estimate. In this paper, we further develop ideas\nfrom~\\cite{fv2023} and~\\cite{f2024} to give more detailed asymptotics for the\nexpectation of Wilson loop and Wilson line observables, which do not require\nthe parameters to be very large or very small for the error term to be small,\nthus improving the results of~\\cite{flv2022, flv2023, flv2020, f2022b}. In\nparticular, we show that Wilson line and loop observables have a pure parameter\nlaw in the Higgs and confinement phases of the lattice Higgs model.\n', 'Wilson loops in Ising lattice gauge theory Wilson loop expectation in 4D $\\mathbb{Z}_2$ lattice gauge theory is computed\nto leading order in the weak coupling regime. This is the first example of a\nrigorous theoretical calculation of Wilson loop expectation in the weak\ncoupling regime of a 4D lattice gauge theory. All prior results are either\ninequalities or strong coupling expansions.\n']","[('lattice gauge theories', 0.7003953456878662), ('lattice gauge theory', 0.7003816366195679), ('lattice gauge', 0.6130776405334473), ('yang mills theory', 0.5325402617454529), ('gauge theories', 0.5309816002845764), ('yang mills theories', 0.5299404859542847), ('wilson loops', 0.5288560390472412), ('wilson loop', 0.5269350409507751), ('gauge theory', 0.5164684057235718), ('yang mills higgs', 0.4824645221233368)]" 682,682,46,682_invariant tori_invariant torus_integrable hamiltonian systems_dimensional tori,"['invariant tori', 'invariant torus', 'integrable hamiltonian systems', 'dimensional tori', 'nearly integrable hamiltonian', 'quasiperiodic solutions', 'integrable hamiltonians', 'hamiltonian systems', 'kam theory', 'quasiperiodic']","['Quasi-periodic motions on symplectic tori The KAM (Kolmogorov-Arnold-Moser) theorem guarantees the stability of\nquasi-periodic invariant tori by perturbation in some Hamiltonian systems.\nMichel Herman proved a similar result for quasi-periodic motions, with\n$k$-dimensional involutive manifolds in Hamiltonian systems with $n$ degrees of\nfreedom $n \\leq k < 2n $. In this paper, we extend this result to the case of a\nquasi-periodic motion on symplectic tori $k = 2n$.\n', ""Singular KAM Theory The question of the total measure of invariant tori in analytic,\nnearly--integrable Hamiltonian systems is considered. In 1985, Arnol'd, Kozlov\nand Neishtadt, in the Encyclopaedia of Mathematical Sciences \\cite{AKN1}, and\nin subsequent editions, conjectured that in $n=2$ degrees of freedom the\nmeasure of the non torus set of general analytic nearly--integrable systems\naway from critical points is exponentially small with the size $\\e$ of the\nperturbation, and that for $n\\ge 3$ the measure is, in general, of order $\\e$\n(rather than $\\sqrt\\e$ as predicted by classical KAM Theory). In the case of\ngeneric natural Hamiltonian systems, we prove lower bounds on the measure of\nprimary and secondary invariant tori, which are in agreement, up to a\nlogarithmic correction, with the above conjectures. The proof is based on a new\n{\\sl singular} KAM theory, particularly designed to study analytic properties\nin neighborhoods of the secular separatrices generated by the perturbation at\nsimple resonances.\n"", 'Biasymptotically quasiperiodic solutions for time-dependent Hamiltonians In a previous work [Asymptotically quasiperiodic solutions for time-dependent\nHamiltonians, arXiv preprint arXiv:2211.06623 (2022)], we consider\ntime-dependent perturbations of a Hamiltonian vector field having an invariant\ntorus supporting quasiperiodic solutions. Assuming the perturbation decays\npolynomially fast as time tends to infinity, we prove the existence of an\nasymptotic KAM torus. An asymptotic KAM torus is a time-dependent family of\nembedded tori converging as time tends to infinity to the invariant torus\nassociated with the unperturbed system. Now, it is quite natural to wonder when\nwe have the existence of a biasymptotic KAM torus. That is a continuous\ntime-dependent family of embedded tori converging in the future and the past to\nsuitable quasiperiodic invariant tori.\n In this work, we go one step further. We analyze time-dependent perturbations\nof integrable and near-integrable Hamiltonians. Assuming the perturbation\ndecays polynomially fast in time, we prove the existence of orbit converging to\nsome quasiperiodic solutions in the future and the past.\n']","[('invariant tori', 0.6452733278274536), ('invariant torus', 0.551091194152832), ('integrable hamiltonian systems', 0.5458289384841919), ('dimensional tori', 0.5268617272377014), ('nearly integrable hamiltonian', 0.5109813213348389), ('quasiperiodic solutions', 0.504986584186554), ('integrable hamiltonians', 0.49178680777549744), ('hamiltonian systems', 0.48399287462234497), ('kam theory', 0.48120367527008057), ('quasiperiodic', 0.4774192273616791)]" 683,683,46,683_quasi einstein manifold_einstein manifolds_einstein manifold_manifolds boundary,"['quasi einstein manifold', 'einstein manifolds', 'einstein manifold', 'manifolds boundary', 'manifold boundary', 'manifolds boundary establish', 'flat manifolds', 'einstein metrics', 'riemannian manifold', 'compact einstein']","['Compact quasi-Einstein manifolds with boundary The goal of this article is to study compact quasi-Einstein manifolds with\nboundary. We provide boundary estimates for compact quasi-Einstein manifolds\nsimi\\-lar to previous results obtained for static and $V$-static spaces. In\naddition, we show that compact quasi-Einstein manifolds with connected boundary\nand satisfying a suitable pinching condition must be isometric, up to scaling,\nto the standard hemisphere $\\mathbb{S}_{+}^{n}.$\n', 'Rigidity of compact quasi-Einstein manifolds with boundary In this article, we investigate the geometry of compact quasi-Einstein\nmanifolds with boundary. We establish the possible values for the constant\nscalar curvature of a compact quasi-Einstein manifold with boundary. Moreover,\nwe show that a $3$-dimensional simply connected compact $m$-quasi-Einstein\nmanifold with boundary and constant scalar curvature must be isometric, up to\nscaling, to either the standard hemisphere $\\mathbb{S}^{3}_{+}$, or the\ncylinder\n$\\left[0,\\frac{\\sqrt{m}}{\\sqrt{\\lambda}}\\,\\pi\\right]\\times\\mathbb{S}^2$ with\nthe product metric. For dimension $n=4,$ we prove that a $4$-dimensional simply\nconnected compact $m$-quasi-Einstein manifold $M^4$ with boundary and constant\nscalar curvature is isometric, up to scaling, to either the standard hemisphere\n$\\mathbb{S}^{4}_{+},$ or the cylinder\n$\\left[0,\\frac{\\sqrt{m}}{\\sqrt{\\lambda}}\\,\\pi\\right]\\times\\mathbb{S}^3$ with\nthe product metric, or the product space $\\mathbb{S}^{2}_{+}\\times\\mathbb{S}^2$\nwith the doubly warped product metric. Other related results for arbitrary\ndimensions are also discussed.\n', 'On quasi-Einstein manifolds with constant scalar curvature In this article, we study quasi-Einstein manifolds with constant scalar curvature. We provide a classification of compact and noncompact (possibly with boundary) $T$-flat quasi-Einstein manifolds with constant scalar curvature, where the $T$-tensor is directly related to the Cotton and Weyl tensors. Moreover, we construct new explicit examples of noncompact quasi-Einstein manifolds. In addition, we prove a complete classification of compact and noncompact (possibly with boundary) $3$-dimensional $m$-quasi-Einstein manifolds with constant scalar curvature.']","[('quasi einstein manifold', 0.7759039402008057), ('einstein manifolds', 0.711329996585846), ('einstein manifold', 0.690636932849884), ('manifolds boundary', 0.6448915004730225), ('manifold boundary', 0.6386608481407166), ('manifolds boundary establish', 0.6046327352523804), ('flat manifolds', 0.5718352198600769), ('einstein metrics', 0.5693192481994629), ('riemannian manifold', 0.5633817315101624), ('compact einstein', 0.5612713694572449)]" 684,684,46,684_maps manifolds_manifolds_simply connected manifolds_dimensional manifolds,"['maps manifolds', 'manifolds', 'simply connected manifolds', 'dimensional manifolds', 'connected manifolds', 'closed manifolds', 'manifolds admitting', 'manifolds whose', 'topology manifolds', 'spin manifolds']","[""Characterizing certain classes of $6$-dimensional closed and\n simply-connected manifolds via special generic maps The present paper finds new necessary and sufficient conditions for\n$6$-dimensional closed and simply-connected manifolds of certain classes to\nadmit special generic maps into certain Euclidean spaces.\n The class of special generic maps naturally contains Morse functions with\nexactly two singular points on spheres in so-called Reeb's theorem,\ncharacterizing spheres topologically, and canonical projections of unit\nspheres. Our paper concerns variants of Reeb's theorem. Several results are\nknown e. g. the cases where the manifolds of the targets are the plane and some\ncases where the manifolds of the domains are closed and simply-connected. Our\npaper concerns $6$-dimensional versions of a result of Nishioka, determining\n$5$-dimensional closed and simply-connected manifolds admitting special generic\nmaps into Euclidean spaces completely. Closed and simply-connected manifolds\nare central geometric objects in (classical) algebraic topology and\ndifferential topology. The $6$-dimensional case is more complicated than the\n$5$-dimensional one: they are classified via explicit algebraic systems.\n"", '7-dimensional simply-connected spin manifolds whose integral cohomology\n rings are isomorphic to that of ${\\mathbb{C}P}^2 \\times S^3$ admit round fold\n maps We have been interested in understanding the class of 7-dimensional closed\nand simply-connected manifolds in geometric and constructive ways. We have\nconstructed explicit fold maps, which are higher dimensional versions of Morse\nfunctions, on some of the manifolds, previously.\n The studies have been motivated by studies of {\\it special generic} maps,\nhigher dimensional versions of Morse functions on homotopy spheres with exactly\ntwo singular points, characterizing them topologically except $4$-dimensional\ncases. The class contains canonical projections of unit spheres for example.\n This class has been found to be interesting, restricting the topologies and\nthe differentiable structures of the manifolds strictly: Saeki, Sakuma and\nWrazidlo found explicit phenomena.\n The present paper concerns fold maps on $7$-dimensional closed and\nsimply-connected spin manifolds whose integral cohomology rings are isomorphic\nto that of the product of the $2$-dimensional complex projective space and the\n$3$-dimensional sphere.\n', 'Restrictions on special generic maps into ${\\mathbb{R}}^5$ on\n $6$-dimensional or higher dimensional closed and simply-connected manifolds The class of special generic maps is a natural class of smooth maps\ncontaining Morse functions on spheres with exactly two singular points and\ncanonical projections of unit spheres. We find new restrictions on such maps on\n$6$-dimensional or higher dimensional closed and simply-connected manifolds\ninto ${\\mathbb{R}}^5$.\n Spheres which are not diffeomorphic to unit spheres do not admit such maps\nwhose codimensions are negative in considerable cases. They restrict the\nhomeomorphism and the diffeomorphism types of the manifolds in general. On the\nother hands, some elementary manifolds admit special generic maps into suitable\nEuclidean spaces: manifolds represented as connected sums of products of unit\nspheres are of such examples. This motivates us to study the (non-)existence of\nspecial generic maps on elementary manifolds such as projective spaces and some\nclosed and simply-connected manifolds. For example, new explicit investigations\nof cohomology rings are keys in our new study.\n']","[('maps manifolds', 0.7033352255821228), ('manifolds', 0.6404151320457458), ('simply connected manifolds', 0.632663369178772), ('dimensional manifolds', 0.6275180578231812), ('connected manifolds', 0.6152242422103882), ('closed manifolds', 0.6103904247283936), ('manifolds admitting', 0.6041666865348816), ('manifolds whose', 0.5997612476348877), ('topology manifolds', 0.5972534418106079), ('spin manifolds', 0.5655500292778015)]" 685,685,45,685_elliptic operators_elliptic differential operator_approximations elliptic_operators periodic,"['elliptic operators', 'elliptic differential operator', 'approximations elliptic', 'operators periodic', 'estimates periodic', 'elliptic second order', 'elliptic periodic', 'higher order elliptic', 'elliptic systems', 'elliptic differential']","['Homogenization of the higher-order Schr\\""odinger-type equations with\n periodic coefficients In $L_2({\\mathbb R}^d; {\\mathbb C}^n)$, we consider a matrix strongly\nelliptic differential operator ${A}_\\varepsilon$ of order $2p$, $p \\geqslant\n2$. The operator ${A}_\\varepsilon$ is given by ${A}_\\varepsilon =\nb(\\mathbf{D})^* g(\\mathbf{x}/\\varepsilon) b(\\mathbf{D})$, $\\varepsilon >0$,\nwhere $g(\\mathbf{x})$ is a periodic, bounded, and positive definite\nmatrix-valued function, and $b(\\mathbf{D})$ is a homogeneous differential\noperator of order $p$. We prove that, for fixed $\\tau \\in {\\mathbb R}$ and\n$\\varepsilon \\to 0$, the operator exponential $e^{-i \\tau {A}_\\varepsilon}$\nconverges to $e^{-i \\tau {A}^0}$ in the norm of operators acting from the\nSobolev space $H^s({\\mathbb R}^d; {\\mathbb C}^n)$ (with a suitable $s$) into\n$L_2({\\mathbb R}^d; {\\mathbb C}^n)$. Here $A^0$ is the effective operator.\nSharp-order error estimate is obtained. The results are applied to\nhomogenization of the Cauchy problem for the Schr\\""odinger-type equation $i\n\\partial_\\tau {\\mathbf u}_\\varepsilon = {A}_\\varepsilon {\\mathbf u}_\\varepsilon\n+ {\\mathbf F}$, ${\\mathbf u}_\\varepsilon\\vert_{\\tau=0} = \\boldsymbol{\\phi}$.\n', 'Homogenization of hyperbolic equations with periodic coefficients in\n ${\\mathbb R}^d$: sharpness of the results In $L_2({\\mathbb R}^d;{\\mathbb C}^n)$, a selfadjoint strongly elliptic second\norder differential operator ${\\mathcal A}_\\varepsilon$ is considered. It is\nassumed that the coefficients of the operator ${\\mathcal A}_\\varepsilon$ are\nperiodic and depend on ${\\mathbf x}/\\varepsilon$, where $\\varepsilon >0$ is a\nsmall parameter. We find approximations for the operators $\\cos ( {\\mathcal\nA}_\\varepsilon^{1/2}\\tau)$ and ${\\mathcal A}_\\varepsilon^{-1/2}\\sin ( {\\mathcal\nA}_\\varepsilon^{1/2}\\tau)$ in the norm of operators acting from the Sobolev\nspace $H^s({\\mathbb R}^d)$ to $L_2({\\mathbb R}^d)$ (with suitable $s$). We also\nfind approximation with corrector for the operator ${\\mathcal\nA}_\\varepsilon^{-1/2}\\sin ( {\\mathcal A}_\\varepsilon^{1/2}\\tau)$ in the $(H^s\n\\to H^1)$-norm. The question about the sharpness of the results with respect to\nthe type of the operator norm and with respect to the dependence of estimates\non $\\tau$ is studied. The results are applied to study the behavior of the\nsolutions of the Cauchy problem for the hyperbolic equation $\\partial_\\tau^2\n{\\mathbf u}_\\varepsilon = - {\\mathcal A}_\\varepsilon {\\mathbf u}_\\varepsilon +\n{\\mathbf F}$.\n', 'Operator error estimates for homogenization of the nonstationary\n Schr\\""{o}dinger-type equations: sharpness of the results In $L_2 (\\mathbb{R}^d; \\mathbb{C}^n)$, we consider a selfadjoint matrix\nstrongly elliptic second order differential operator $\\mathcal{A}_\\varepsilon$\nwith periodic coefficients depending on $\\mathbf{x}/\\varepsilon$. We find\napproximations of the exponential $e^{-i \\tau \\mathcal{A}_\\varepsilon}$, $\\tau\n\\in \\mathbb{R}$, for small $\\varepsilon$ in the ($H^s \\to L_2$)-operator norm\nwith suitable $s$. The sharpness of the error estimates with respect to $\\tau$\nis discussed. The results are applied to study the behavior of the solution\n$\\mathbf{u}_\\varepsilon$ of the Cauchy problem for the Schr\\""{o}dinger-type\nequation $i\\partial_{\\tau} \\mathbf{u}_\\varepsilon = \\mathcal{A}_\\varepsilon\n\\mathbf{u}_\\varepsilon + \\mathbf{F}$.\n']","[('elliptic operators', 0.538303554058075), ('elliptic differential operator', 0.5167674422264099), ('approximations elliptic', 0.5107583403587341), ('operators periodic', 0.47462961077690125), ('estimates periodic', 0.44589561223983765), ('elliptic second order', 0.4435613751411438), ('elliptic periodic', 0.4042262136936188), ('higher order elliptic', 0.40199169516563416), ('elliptic systems', 0.3992117941379547), ('elliptic differential', 0.3869723081588745)]" 686,686,45,686_genus graphs_graphs surfaces_genus graph_orientable surface genus,"['genus graphs', 'graphs surfaces', 'genus graph', 'orientable surface genus', 'embeddings graphs', 'graph surface', 'genus embedding', 'graphs embedded', 'non orientable surfaces', 'orientable genus']","['The $\\mathbb{Z}_2$-genus of Kuratowski minors A drawing of a graph on a surface is independently even if every pair of\nnonadjacent edges in the drawing crosses an even number of times. The\n$\\mathbb{Z}_2$-genus of a graph $G$ is the minimum $g$ such that $G$ has an\nindependently even drawing on the orientable surface of genus $g$. An\nunpublished result by Robertson and Seymour implies that for every $t$, every\ngraph of sufficiently large genus contains as a minor a projective $t\\times t$\ngrid or one of the following so-called $t$-Kuratowski graphs: $K_{3,t}$, or $t$\ncopies of $K_5$ or $K_{3,3}$ sharing at most two common vertices. We show that\nthe $\\mathbb{Z}_2$-genus of graphs in these families is unbounded in $t$; in\nfact, equal to their genus. Together, this implies that the genus of a graph is\nbounded from above by a function of its $\\mathbb{Z}_2$-genus, solving a problem\nposed by Schaefer and \\v{S}tefankovi\\v{c}, and giving an approximate version of\nthe Hanani-Tutte theorem on orientable surfaces. We also obtain an analogous\nresult for Euler genus and Euler $\\mathbb{Z}_2$-genus of graphs.\n', 'Excluded minors for the Klein Bottle II. Cascades Graphs that are critical (minimal excluded minors) for embeddability in\nsurfaces are studied. In Part I, it was shown that graphs that are critical for\nembeddings into surfaces of Euler genus $k$ or for embeddings into\nnonorientable surface of genus $k$ are built from 3-connected components,\ncalled hoppers and cascades. In Part II, all cascades for Euler genus 2 are\nclassified. As a consequence, the complete list of obstructions of connectivity\n2 for embedding graphs into the Klein bottle is obtained.\n', ""On high genus extensions of Negami's conjecture Negami's famous planar cover conjecture is equivalent to the statement that a\nconnected graph can be embedded in the projective plane if and only if it has a\nprojective planar cover. In 1999, Hlin\\v{e}n\\'y proposed extending this\nconjecture to higher genus non-orientable surfaces. In this paper, we put\nforward a natural extension that encompasses orientable surfaces as well; for\nevery compact surface $\\Sigma$, a connected graph $G$ has a finite cover\nembeddable in $\\Sigma$ if and only if $G$ is embeddable in a surface covered by\n$\\Sigma$.\n As evidence toward this, we prove that for every surface $\\Sigma$, the\nconnected graphs with a finite cover embeddable in $\\Sigma$ have bounded Euler\ngenus. Moreover, we show that these extensions of Negami's conjecture are\ndecidable for every compact surface of sufficiently large Euler genus,\nsurpassing what is known for Negami's original conjecture. We also prove the\nnatural analogue for countable graphs embeddable into a compact (orientable)\nsurface. More precisely, we prove that a connected countable graph $G$ has a\nfinite ply cover that embeds into a compact (orientable) surface if and only if\n$G$ embeds into a compact (orientable) surface.\n Our most general theorem, from which these results are derived, is that there\nis a constant $c>0$ such that for every surface $\\Sigma$, there exists a\ndecreasing function $p_\\Sigma:\\mathbb{N} \\to \\mathbb{N}$ with $\\lim_{g\\to\n\\infty}p_\\Sigma(g) =0$ such that every finite cover embeddable in $\\Sigma$ of\nany connected graph with Euler genus $g\\ge c$ has ply at most $p_\\Sigma(g)$.\n""]","[('genus graphs', 0.6726221442222595), ('graphs surfaces', 0.6672767400741577), ('genus graph', 0.6325106024742126), ('orientable surface genus', 0.5926876068115234), ('embeddings graphs', 0.5879006385803223), ('graph surface', 0.5743513703346252), ('genus embedding', 0.5641223788261414), ('graphs embedded', 0.5428010821342468), ('non orientable surfaces', 0.5401144623756409), ('orientable genus', 0.5396636128425598)]" 687,687,45,687_crystalline cohomology_adic hodge theory_adic formal scheme_prismatic cohomology,"['crystalline cohomology', 'adic hodge theory', 'adic formal scheme', 'prismatic cohomology', 'hodge theory', 'crystalline', 'adic completion', 'adic formal', 'crystals', 'adic hodge']","[""A prismatic approach to crystalline local systems Let X be a smooth p-adic formal scheme. We show that integral crystalline\nlocal systems on the generic fiber of X are equivalent to prismatic F-crystals\nover the analytic locus of the prismatic site of X. As an application, we give\na prismatic proof of Fontaine's C_crys-conjecture, for general coefficients, in\nthe relative setting, and allowing ramified base fields. Along the way, we also\nestablish various foundational results for the cohomology of prismatic\nF-crystals, including various comparison theorems, Poincar\\'e duality, and\nFrobenius isogeny.\n"", 'Prismatic and $q$-crystalline sites of higher level In this article, we define the $m$-prismatic site and the $m$-$q$-crystalline\nsite, which are higher level analogs of the prismatic site and the\n$q$-crystalline site respectively. We prove a certain equivalence between the\ncategory of crystals on the $m$-prismatic site (resp. the $m$-$q$-crystalline\nsite) and that on the prismatic site (resp. the $q$-crystalline site), which\ncan be regarded as the prismatic (resp. the $q$-crystalline) analog of the\nFrobenius descent due to Berthelot and the Cartier transform due to\nOgus-Vologodsky, Oyama and Xu. We also prove the equivalence between the\ncategory of crystals on the $m$-prismatic site and that on the\n$(m-1)$-$q$-crystalline site.\n', ""Finiteness and Duality for the cohomology of prismatic crystals Let $(A, I)$ be a bounded prism, and $X$ be a smooth $p$-adic formal scheme\nover $\\Spf(A/I)$. We consider the notion of crystals on Bhatt--Scholze's\nprismatic site $(X/A)_{\\prism}$ of $X$ relative to $A$. We prove that if $X$ is\nproper over $\\Spf(A/I)$ of relative dimension $n$, then the cohomology of a\nprismatic crystal is a perfect complex of $A$-modules with tor-amplitude in\ndegrees $[0,2n]$. We also establish a Poincar\\'e duality for the reduced\nprismatic crystals, i.e. the crystals over the reduced structural sheaf of\n$(X/A)_{\\prism}$. The key ingredient is an explicit local description of\nreduced prismatic crystals in terms of Higgs modules.\n""]","[('crystalline cohomology', 0.6093465089797974), ('adic hodge theory', 0.5775978565216064), ('adic formal scheme', 0.575480580329895), ('prismatic cohomology', 0.5487120151519775), ('hodge theory', 0.4469429552555084), ('crystalline', 0.4465700089931488), ('adic completion', 0.4312492907047272), ('adic formal', 0.42861613631248474), ('crystals', 0.4108920693397522), ('adic hodge', 0.40052762627601624)]" 688,688,45,688_compressible euler equations_isentropic compressible euler_3d compressible euler_isentropic euler equations,"['compressible euler equations', 'isentropic compressible euler', '3d compressible euler', 'isentropic euler equations', 'dimensional compressible euler', 'shock formation', 'shock waves', 'euler flows', 'solutions compressible euler', 'compressible euler']","[""Formation of shifted shock for the 3D compressible Euler equations with\n time-dependent damping In this paper, we show the shock formation to the compressible Euler\nequations with time-dependent damping $\\frac{a\\p u}{(1+t)^{\\lam}}$ in three\nspatial dimensions without any symmetry conditions. It's well-known that for\n$\\lam>1$, the damping is too weak to prevent the shock formation for suitably\nlarge data. However, the classical results only showed the finite existence of\nthe solution. Follow the work by D.Christodoulou in\\cite{christodoulou2007},\nstarting from the initial isentropic and irrotational short pulse data, we show\nthe formation of shock is characterized by the collapse of the characteristic\nhypersurfaces and the vanishing of the inverse foliation density function\n$\\mu$, at which the first derivatives of the velocity and the density blow up,\nand the lifespan $T_{\\ast}(a,\\lam)$ is exponentially large. Moreover, the\ndamping effect will shift the time of shock formation $T_{\\ast}$. The methods\nin the paper can also be extended to the Euler equations with general\ntime-decay damping.\n"", 'Formation of point shocks for 3D compressible Euler We consider the 3D isentropic compressible Euler equations with the ideal gas\nlaw. We provide a constructive proof of shock formation from smooth initial\ndatum of finite energy, with no vacuum regions, with nontrivial vorticity\npresent at the shock, and under no symmetry assumptions. We prove that for an\nopen set of Sobolev-class initial data which are a small $L^ \\infty $\nperturbation of a constant state, there exist smooth solutions to the Euler\nequations which form a generic stable shock in finite time. The blow up time\nand location can be explicitly computed, and solutions at the blow up time are\nsmooth except for a single point, where they are of cusp-type with H\\""{o}lder\n$C^ {\\frac{1}{3}}$ regularity. Our proof is based on the use of modulated\nself-similar variables that are used to enforce a number of constraints on the\nblow up profile, necessary to establish the stability in self-similar variables\nof the generic shock profile.\n', 'Shifted shock formation for the 3D compressible Euler equations with\n damping and variation of the vorticity In this paper, we consider the shock formation problem for the\n3-dimensional(3D) compressible Euler equations with damping inspired by the\nwork \\cite{BSV3Dfulleuler}. It will be shown that for a class of large data,\nthe damping can not prevent the formation of point shock, and the damping\neffect shifts the shock time and the wave amplitude while the shock location\nand the blow up direction remain the same with the information of this point\nshock being computed explicitly. Moreover, the vorticity is concentrated in the\nnon-blow-up direction, which varies exponentially due to the damping effect.\nOur proof is based on the estimates for the modulated self-similar variables\nand lower bounds for the Lagrangian trajectories.\n']","[('compressible euler equations', 0.5584918856620789), ('isentropic compressible euler', 0.5446354150772095), ('3d compressible euler', 0.5357376933097839), ('isentropic euler equations', 0.5290162563323975), ('dimensional compressible euler', 0.5287774801254272), ('shock formation', 0.5120683312416077), ('shock waves', 0.503206193447113), ('euler flows', 0.5007542371749878), ('solutions compressible euler', 0.4840829372406006), ('compressible euler', 0.46798235177993774)]" 689,689,45,689_gorenstein projective modules_gorenstein projective_modules gorenstein_finite gorenstein,"['gorenstein projective modules', 'gorenstein projective', 'modules gorenstein', 'finite gorenstein', 'gorenstein dimension', 'gorenstein injective', 'relative gorenstein', 'gorenstein flat', 'gorenstein ring', 'gorenstein rings']","['Stability of projectively coresolved Gorenstein flat modules The stability of the class of projectively coresolved Gorenstein flat\nmodules, under the very Gorenstein process used to define them, is proven in\nthis paper. Moreover, a new characterization of the projectively coresolved\nGorenstein flat dimension is given.\n', 'Acyclic complexes and Gorenstein rings For a given class of modules $\\mathcal{A}$, we denote by\n$\\widetilde{\\mathcal{A}}$ the class of exact complexes $X$ having all cycles in\n$\\mathcal{A}$, and by $dw(\\mathcal{A})$ the class of complexes $Y$ with all\ncomponents $Y_j$ in $\\mathcal{A}$. We use the notations $\\mathcal{GI}$\n$(\\mathcal{GF}, \\mathcal{GP})$ for the class of Gorenstein injective\n(Gorenstein flat, Gorenstein projective respectively) $R$-modules,\n$\\mathcal{DI}$ for Ding injective modules, and $\\mathcal{PGF}$ for projectively\ncoresolved Gorenstein flat modules (see section 2 for definitions). We prove\nthat the following are equivalent over any ring $R$: (1) Every exact complex of\ninjective modules is totally acyclic. (2) Every exact complex of Gorenstein\ninjective modules is in $\\widetilde{\\mathcal{GI}}$. (3) Every complex in\n$dw(\\mathcal{GI})$ is dg-Gorenstein injective. We show that the analogue result\nfor complexes of flat and Gorenstein flat modules also holds over arbitrary\nrings. if moreover, the ring is $n$-perfect for some integer $n \\ge 0$, then\nthe three equivalent statements for flat and Gorenstein flat modules are also\nequivalent with their counterparts for projective and projectively coresolved\nGorenstein flat modules. We also prove the following characterization of\nGorenstein rings: Let $R$ be a commutative coherent ring. The following\nstatements are equivalent: (1) every exact complex of FP-injective modules has\nall its cycles Ding injective modules. (2) every exact complex of injectives\nhas all its cycles Ding injective modules and every $R$-module M such that\n$M^+$ is Gorenstein flat is Ding injective. If moreover the ring $R$ has finite\nKrull dimension then statements (1), (2) above are also equivalent to (3) $R$\nis a Gorenstein ring (in the sense of Iwanaga).\n', 'Finiteness criteria for Gorenstein flat dimension and stability Projectively coresolved Gorenstein flat modules were introduced recently by\nSaroch and Stovicek and were shown to be Gorenstein projective. While the\nrelation between Gorenstein projective and Gorenstein flat modules is not well\nunderstood, the class of projectively coresolved Gorenstein flat modules is\ncontained in the class of Gorenstein flat modules. This paper proves necessary\nand sufficient conditions for a module of finite Gorenstein flat dimension to\nbe projectively coresolved Gorenstein flat, or of finite flat dimension.\nStability results for the class of projectively coresolved Gorenstein flat\nmodules are also established.\n']","[('gorenstein projective modules', 0.8253125548362732), ('gorenstein projective', 0.7435633540153503), ('modules gorenstein', 0.7421517372131348), ('finite gorenstein', 0.665655255317688), ('gorenstein dimension', 0.665051281452179), ('gorenstein injective', 0.6370097994804382), ('relative gorenstein', 0.623832106590271), ('gorenstein flat', 0.6194303035736084), ('gorenstein ring', 0.6193505525588989), ('gorenstein rings', 0.6154393553733826)]" 690,690,45,690_mixed effects models_mixed models_bias estimators_effects models,"['mixed effects models', 'mixed models', 'bias estimators', 'effects models', 'likelihood estimator', 'bias estimation', 'asymptotic inference', 'empirical likelihood', 'consistent estimators', 'estimators']","['A Diagnostic for Bias in Linear Mixed Model Estimators Induced by\n Dependence Between the Random Effects and the Corresponding Model Matrix We explore how violations of the often-overlooked standard assumption that\nthe random effects model matrix in a linear mixed model is fixed (and thus\nindependent of the random effects vector) can lead to bias in estimators of\nestimable functions of the fixed effects. However, if the random effects of the\noriginal mixed model are instead also treated as fixed effects, or if the fixed\nand random effects model matrices are orthogonal with respect to the inverse of\nthe error covariance matrix (with probability one), or if the random effects\nand the corresponding model matrix are independent, then these estimators are\nunbiased. The bias in the general case is quantified and compared to a\nrandomized permutation distribution of the predicted random effects, producing\nan informative summary graphic for each estimator of interest. This is\ndemonstrated through the examination of sporting outcomes used to estimate a\nhome field advantage.\n', 'Asymptotic Results for Penalized Quasi-Likelihood Estimation in\n Generalized Linear Mixed Models Generalized Linear Mixed Models (GLMMs) are widely used for analysing\nclustered data. One well-established method of overcoming the integral in the\nmarginal likelihood function for GLMMs is penalized quasi-likelihood (PQL)\nestimation, although to date there are few asymptotic distribution results\nrelating to PQL estimation for GLMMs in the literature. In this paper, we\nestablish large sample results for PQL estimators of the parameters and random\neffects in independent-cluster GLMMs, when both the number of clusters and the\ncluster sizes go to infinity. This is done under two distinct regimes:\nconditional on the random effects (essentially treating them as fixed effects)\nand unconditionally (treating the random effects as random). Under the\nconditional regime, we show the PQL estimators are asymptotically normal around\nthe true fixed and random effects. Unconditionally, we prove that while the\nestimator of the fixed effects is asymptotically normally distributed, the\ncorrect asymptotic distribution of the so-called prediction gap of the random\neffects may in fact be a normal scale-mixture distribution under certain\nrelative rates of growth. A simulation study is used to verify the finite\nsample performance of our theoretical results.\n', 'Precise Asymptotics for Linear Mixed Models with Crossed Random Effects We obtain an asymptotic normality result that reveals the precise asymptotic\nbehavior of the maximum likelihood estimators of parameters for a very general\nclass of linear mixed models containing cross random effects. In achieving the\nresult, we overcome theoretical difficulties that arise from random effects\nbeing crossed as opposed to the simpler nested random effects case. Our new\ntheory is for a class of Gaussian response linear mixed models which includes\ncrossed random slopes that partner arbitrary multivariate predictor effects and\ndoes not require the cell counts to be balanced. Statistical utilities include\nconfidence interval construction, Wald hypothesis test and sample size\ncalculations.\n']","[('mixed effects models', 0.5436911582946777), ('mixed models', 0.5092453360557556), ('bias estimators', 0.4351949989795685), ('effects models', 0.4085696041584015), ('likelihood estimator', 0.39224639534950256), ('bias estimation', 0.38828402757644653), ('asymptotic inference', 0.38768020272254944), ('empirical likelihood', 0.3851418197154999), ('consistent estimators', 0.3751668334007263), ('estimators', 0.3667672574520111)]" 691,691,45,691_entanglement entropy_topological entanglement entropy_bound entanglement_entanglement entropies,"['entanglement entropy', 'topological entanglement entropy', 'bound entanglement', 'entanglement entropies', 'entanglement spectrum', 'entanglement', 'topological entanglement', 'one dimensional quantum', 'interacting fermion', 'bipartite entanglement']","['Entanglement of inhomogeneous free fermions on hyperplane lattices We introduce an inhomogeneous model of free fermions on a $(D-1)$-dimensional\nlattice with $D(D-1)/2$ continuous parameters that control the hopping strength\nbetween adjacent sites. We solve this model exactly, and find that the\neigenfunctions are given by multidimensional generalizations of Krawtchouk\npolynomials. We construct a Heun operator that commutes with the chopped\ncorrelation matrix, and compute the entanglement entropy numerically for\n$D=2,3,4$, for a wide range of parameters. For $D=2$, we observe oscillations\nin the sub-leading contribution to the entanglement entropy, for which we\nconjecture an exact expression. For $D>2$, we find logarithmic violations of\nthe area law for the entanglement entropy with nontrivial dependence on the\nparameters.\n', 'Entanglement Entropy Bounds for Droplet States of the XXZ Model on the\n Strip The scaling behavior of the entanglement entropy of droplet states in\nHeisenberg spin-1/2 XXZ model defined on a strip of width $M$ under the\npresence of a non-negative background magnetic field is investigated. Without\nany assumptions on $V$, a logarithmically corrected area law is shown. Assuming\nthat the values of $V$ are i.i.d. random variables, an area law in expectation\nis obtained.\n', 'Stability of the enhanced area law of the entanglement entropy We consider a multi-dimensional continuum Schr\\""odinger operator which is\ngiven by a perturbation of the negative Laplacian by a compactly supported\npotential. We establish both an upper and a lower bound on the bipartite\nentanglement entropy of the ground state of the corresponding quasi-free Fermi\ngas. The bounds prove that the scaling behaviour of the entanglement entropy\nremains a logarithmically enhanced area law as in the unperturbed case of the\nfree Fermi gas. The central idea for the upper bound is to use a limiting\nabsorption principle for such kinds of Schr\\""odinger operators.\n']","[('entanglement entropy', 0.7098301649093628), ('topological entanglement entropy', 0.6960510015487671), ('bound entanglement', 0.6381599307060242), ('entanglement entropies', 0.5804762244224548), ('entanglement spectrum', 0.5325533747673035), ('entanglement', 0.5041516423225403), ('topological entanglement', 0.4930081069469452), ('one dimensional quantum', 0.48743748664855957), ('interacting fermion', 0.4861486554145813), ('bipartite entanglement', 0.4846138656139374)]" 692,692,45,692_inverse boundary problems_inverse boundary_dirichlet neumann map_inverse boundary value,"['inverse boundary problems', 'inverse boundary', 'dirichlet neumann map', 'inverse boundary value', 'neumann map', 'biharmonic operators', 'biharmonic operator', 'schr odinger equations', 'dirichlet neumann', 'odinger equations']","['Partial Data Inverse Problems for Nonlinear Magnetic Schr\\""odinger\n Equations We prove that the knowledge of the Dirichlet-to-Neumann map, measured on a\npart of the boundary of a bounded domain in $\\mathbb{R}^n, n\\geq2$, can\nuniquely determine, in a nonlinear magnetic Schr\\""odinger equation, the\nvector-valued magnetic potential and the scalar electric potential, both being\nnonlinear in the solution.\n', 'Partial data inverse problems for the nonlinear magnetic Schr\\""odinger\n equation In this paper, we study the partial data inverse problem for nonlinear\nmagnetic Schr\\""odinger equations. We show that the knowledge of the\nDirichlet-to-Neumann map, measured on an arbitrary part of the boundary,\ndetermines the time-dependent linear coefficients, electric and magnetic\npotentials, and nonlinear coefficients, provided that the divergence of the\nmagnetic potential is given. Additionally, we also investigate both the forward\nand inverse problems for the linear magnetic Schr\\""odinger equation with a\ntime-dependent leading term. In particular, all coefficients are uniquely\nrecovered from boundary data.\n', 'Inverse problems for nonlinear magnetic Schr\\""odinger equations on\n conformally transversally anisotropic manifolds We study the inverse boundary problem for a nonlinear magnetic Schr\\""odinger\noperator on a conformally transversally anisotropic Riemannian manifold of\ndimension $n\\ge 3$. Under suitable assumptions on the nonlinearity, we show\nthat the knowledge of the Dirichlet-to-Neumann map on the boundary of the\nmanifold determines the nonlinear magnetic and electric potentials uniquely. No\nassumptions on the transversal manifold are made in this result, whereas the\ncorresponding inverse boundary problem for the linear magnetic Schr\\""odinger\noperator is still open in this generality.\n']","[('inverse boundary problems', 0.6181885600090027), ('inverse boundary', 0.586825966835022), ('dirichlet neumann map', 0.5820659399032593), ('inverse boundary value', 0.5536119341850281), ('neumann map', 0.5250381827354431), ('biharmonic operators', 0.5160722136497498), ('biharmonic operator', 0.5135059952735901), ('schr odinger equations', 0.5105383396148682), ('dirichlet neumann', 0.490103542804718), ('odinger equations', 0.48944559693336487)]" 693,693,45,693_ring generalized_rings skew_power series rings_power series ring,"['ring generalized', 'rings skew', 'power series rings', 'power series ring', 'series rings', 'series ring', 'skew polynomial', 'polynomials skew', 'extensions rings', 'reduced ring']","['Bounded skew power series rings for inner $\\sigma$-derivations We define and explore the bounded skew power series ring\n$R^+[[x;\\sigma,\\delta]]$ defined over a complete, filtered, Noetherian prime\nring $R$ with a commuting skew derivation $(\\sigma,\\delta)$. We establish\nprecise criteria for when this ring is well-defined, and for an appropriate\ncompletion $Q$ of $Q(R)$, we prove that if $Q$ has characteristic $p$, $\\delta$\nis an inner $\\sigma$-derivation and no positive power of $\\sigma$ is inner as\nan automorphism of $Q$, then $Q^+[[x;\\sigma,\\delta]]$ is often prime, and even\nsimple under certain mild restrictions on $\\delta$. It follows from this result\nthat $R^+[[x;\\sigma,\\delta]]$ is itself prime.\n', 'Skew Generalized Power Series Rings With the McCoy Property Let $R$ be a ring, $(S,\\preceq)$ a strictly totally ordered monoid and\nsuppose also $\\omega:S\\rightarrow \\text{End}(R)$ is a monoid homomorphism. A\nskew generalized power series ring $R[[S,\\omega,\\preceq]]$ consists of all\nfunctions from a monoid $S$ to a coefficient ring $R$ whose support contains\nneither infinite descending chains nor infinite anti-chains, equipped with\npoint-wise addition and with multiplication given by convolution twisted by an\naction $\\omega$ of the monoid $S$ on the ring $R$.\n Special cases of the skew generalized power series ring construction are the\nskew polynomial rings, skew Laurent polynomial rings, skew power series rings,\nskew Laurent series rings, skew monoid rings, skew group rings, skew\nMalcev-Neumann series rings and generalized power series rings as well as the\nuntwisted versions of all of these objects.\n In the present article, we study the so-termed $(S,\\omega)$-McCoy condition\non $R$, that is a generalization of the standard McCoy condition from\npolynomials to skew generalized power series, thus generalizing some of the\nexisting results in the literature relevant to the subject.\n', 'Reduced Archimedean skew polynomial rings and skew power series rings We characterize skew polynomial rings and skew power series rings that are\nreduced and right or left Archimedean.\n']","[('ring generalized', 0.5976601243019104), ('rings skew', 0.5931660532951355), ('power series rings', 0.5853309631347656), ('power series ring', 0.564516007900238), ('series rings', 0.5331981182098389), ('series ring', 0.5315434336662292), ('skew polynomial', 0.5167315006256104), ('polynomials skew', 0.5132293105125427), ('extensions rings', 0.5008906126022339), ('reduced ring', 0.4985293745994568)]" 694,694,45,694_leibniz algebras_lie leibniz algebras_leibniz algebra_lie algebras,"['leibniz algebras', 'lie leibniz algebras', 'leibniz algebra', 'lie algebras', 'subalgebras', 'lie algebra', 'dimensional leibniz', 'lie leibniz', 'every subalgebra', 'subalgebras ideals']","['Modularity conditions in Leibniz algebras In this paper we continue the study of the subalgebra lattice of a Leibniz\nalgebra. In particular, we find out that solvable Leibniz algebras with an\nupper semi-modular lattice are either almost-abelian or have an abelian ideal\nspanned by the elements with square zero. We also study Leibniz algebras in\nwhich every subalgebra is a weak quasi-ideal, as well as modular symmetric\nLeibniz algebras.\n', 'Subinvariance in Leibniz Algebras Leibniz algebras are certain generalizations of Lie algebras. Motivated by\nthe concept of subinvariance in group theory, Schenkman studied properties of\nsubinvariant subalgebras of a Lie algebra. In this paper we define subinvariant\nsubalgebras of Leibniz algebras and study their properties. It is shown that\nthe signature results on subinvariance in Lie algebras have analogs for Leibniz\nalgebras.\n', 'On Leibniz algebras, whose subalgebras are either ideals or\n self-idealizing A subalgebra S of a Leibniz algebra L is called self-idealizing in L if it\ncoincides with its idealizer IL(S). In this paper we study the structure of\nLeibniz algebras, whose subalgebras are either ideals or self-idealizing.\n']","[('leibniz algebras', 0.8803537487983704), ('lie leibniz algebras', 0.837924063205719), ('leibniz algebra', 0.8239427208900452), ('lie algebras', 0.6442869901657104), ('subalgebras', 0.5775814652442932), ('lie algebra', 0.5707260966300964), ('dimensional leibniz', 0.5549014806747437), ('lie leibniz', 0.5476409792900085), ('every subalgebra', 0.5382170677185059), ('subalgebras ideals', 0.5255522131919861)]" 695,695,45,695_hyperelliptic curves genus_supersingular elliptic curves_genus curves_curves genus,"['hyperelliptic curves genus', 'supersingular elliptic curves', 'genus curves', 'curves genus', 'hyperelliptic curves', 'non hyperelliptic curves', 'curve genus', 'curves genus mathbb', 'genus curve', 'hyperelliptic curve']","['Listing superspecial curves of genus three by using Richelot isogeny\n graph In algebraic geometry, superspecial curves are important research objects.\nWhile the number of superspecial genus-3 curves in characteristic $p$ is known,\nthe number of hyperelliptic ones among them has not been determined even for\nsmall $p$. In this paper, in order to compute the latter number, we give an\nalgorithm for computing the Richelot isogeny graph of superspecial abelian\nthreefolds by using theta functions. Our algorithm enables us to efficiently\nlist superspecial genus-3 curves, and we succeeded in counting hyperelliptic\ncurves among them when $11 \\leq p < 100$ by executing our algorithm in Magma.\n', 'Computing superspecial hyperelliptic curves of genus 4 with automorphism\n group properly containing the Klein 4-group In algebraic geometry, enumerating or finding superspecial curves in positive\ncharacteristic $p$ is important both in theory and in computation. In this\npaper, we propose feasible algorithms to enumerate or find superspecial\nhyperelliptic curves of genus $4$ with automorphism group properly containing\nthe Klein $4$-group. Executing the algorithms on Magma, we succeeded in\nenumerating such superspecial curves for every $p$ with $19 \\leq p < 500$, and\nin finding a single one for every $p$ with $19 \\leq p < 7000$.\n', 'On the existence of superspecial nonhyperelliptic curves of genus $4$ A curve over a perfect field $K$ of characteristic $p > 0$ is said to be\nsuperspecial if its Jacobian is isomorphic to a product of supersingular\nelliptic curves over the algebraic closure $\\overline{K}$. In recent years,\nisomorphism classes of superspecial nonhyperelliptic curves of genus $4$ over\nfinite fields in small characteristic have been enumerated. In particular, the\nnon-existence of superspecial curves of genus $4$ in characteristic $p = 7$ was\nproved. In this note, we give an elementary proof of the existence of\nsuperspecial nonhyperelliptic curves of genus $4$ for infinitely many primes\n$p$. Specifically, we prove that the variety $C_p : x^3+y^3+w^3= 2 y w + z^2 =\n0$ in the projective $3$-space with $p > 2$ is a superspecial curve of genus\n$4$ if and only if $p \\equiv 2 \\pmod{3}$. Our computational results show that\n$C_p$ with $p \\equiv 2 \\pmod 3$ are maximal curves over $\\mathbb{F}_{p^2}$ for\nall $3 \\leq p \\leq 269$.\n']","[('hyperelliptic curves genus', 0.7182863354682922), ('supersingular elliptic curves', 0.6514253616333008), ('genus curves', 0.6422585248947144), ('curves genus', 0.6420499086380005), ('hyperelliptic curves', 0.639897346496582), ('non hyperelliptic curves', 0.6209796071052551), ('curve genus', 0.6177716255187988), ('curves genus mathbb', 0.6092084646224976), ('genus curve', 0.6075043082237244), ('hyperelliptic curve', 0.5796400904655457)]" 696,696,45,696_triangulated categories_equivariant stability_triangulated category_stability manifolds,"['triangulated categories', 'equivariant stability', 'triangulated category', 'stability manifolds', 'triangulated category mathcal', 'yau triangulated category', 'stability manifold', 'calabi yau categories', 'space stability conditions', 'bounded derived category']","['Fusion-equivariant stability conditions and Morita duality Given a triangulated category $D$ with an action of a fusion category $C$, we\nstudy the moduli space $Stab_{C}(D)$ of fusion-equivariant Bridgeland stability\nconditions on $D$. The main theorem is that the fusion-equivariant stability\nconditions form a closed, complex submanifold of the moduli space of stability\nconditions on $D$. As an application of this framework, we generalise a result\nof Macr\\`{i}--Mehrotra--Stellari by establishing a homeomorphism between the\nspace of $G$-invariant stability conditions on $D$ and the space of\n$rep(G)$-equivariant stability conditions on the equivariant category $D^G$. We\nalso describe applications to the study of stability conditions associated to\nMcKay quivers and to geometric stability conditions on free quotients of smooth\nprojective varieties.\n', 'On pseudo-Anosov autoequivalences Motivated by results of Thurston, we prove that any autoequivalence of a\ntriangulated category induces a filtration by triangulated subcategories,\nprovided the existence of Bridgeland stability conditions. The filtration is\ngiven by the exponential growth rate of masses under iterates of the\nautoequivalence, and only depends on the choice of a connected component of the\nstability manifold. We then propose a new definition of pseudo-Anosov\nautoequivalences, and prove that our definition is more general than the one\npreviously proposed by Dimitrov, Haiden, Katzarkov, and Kontsevich. We\nconstruct new examples of pseudo-Anosov autoequivalences on the derived\ncategories of quintic Calabi-Yau threefolds and quiver Calabi-Yau categories.\nFinally, we prove that certain pseudo-Anosov autoequivalences on quiver\n3-Calabi-Yau categories act hyperbolically on the space of Bridgeland stability\nconditions.\n', ""Stability conditions on cyclic categories I: basic definitions and\n examples A triangulated category $\\mathcal{C}$ with a canonical Bott's isomorphism\n$[2]\\xrightarrow{\\sim}id$ is called a cyclic category in this paper. We give a\nnew notion of stability conditions on a $k$-linear Krull-Schmidt cyclic\ncategory. Given such a stability condition $\\sigma$, we can assign a Maslov\nindex to each basic loop in such a category. If all Maslov indexes vanish, we\nget $\\mathcal{C}',\\sigma'$ as the $\\mathbb{Z}$-lifts of $\\mathcal{C},\\sigma$\nrespectively such that $\\mathcal{C}'$ is a $\\mathbb{Z}$-graded triangulated\ncategory and $\\sigma'$ is a Bridgeland stability condition on $\\mathcal{C}'$.\nMoreover, we showed that there is an isomorphism\n$$Stab^{0,e}(\\mathcal{C})\\xrightarrow{\\simeq} BStab(\\mathcal{C}')$$ where\n$Stab^{0,e}(\\mathcal{C})$ denotes the equivalence classes of stability\nconditions which are deformation equivalent to $\\sigma$, and\n$BStab(\\mathcal{C}')$ denotes the space of Bridgeland stability conditions on\n$\\mathcal{C}'$.\n We provide examples of stability conditions on a simple cyclic category. We\nalso discuss some interesting phenomena in these examples, such as the\nchirality symmetry breaking phenomenon and nontrivial monodromy. The chirality\nsymmetry breaking phenomenon involves stability conditions which can not be\nlifted to Bridgeland stability conditions.\n""]","[('triangulated categories', 0.5580572485923767), ('equivariant stability', 0.5408943295478821), ('triangulated category', 0.5294341444969177), ('stability manifolds', 0.5249542593955994), ('triangulated category mathcal', 0.522760808467865), ('yau triangulated category', 0.5187603831291199), ('stability manifold', 0.48530808091163635), ('calabi yau categories', 0.4432888925075531), ('space stability conditions', 0.43427619338035583), ('bounded derived category', 0.4286213517189026)]" 697,697,45,697_stochastic homogenization_estimates homogenization_homogenization elliptic equations_homogenization elliptic,"['stochastic homogenization', 'estimates homogenization', 'homogenization elliptic equations', 'homogenization elliptic', 'estimates stochastic', 'homogenization nonlinear', 'homogenization theory', 'homogenization results', 'quantitative homogenization', 'homogenized operator']","['Non-perturbative approach to the Bourgain-Spencer conjecture in\n stochastic homogenization In the context of stochastic homogenization, the Bourgain-Spencer conjecture\nstates that the ensemble-averaged solution of a divergence-form linear elliptic\nequation with random coefficients admits an intrinsic description in terms of\nhigher-order homogenized equations with an accuracy four times better than the\nalmost sure solution itself. While previous rigorous results were restricted to\na perturbative regime with small ellipticity ratio, we make the very first\nprogress in a non-perturbative setting, establishing half of the conjectured\noptimal accuracy. The validity of the full conjecture remains an open question\nand might in fact fail in general. Our approach involves the construction of a\nnew corrector theory in stochastic homogenization: while only a bounded number\nof correctors can be constructed as stationary random fields in a strong sense,\nwe show that twice as many stationary correctors can be defined in a\nSchwartz-like distributional sense on the probability space. We focus on the\nGaussian setting for the coefficient field, and the proof relies heavily on\nMalliavin calculus.\n', ""On Bourgain's approach to stochastic homogenization In 2018, Bourgain pioneered a novel perturbative harmonic-analytic approach\nto the stochastic homogenization theory of discrete elliptic equations with\nweakly random i.i.d. coefficients. The approach was subsequently refined to\nshow that homogenized approximations of ensemble averages can be derived to a\nprecision four times better than almost sure homogenized approximations, which\nwas unexpected by the state-of-the-art homogenization theory. In this paper, we\ngrow this budding theory in various directions: First, we prove that the\napproach is robust by extending it to the continuum setting with exponentially\nmixing random coefficients. Second, we give a new proof via Malliavin calculus\nin the case of Gaussian coefficients, which avoids the main technicality of\nBourgain's original approach. This new proof also applies to strong Gaussian\ncorrelations with power-law decay. Third, we extend Bourgain's approach to the\nstudy of fluctuations by constructing weak correctors up to order $2d$, which\nalso clarifies the link between Bourgain's approach and the standard corrector\napproach to homogenization. Finally, we draw several consequences from those\ndifferent results, both for quantitative homogenization of ensemble averages\nand for asymptotic expansions of the annealed Green's function.\n"", 'The annealed Calderon-Zygmund estimate as convenient tool in\n quantitative stochastic homogenization This article is about the quantitative homogenization theory of linear\nelliptic equations in divergence form with random coefficients. We derive\ngradient estimates on the homogenization error, i.e. on the difference between\nthe actual solution and the two-scale expansion of the homogenized solution,\nboth in terms of strong norms (oscillation) and weak norms (fluctuation). These\nestimates are optimal in terms of scaling in the ratio between the microscopic\nand the macroscopic scale. The purpose of this article is to highlight the\nusage of the recently introduced annealed Calderon-Zygmund (CZ) estimates in\nobtaining the above, previously known, error estimates. Moreover, the article\nprovides a novel proof of these annealed CZ estimate that completely avoids\nquenched regularity theory, but rather relies on functional analysis. It is\nbased on the observation that even on the level of operator norms, the\nHelmholtz projection is close to the one for the homogenized coefficient (for\nwhich annealed CZ estimates are easily obtained). In this article, we strive\nfor simple proofs, and thus restrict ourselves to ensembles of coefficient\nfields that are local transformations of Gaussian random fields with integrable\ncorrelations and H\\""older continuous realizations. As in earlier work, we use\nthe natural objects from the general theory of homogenization, like the\n(potential and flux) correctors and the homogenization commutator. Both\noscillation and fluctuation estimates rely on a sensitivity calculus, i.e. on\nestimating how sensitively the quantity of interest does depend on an\ninfinitesimal change in the coefficient field, which is fed into the Spectral\nGap inequality. In this article, the annealed CZ estimate is the only form in\nwhich elliptic regularity theory enters.\n']","[('stochastic homogenization', 0.719310998916626), ('estimates homogenization', 0.6413835883140564), ('homogenization elliptic equations', 0.5429314374923706), ('homogenization elliptic', 0.5363515019416809), ('estimates stochastic', 0.5156412124633789), ('homogenization nonlinear', 0.5042369365692139), ('homogenization theory', 0.4994460642337799), ('homogenization results', 0.49492567777633667), ('quantitative homogenization', 0.48572206497192383), ('homogenized operator', 0.48488548398017883)]" 698,698,45,698_bernstein operators_approximation operators_operators approximation_operators approximate,"['bernstein operators', 'approximation operators', 'operators approximation', 'operators approximate', 'proposed operators', 'operators asymptotic', 'type operators', 'kantorovich operators', 'studied operators', 'operators']","['A class of Bernstein-type operators on the unit disk We construct and study sequences of linear operators of Bernstein-type acting\non bivariate functions defined on the unit disk. To this end, we study\nBernstein-type operators under a domain transformation, we analyse the\nbivariate Bernstein-Stancu operators, and we introduce Bernstein-type operators\non disk quadrants by means of continuously differentiable transformations of\nthe function. We state convergence results for continuous functions and we\nestimate the rate of convergence. Finally some interesting numerical examples\nare given, comparing approximations using the shifted Bernstein-Stancu and the\nBernstein-type operator on disk quadrants.\n', 'Chlodowsky variant of Bernstein-type operators on the domain In the present paper, we deal with Bernstein-Chlodowsky type operators for\napproximating functions on the domain. We first present Bernstein-Chlodowsky\ntype operators in two variables and then we discuss some examples of these\noperators under a domain transformation. Finally, we give bivarite shifted mth\nBernstein-Chlodowsky-Stancu operators and we present some figures for\napproximation properties of our operator.\n', ""Approximation of associated GBS operators by Szasz-Mirakjan type\n operators In this article, the approximation properties of the Szasz-Mirakjan type\noperators are studied for the function of two variables, and the rate of\nconvergence of the bivariate operators is determined in terms of total and\npartial modulus of continuity. An associated GBS (Generalized Boolean Sum)-form\nof the bivariate Szasz-Mirakjan type operators are considered for the function\nof two variables to find an approximation of B-continuous and B-differentiable\nfunction in the Bogel's space. Further, the degree of approximation of the GBS\ntype operators is found in terms of mixed modulus of smoothness and functions\nbelonging to the Lipschitz class as well as a pioneering result is obtained in\nterms of Peetre K-functional. Finally, the rate of convergence of the bivariate\nSzasz-Mirakjan type operators and the associated GBS type operators are\nexamined through graphical representation for the finite and infinite sum which\nshows that the rate of convergence of the associated GBS type operators is\nbetter than the bivariate Szasz-Mirakjan type operators.\n""]","[('bernstein operators', 0.665823221206665), ('approximation operators', 0.6486508250236511), ('operators approximation', 0.6383098363876343), ('operators approximate', 0.6029755473136902), ('proposed operators', 0.575474739074707), ('operators asymptotic', 0.5434933304786682), ('type operators', 0.5415695905685425), ('kantorovich operators', 0.5402398705482483), ('studied operators', 0.5358797907829285), ('operators', 0.520821750164032)]" 699,699,44,699_lyapunov exponents_maximal lyapunov exponent_lyapunov spectrum_lyapunov exponent,"['lyapunov exponents', 'maximal lyapunov exponent', 'lyapunov spectrum', 'lyapunov exponent', 'top lyapunov exponent', 'sets lyapunov', 'maximal lyapunov', 'lyapunov', 'ergodic measures', 'approximation lyapunov']","['Thermodynamic formalism of $GL_2(\\mathbb{R})$-cocycles with canonical\n holonomies We study singular value potentials of H\\""older continuous\n$GL_2(\\mathbb{R})$-cocycles over hyperbolic systems whose canonical holonomies\nconverge and are H\\""older continuous. Such cocycles include locally constant\n$GL_2(\\mathbb{R})$-cocycles as well as fiber-bunched\n$GL_2(\\mathbb{R})$-cocycles. We show that singular value potentials of\nirreducible such cocycles have unique equilibrium states. Among the reducible\ncocycles, we provide a characterization for cocycles whose singular value\npotentials have more than one equilibrium states.\n', 'H\\""older continuity of the Lyapunov exponent for Markov cocycles via\n Furstenberg\'s Formula This paper is concerned with the study of linear cocycles over uniformly\nergodic Markov shifts on a compact space of symbols. We establish the joint\nH\\""older continuity of the maximal Lyapunov exponent as a function of the\ncocycle and the transition kernel in the vicinity of any irreducible cocycle\nwith simple maximal Lyapunov exponent. Our approach, via Furstenberg\'s formula,\nshows the H\\""older continuous dependence on the data of the stationary measure\nof the projective cocycle and in particular provides a more computable H\\""older\nexponent.\n', 'Restricted variational principle of Lyapunov exponents for typical\n cocycles In this paper, we study the multifractal formalism of Lyapunov exponents for\ntypical cocycles. We establish a variational relation between the Legendre\ntransform of topological pressure of the generalized singular value function\nand measure-theoretic entropies. As a consequence, we show that the restricted\nvariational principle of Lyapunov exponents holds for typical cocycles.\n']","[('lyapunov exponents', 0.575231671333313), ('maximal lyapunov exponent', 0.5721226930618286), ('lyapunov spectrum', 0.5447952747344971), ('lyapunov exponent', 0.5437531471252441), ('top lyapunov exponent', 0.5334360003471375), ('sets lyapunov', 0.5298498868942261), ('maximal lyapunov', 0.5255438685417175), ('lyapunov', 0.5051527619361877), ('ergodic measures', 0.504288911819458), ('approximation lyapunov', 0.49955400824546814)]" 700,700,44,700_shape optimisation_shape optimization_shape optimization problems_optimal shape,"['shape optimisation', 'shape optimization', 'shape optimization problems', 'optimal shape', 'shape calculus', 'computing shape', 'constrained shape', 'shape functions', 'shape derivative', 'compute shape']","['PDE-constrained shape optimization: towards product shape spaces and\n stochastic models Shape optimization models with one or more shapes are considered in this\nchapter. Of particular interest for applications are problems in which where a\nso-called shape functional is constrained by a partial differential equation\n(PDE) describing the underlying physics. A connection can made between a\nclassical view of shape optimization and the differential-geometric structure\nof shape spaces. To handle problems where a shape functional depends on\nmultiple shapes, a theoretical framework is presented, whereby the optimization\nvariable can be represented as a vector of shapes belonging to a product shape\nspace. The multi-shape gradient and multi-shape derivative are defined, which\nallows for a rigorous justification of a steepest descent method with Armijo\nbacktracking. As long as the shapes as subsets of a hold-all domain do not\nintersect, solving a single deformation equation is enough to provide descent\ndirections with respect to each shape. Additionally, a framework for handling\nuncertainties arising from inputs or parameters in the PDE is presented. To\nhandle potentially high-dimensional stochastic spaces, a stochastic gradient\nmethod is proposed. A model problem is constructed, demonstrating how\nuncertainty can be introduced into the problem and the objective can be\ntransformed by use of the expectation. Finally, numerical experiments in the\ndeterministic and stochastic case are devised, which demonstrate the\neffectiveness of the presented algorithms.\n', 'A Novel $p$-Harmonic Descent Approach Applied to Fluid Dynamic Shape\n Optimization We introduce a novel method for the implementation of shape optimziation in\nfluid dynamics applications, where we propose to use the shape derivative to\ndetermine deformation fields with the help of the $p-$ Laplacian for $p > 2$.\nThis approach is closely related to the computation of steepest descent\ndirections of the shape functional in the $W^{1,\\infty}-$ topology. Our\napproach is demonstrated for shape optimization related to drag-minimal free\nfloating bodies. The method is validated against existing approaches with\nrespect to convergence of the optimization algorithm, the obtained shape, and\nregarding the quality of the computational grid after large deformations. Our\nnumerical results strongly indicate that shape optimization related to the\n$W^{1,\\infty}$-topology -- though numerically more demanding -- seems to be\nsuperior over the classical approaches invoking Hilbert space methods,\nconcerning the convergence, the obtained shapes and the mesh quality after\nlarge deformations, in particular when the optimal shape features sharp\ncorners.\n', 'Fireshape: a shape optimization toolbox for Firedrake We introduce Fireshape, an open-source and automated shape optimization\ntoolbox for the finite element software Firedrake. Fireshape is based on the\nmoving mesh method and allows users with minimal shape optimization knowledge\nto tackle with ease challenging shape optimization problems constrained to\npartial differential equations (PDEs).\n']","[('shape optimisation', 0.7844696640968323), ('shape optimization', 0.7811776995658875), ('shape optimization problems', 0.7415656447410583), ('optimal shape', 0.6716670989990234), ('shape calculus', 0.6258940696716309), ('computing shape', 0.6197201013565063), ('constrained shape', 0.6116191744804382), ('shape functions', 0.5933371782302856), ('shape derivative', 0.5816140174865723), ('compute shape', 0.5745591521263123)]" 701,701,44,701_optimal impulse_stochastic differential game_stochastic differential games_optimal stopping,"['optimal impulse', 'stochastic differential game', 'stochastic differential games', 'optimal stopping', 'impulse control', 'impulse control problems', 'dynamic programming principle', 'control continuous time', 'stochastic differential', 'sum differential game']","['Non-Markovian Impulse Control Under Nonlinear Expectation We consider a general type of non-Markovian impulse control problems under\nadverse non-linear expectation or, more specifically, the zero-sum game problem\nwhere the adversary player decides the probability measure. We show that the\nupper and lower value functions satisfy a dynamic programming principle (DPP).\nWe first prove the dynamic programming principle (DPP) for a truncated version\nof the upper value function in a straightforward manner. Relying on a uniform\nconvergence argument then enables us to show the DPP for the general setting.\nFollowing this, we use an approximation based on a combination of truncation\nand discretization to show that the upper and lower value functions coincide,\nthus establishing that the game has a value and that the DPP holds for the\nlower value function as well. Finally, we show that the DPP admits a unique\nsolution and give conditions under which a saddle-point for the game exists.\n As an example, we consider a stochastic differential game (SDG) of impulse\nversus classical control of path-dependent stochastic differential equations\n(SDEs).\n', 'A Finite Horizon Optimal Stochastic Impulse Control Problem with A\n Decision Lag This paper studies an optimal stochastic impulse control problem in a finite\nhorizon with a decision lag, by which we mean that after an impulse is made, a\nfixed number units of time has to be elapsed before the next impulse is allowed\nto be made. The continuity of the value function is proved. A suitable version\nof dynamic programming principle is established, which takes into account the\ndependence of state process on the elapsed time. The corresponding\nHamilton-Jacobi-Bellman (HJB) equation is derived, which exhibit some special\nfeature of the problem. The value function of this optimal impulse control\nproblem is characterized as the unique viscosity solution to the corresponding\nHJB equation. An optimal impulse control is constructed provided the value\nfunction is given. Moreover, a limiting case with the waiting time approaching\n$0$ is discussed.\n', 'Zero-sum Stochastic Differential Games of Impulse Versus Continuous\n Control by FBSDEs We consider a stochastic differential game in the context of forward-backward\nstochastic differential equations, where one player implements an impulse\ncontrol while the opponent controls the system continuously. Utilizing the\nnotion of ""backward semigroups"" we first prove the dynamic programming\nprinciple (DPP) for a truncated version of the problem in a straightforward\nmanner. Relying on a uniform convergence argument then enables us to show the\nDPP for the general setting. In particular, this avoids technical constraints\nimposed in previous works dealing with the same problem. Moreover, our approach\nallows us to consider impulse costs that depend on the present value of the\nstate process in addition to unbounded coefficients.\n Using the dynamic programming principle we deduce that the upper and lower\nvalue functions are both solutions (in viscosity sense) to the same\nHamilton-Jacobi-Bellman-Isaacs obstacle problem. By showing uniqueness of\nsolutions to this partial differential inequality we conclude that the game has\na value.\n']","[('optimal impulse', 0.6229838728904724), ('stochastic differential game', 0.6051530241966248), ('stochastic differential games', 0.6005265116691589), ('optimal stopping', 0.515313982963562), ('impulse control', 0.5081671476364136), ('impulse control problems', 0.5037730932235718), ('dynamic programming principle', 0.49247995018959045), ('control continuous time', 0.4335117042064667), ('stochastic differential', 0.43015575408935547), ('sum differential game', 0.4233149588108063)]" 702,702,44,702_semigroups_discrete semigroups_semigroup_commutative semigroups,"['semigroups', 'discrete semigroups', 'semigroup', 'commutative semigroups', 'commutative semigroup', 'sets strongly', 'subsemigroups', 'notions topological', 'notion central', 'combinatorial characterization']","['Exhibition of piecewise syndetic and broken IP sets near idempotent Characterizations of ultrafilters belong to the smallest ideal of\nStone-\\v{C}ech compactification of a discrete semigroup are exhibited using\nsyndetic sets, strongly central sets and very strongly central sets\nrespectively. These lead to represent piecewise syndetic sets of a semigroup in\nterms of the sets that contain a broken $\\mathcal{A}$ set, where\n$\\mathcal{A}\\in\\{$ syndetic, quasi-central, central, strongly central, very\nstrongly central$\\}$. Also, a characterization of broken IP$^{n}$ sets using\nultrafilters, and the equivalence between the sets that contain a broken IP set\nand sets that contain a broken IP$^{n}$ are established, $n\\in \\mathbb{N}$.\nWithout assuming the countability of a semigroup, it is shown that piecewise\nsyndetic sets i.e., sets that contain a broken syndetic set (broken IP set)\nforce uniform recurrence (recurrence respectively) and vice versa. In addition,\nall the said results are established near idempotent of a semitopological\nsemigroup.\n', 'Dynamical characterization of central sets along filter Using the notions of Topological dynamics, H. Furstenberg defined central\nsets and proved the Central Sets Theorem. Later V. Bergelson and N. Hindman\ncharacterized central sets in terms of algebra of the Stone-\\v{C}ech\nCompactification of discrete semigroup. They found that central sets are the\nmembers of the minimal idempotents of $\\beta S$, the Stone-\\v{C}ech\nCompactification of a semigroup $\\left(S,\\cdot\\right)$. We know that any closed\nsubsemigroup of $\\beta S$ is generated by a filter. We call a set $A$ to be a\n$\\mathcal{F}$-central set if it is a member of a minimal idempotent of a closed\nsubsemigroup of $\\beta S$, generated by the filter $\\mathcal{F}$. In this\narticle we will characterize the $\\mathcal{F}$-central sets dynamically.\n', 'A Study on Filter Version of Strongly Central Sets Using the notions of Topological dynamics, H. Furstenberg defined central\nsets and proved the Central Sets Theorem. Later V. Bergelson and N. Hindman\ncharacterized central sets in terms of algebra of the Stone-\\v{C}ech\ncompactification of discrete semigroup. They found that central sets are the\nmembers of the minimal idempotents of \\b{eta}S, the Stone-\\v{C}ech\ncompactification of a semigroup (S, .). Hindman and leader introduced the\nnotion of Central set near zero algebraically. Later dynamical and\ncombinatorial characterization have also been established. For any given filter\nF in S a set A is said to be a F- central set if it is a member of a minimal\nidempotent of a closed subsemigroup of \\b{eta}S, generated by the filter F. In\na recent article Bergelson, Hindman and Strauss introduced strongly central and\nvery strongly central sets in [BHS]. They also dynamically characterized the\nsets in the same paper. In the present article we will characterize the\nstrongly F- central sets dynamically and combinatorially. Here we introduce the\nfilter version of strongly central sets and very strongly central sets. We also\nprovide dynamical and combinatorial characterization of such sets.\n']","[('semigroups', 0.5650152564048767), ('discrete semigroups', 0.535225510597229), ('semigroup', 0.5163434743881226), ('commutative semigroups', 0.49854257702827454), ('commutative semigroup', 0.46843183040618896), ('sets strongly', 0.4307766854763031), ('subsemigroups', 0.42654114961624146), ('notions topological', 0.4233023524284363), ('notion central', 0.4141101539134979), ('combinatorial characterization', 0.4020634889602661)]" 703,703,44,703_saturated graphs_saturation number_sat minimum_saturation,"['saturated graphs', 'saturation number', 'sat minimum', 'saturation', 'minimum number edges', 'bipartite graphs', 'weak saturation', 'extremal graphs', 'number edges graph', 'subgraph']","['Saturation Numbers for Linear Forests $P_6$ + $tP_2$ A graph $G$ is $H$-saturated if it contains no $H$ as a subgraph, but does\ncontain $H$ after the addition of any edge in the complement of $G$. The\nsaturation number, $sat (n, H)$, is the minimum number of edges of a graph in\nthe set of all $H$-saturated graphs with order $n$. In this paper, we determine\nthe saturation number $sat (n, P_6 + tP_2)$ for $n \\geq 10t/3 + 10$ and\ncharacterize the extremal graphs for $n >10t/3 + 20$.\n', 'The saturation number of $K_{3,3}$ A graph $G$ is called $F$-saturated if $G$ does not contain $F$ as a subgraph\n(not necessarily induced) but the addition of any missing edge to $G$ creates a\ncopy of $F$. The saturation number of $F$, denoted by $sat(n,F)$, is the\nminimum number of edges in an $n$-vertex $F$-saturated graph. Determining the\nsaturation number of complete partite graphs is one of the most important\nproblems in the study of saturation number. The value of $sat(n,K_{2,2})$ was\nshown to be $\\lfloor\\frac{3n-5}{2}\\rfloor$ by Ollmann, and a shorter proof was\nlater given by Tuza. For $K_{2,3}$, there has been a series of study aiming to\ndetermine $sat(n,K_{2,3})$ over the years. This was finally achieved by Chen\nwho confirmed a conjecture of Bohman, Fonoberova, and Pikhurko that $sat(n,\nK_{2,3})= 2n-3$ for all $n\\geq 5$. In this paper, we prove a conjecture of\nPikhurko and Schmitt that $sat(n, K_{3,3})=3n-9$ when $n \\geq 9$.\n', 'The saturation number of wheels A graph $G$ is said to be $F$-free, if $G$ does not contain any copy of $F$.\n$G$ is said to be $F$-semi-saturated, if the addition of any nonedge $e \\not\n\\in E(G)$ would create a new copy of $F$ in $G+e$. $G$ is said to be\n$F$-saturated, if $G$ is $F$-free and $F$-semi-saturated. The saturation number\n$sat(n,F)$ (resp. semi-saturation number $ssat(n,F)$) is the minimum number of\nedges in an $F$-saturated (resp. $F$-semi-saturated) graph of order $n$. In\nthis paper we proved several results on the (semi)-saturation number of the\nwheel graph $W_k=K_1 \\vee C_k$. Let $k,n$ be positive integers with $k \\geq 8$\nand $n \\geq 56k^3$, we showed that $(s)sat(n,W_k)=n-1+(s)sat(n-1,C_k)$. We also\nestablish the lower bound of semi-saturation number of $W_k$ with restriction\non maximum degree.\n']","[('saturated graphs', 0.6762551069259644), ('saturation number', 0.5879009962081909), ('sat minimum', 0.4687013030052185), ('saturation', 0.4636145532131195), ('minimum number edges', 0.4529010057449341), ('bipartite graphs', 0.4314958155155182), ('weak saturation', 0.4217071235179901), ('extremal graphs', 0.42089512944221497), ('number edges graph', 0.4184594452381134), ('subgraph', 0.4142964482307434)]" 704,704,44,704_euclid_euclidean geometry_euclidean geometries_new geometry,"['euclid', 'euclidean geometry', 'euclidean geometries', 'new geometry', 'geometry', 'non euclidean geometries', 'euclidean', 'non euclidean', 'modern mathematics', 'axioms']","['On the Notion of Equal Figures in Euclid Euclid uses an undefined notion of ""equal figures"", to which he applies the\ncommon notions about equals added to equals or subtracted from equals. When (in\nprevious work) we formalized Euclid Book~I for computer proof-checking, we had\nto add fifteen axioms about undefined relations ""equal triangles"" and ""equal\nquadrilaterals"" to replace Euclid\'s use of the common notions. In this paper,\nwe offer definitions of ""equal triangles"" and ""equal quadrilaterals"", that\nEuclid could have given, and prove that they have the required properties. This\nremoves the need for adding new axioms. The proof uses the theory of\nproportions. Hence we also discuss the ""early theory of proportions"", which has\na long history.\n', 'It is not ""B\\\'ezout\'s identity"" Given two non-zero integers $a$ and $b$ there exist integers $m$ and $n$ for\nwhich $am-bn =(a,b)$. An increasing number of mathematicians have been calling\nthis `B\\\'ezout\'s identity\', some encouraged by finding ""identit\\\'e de B\\\'ezout""\nin Bourbaki\'s \\emph{\'El\\\'ements de math\\\'ematique}. Moreover the observation\nthat if $\\gcd(a,b)=1$ then this is an `if and only if\' condition, is sometimes\ncalled the ""Bachet-B\\\'ezout theorem"".\n However this is all in Euclid\'s work from around 300 B.C., when his writings\nare interpreted in context. So why does he not get credit? Some authors learned\nthe name ""B\\\'ezout\'s identity"" and have perhaps not consulted Euclid, so copied\nthe misattribution. Others, like some Nicolas Bourbaki collaborators, have\nperhaps browsed Euclid\'s results, but in a form written for the modern\nmathematician, and missed out on what he really did (though certainly others,\nsuch as Weil, did not). In this article we will carefully explain what Euclid\'s\narguments are and what his approach was. We will also share Kowalski\'s guess as\nto the reasons behind Bourbaki\'s misnomer.\n To appreciate Euclid, you need to read his work in context: Lengths are the\ncentral object of study to the geometer Euclid, though he brilliantly developed\nthe theory of the numbers that measured those lengths. Today\'s mathematicians\nread his number theory results as being about abstract numbers not\nmeasurements. However the correct interpretation changes how these results are\nperceived; Euclid\'s proofs make clear Euclid\'s intentions.\n These misperceptions reflect recent discussions about difficulties faced by\nindigenous people when learning mathematics. We discuss how some indigenous\ngroups may learn numbers in certain practical contexts, not as abstract\nentities, and struggle when curricula assume that we all share abstract numbers\nas a basic, primary fully-absorbed working tool.\n', 'Book I of Euclid\'s Elements and application of areas We work through Book I of Euclid\'s Elements with our focus on application of\nareas (I.42, I.44, I.45). We summarize alternate constructions from medieval\neditions of Euclid\'s elements and ancient and medieval commentaries. We remark\nthat Euclid\'s proof of I.44 involves a seldom commented on use of\nsuperposition, but that several medieval editions of Euclid give constructions\nthat avoid the use of superposition. This use of superposition is also avoided\nin Ralph Abraham\'s ``VCE: The Visual Constructions of Euclid\'\' C#12, C#12B at\nhttp://www.visual-euclid.org/vce/contents.html\n We collate the figures with the digitized editions of Euclid at (P)\nBiblioteca Apostolica Vaticana (BAV), Vat. gr. 190, (F) Biblioteca Medicea\nLaurenziana (BML), Plut. 28.03, (B) Bodleian, MS. D\'Orville 301, (V)\n\\""Osterreichische Nationalbibliothek, Cod. Phil. gr. 31, (b) Biblioteca\nComunale dell\'Archiginnasio, Collocazione A 19, (p) Biblioth\\`eque nationale de\nFrance, Grec 2466.\n']","[('euclid', 0.6077622175216675), ('euclidean geometry', 0.4579884111881256), ('euclidean geometries', 0.43431219458580017), ('new geometry', 0.41146212816238403), ('geometry', 0.4076915979385376), ('non euclidean geometries', 0.40646156668663025), ('euclidean', 0.4003154933452606), ('non euclidean', 0.3990643322467804), ('modern mathematics', 0.39890655875205994), ('axioms', 0.38902437686920166)]" 705,705,44,705_finite borel_finite graphs_closed graphs_locally finite borel,"['finite borel', 'finite graphs', 'closed graphs', 'locally finite borel', 'invariant borel', 'regular borel', 'chromatic numbers', 'chromatic number', 'every borel', 'graph admits']","['Jump operations for Borel graphs We investigate the class of bipartite Borel graphs organized by the order of\nBorel homomorphism. We show that this class is unbounded by finding a jump\noperator for Borel graphs analogous to a jump operator of Louveau for Borel\nequivalence relations. The proof relies on a non-separation result for iterated\nFrechet ideals and filters due to Debs and Saint Raymond. We give a new proof\nof this fact using effective descriptive set theory. We also investigate an\nanalogue of the Friedman-Stanley jump for Borel graphs. This analogue does not\nyield a jump operator for bipartite Borel graphs. However, we use it to answer\na question of Kechris and Marks by showing that there is a Borel graph with no\nBorel homomorphism to a locally countable Borel graph, but each of whose\nconnected components has a countable Borel coloring.\n', 'Local Problems on Trees from the Perspectives of Distributed Algorithms,\n Finitary Factors, and Descriptive Combinatorics We study connections between distributed local algorithms, finitary factors\nof iid processes, and descriptive combinatorics in the context of regular\ntrees.\n We extend the Borel determinacy technique of Marks coming from descriptive\ncombinatorics and adapt it to the area of distributed computing. Using this\ntechnique, we prove deterministic distributed $\\Omega(\\log n)$-round lower\nbounds for problems from a natural class of homomorphism problems.\nInterestingly, these lower bounds seem beyond the current reach of the powerful\nround elimination technique responsible for all substantial locality lower\nbounds of the last years. Our key technical ingredient is a novel ID graph\ntechnique that we expect to be of independent interest.\n We prove that a local problem admits a Baire measurable coloring if and only\nif it admits a local algorithm with local complexity $O(\\log n)$, extending the\nclassification of Baire measurable colorings of Bernshteyn. A key ingredient of\nthe proof is a new and simple characterization of local problems that can be\nsolved in $O(\\log n)$ rounds. We complement this result by showing separations\nbetween complexity classes from distributed computing, finitary factors, and\ndescriptive combinatorics. Most notably, the class of problems that allow a\ndistributed algorithm with sublogarithmic randomized local complexity is\nincomparable with the class of problems with a Borel solution.\n We hope that our treatment will help to view all three perspectives as part\nof a common theory of locality, in which we follow the insightful paper of\n[Bernshteyn -- arXiv 2004.04905].\n', ""Hyperfiniteness and Borel combinatorics We study the relationship between hyperfiniteness and problems in Borel graph\ncombinatorics by adapting game-theoretic techniques introduced by Marks to the\nhyperfinite setting. We compute the possible Borel chromatic numbers and edge\nchromatic numbers of bounded degree acyclic hyperfinite Borel graphs and use\nthis to answer a question of Kechris and Marks about the relationship between\nBorel chromatic number and measure chromatic number. We also show that for\nevery $d > 1$ there is a $d$-regular acyclic hyperfinite Borel bipartite graph\nwith no Borel perfect matching. These techniques also give examples of\nhyperfinite bounded degree Borel graphs for which the Borel local lemma fails,\nin contrast to the recent results of Cs\\'oka, Grabowski, M\\'ath\\'e, Pikhurko,\nand Tyros.\n Related to the Borel Ruziewicz problem, we show there is a continuous\nparadoxical action of $(\\mathbb{Z}/2\\mathbb{Z})^{*3}$ on a Polish space that\nadmits a finitely additive invariant Borel probability measure, but admits no\ncountably additive invariant Borel probability measure. In the context of\nstudying ultrafilters on the quotient space of equivalence relations under\n$\\mathrm{AD}$, we also construct an ultrafilter $U$ on the quotient of $E_0$\nwhich has surprising complexity. In particular, Martin's measure is\nRudin-Kiesler reducible to $U$.\n We end with a problem about whether every hyperfinite bounded degree Borel\ngraph has a witness to its hyperfiniteness which is uniformly bounded below in\nsize.\n""]","[('finite borel', 0.49538353085517883), ('finite graphs', 0.48963046073913574), ('closed graphs', 0.4758804738521576), ('locally finite borel', 0.4618191719055176), ('invariant borel', 0.4575294852256775), ('regular borel', 0.4471170902252197), ('chromatic numbers', 0.4391625225543976), ('chromatic number', 0.4295004904270172), ('every borel', 0.42627838253974915), ('graph admits', 0.42096850275993347)]" 706,706,44,706_estimates heat kernels_heat kernel estimates_dirichlet heat kernel_heat kernels,"['estimates heat kernels', 'heat kernel estimates', 'dirichlet heat kernel', 'heat kernels', 'heat kernel', 'kernel estimates', 'dirichlet heat', 'estimates dirichlet', 'dimensional evy processes', 'parabolic harnack inequality']","[""Dirichlet Heat kernel estimates for a large class of anisotropic Markov\n processes Let $Z=(Z^{1}, \\ldots, Z^{d})$ be the d-dimensional L\\'evy {process} where\n{$Z^i$'s} are independent 1-dimensional L\\'evy {processes} with identical\njumping kernel $ \\nu^1(r) =r^{-1}\\phi(r)^{-1}$. Here $\\phi$ is {an} increasing\nfunction with weakly scaling condition of order $\\underline \\alpha, \\overline\n\\alpha\\in (0, 2)$. We consider a symmetric function $J(x,y)$ comparable to\n\\begin{align*}\n \\begin{cases} \\nu^1(|x^i - y^i|)\\qquad&\\text{ if $x^i \\ne y^i$ for some $i$\nand $x^j = y^j$ for all $j \\ne i$}\\\\ 0\\qquad&\\text{ if $x^i \\ne y^i$ for more\nthan one index $i$}. \\end{cases} \\end{align*} Corresponding to the jumping\nkernel $J$, there exists an anisotropic Markov process $X$, see \\cite{KW22}. In\nthis article, we establish sharp two-sided Dirichlet heat kernel estimates for\n$X$ in $C^{1,1}$ open set, under certain regularity conditions. As an\napplication of the main results, we derive the Green function estimates.\n"", 'Heat kernel estimates for subordinate Markov processes and their\n applications In this paper, we establish sharp two-sided estimates for transition\ndensities of a large class of subordinate Markov processes. As applications, we\nshow that the parabolic Harnack inequality and H\\""older regularity hold for\nparabolic functions of such processes, and derive sharp two-sided Green\nfunction estimates.\n', 'Heat kernel estimates for Dirichlet forms degenerate at the boundary The goal of this paper is to establish sharp two-sided estimates on the heat\nkernels of two types of purely discontinuous symmetric Markov processes in the\nupper half-space of $\\mathbb R^d$ with jump kernels degenerate at the boundary.\nThe jump kernels are of the form $J(x,y)=\\mathcal B(x,y)|x-y|^{-\\alpha-d}$,\n$\\alpha\\in (0,2)$, where the function $\\mathcal B$ depends on four parameters\nand may vanish at the boundary. Our results are the first sharp two-sided\nestimates for the heat kernels of non-local operators with jump kernels\ndegenerate at the boundary. The first type of processes are conservative Markov\nprocesses on $\\overline{\\mathbb R}^d_+$ with jump kernel $J(x,y)$. Depending on\nthe regions where the parameters belong, the heat kernels estimates have three\ndifferent forms, two of them are qualitatively different from all previously\nknown heat kernel estimates. The second type of processes are the processes\nabove killed either by a critical potential or upon hitting the boundary of the\nhalf-space. We establish that their heat kernel estimates have the approximate\nfactorization property with survival probabilities decaying as a power of the\ndistance to the boundary, where the power depends on the constant in the\ncritical potential.\n']","[('estimates heat kernels', 0.6934442520141602), ('heat kernel estimates', 0.6870437860488892), ('dirichlet heat kernel', 0.6384848952293396), ('heat kernels', 0.5552181601524353), ('heat kernel', 0.5197460651397705), ('kernel estimates', 0.517298698425293), ('dirichlet heat', 0.46336767077445984), ('estimates dirichlet', 0.4620548188686371), ('dimensional evy processes', 0.4605426788330078), ('parabolic harnack inequality', 0.44640570878982544)]" 707,707,44,707_thermodynamic systems_entropy principle_properties entropy_thermodynamic,"['thermodynamic systems', 'entropy principle', 'properties entropy', 'thermodynamic', 'thermodynamics', 'law thermodynamics', 'second law thermodynamics', 'entropy', 'entropy can', 'entropy production']","['Thermodynamics of Encoding and Encoders Non-isolated systems have diverse coupling relations with the external\nenvironment. These relations generate complex thermodynamics and information\ntransmission between the system and its environment. The framework depicted in\nthe current research attempts to glance at the critical role of the internal\norders inside the non-isolated system in shaping the information thermodynamics\ncoupling. We characterize the coupling as a generalized encoding process, where\nthe system acts as an information thermodynamics encoder to encode the external\ninformation based on thermodynamics. We formalize the encoding process in the\ncontext of the nonequilibrium second law of thermodynamics, revealing an\nintrinsic difference in information thermodynamics characteristics between\ninformation thermodynamics encoders with and without internal correlations.\nDuring the information encoding process of an external source $\\mathsf{Y}$,\nspecific sub-systems in an encoder $\\mathsf{X}$ with internal correlations can\nexceed the information thermodynamics bound on\n$\\left(\\mathsf{X},\\mathsf{Y}\\right)$ and encode more information than system\n$\\mathsf{X}$ works as a whole. We computationally verify this theoretical\nfinding in an Ising model with a random external field and a neural data set of\nthe human brain during visual perception and recognition. Our analysis\ndemonstrates that the stronger internal correlation inside these systems\nimplies a higher possibility for specific sub-systems to encode more\ninformation than the global one. These findings may suggest a new perspective\nin studying information thermodynamics in diverse physical and biological\nsystems.\n', 'Mathematical Representation of Clausius\' and Kelvin\'s Statements of the\n Second Law and Irreversibility We provide a stochastic mathematical representation for Clausius\' and\nKelvin-Planck\'s statements of the Second Law of Thermodynamics in terms of the\nentropy productions of a finite, compact driven Markov system and its lift. A\nsurjective map is rigorously established through the lift when the state space\nis either a discrete graph or a continuous n-dimensional torus T^n. The\ncorresponding lifted processes have detailed balance thus a natural potential\nfunction but no stationary probability. We show that in the long-time limit the\nentropy production of the finite driven system precisely equals the potential\nenergy decrease in the lifted system. This theorem provides a dynamic\nfoundation for the two equivalent statements of Second Law of Thermodynamics, a\nla Kelvin\'s and Clausius\'. It suggests a modernized, combined statement: ""A\nmesoscopic engine that works in completing irreversible internal cycles\nstatistically has necessarily an external effect that lowering a weight\naccompanied by passing heat from a warmer to a colder body.""\n', 'The Role of Second Law of Thermodynamics in Continuum Physics: A Muschik\n and Ehrentraut Theorem Revisited Second law of thermodynamics imposes that in any thermodynamic process the\nentropy production must be nonnegative. In continuum physics such a requirement\nis fulfilled by postulating the constitutive equations which represent the\nmaterial properties of the bodies in such a way that second law of\nthermodynamics is satisfied in arbitrary processes. Such an approach, first\nassumed in some pioneering papers by Coleman and Noll \\cite{ColNol} and Coleman\nand Mizel \\cite{ColMiz}, in practice regards second law of thermodynamics as a\nrestriction on the constitutive equations, which must guarantee that any\nsolution of the balance laws satisfies also the entropy inequality. As observed\nby Muschik and Ehrentraut \\cite{MusEhr}, this is a useful operative assumption,\nbut not a consequence of general physical laws. Indeed, a different point of\nview, which regards second law of thermodynamics as a restriction on the\nthermodynamic processes, i.e., on the solutions of the system of balance laws,\nis possible. This is tantamount to assume that there are solutions of the\nbalance laws which satisfy the entropy inequality, and solutions which do not\nsatisfy it. In order to decide what is the correct approach, Muschik and\nErhentraut postulated an amendment to the second law, which makes explicit the\nevident but rather hidden assumption that in any point of the body the entropy\nproduction is zero if, and only if, this point is thermodynamic equilibrium.\nThen they proved that, given the amendment, second law of thermodynamics is\nnecessarily a restriction on the constitutive equations and not on the\nthermodynamic processes. In the present paper we revisit their proof, lighting\nup some geometric aspects which were hidden in Ref. \\cite{MusEhr}. Moreover, we\npropose an alternative formulation of second law of thermodynamics which\nincorporates the amendment.\n']","[('thermodynamic systems', 0.6658456325531006), ('entropy principle', 0.6545236110687256), ('properties entropy', 0.642338216304779), ('thermodynamic', 0.6374297738075256), ('thermodynamics', 0.6145360469818115), ('law thermodynamics', 0.6099252700805664), ('second law thermodynamics', 0.6086845993995667), ('entropy', 0.5886390209197998), ('entropy can', 0.5815935730934143), ('entropy production', 0.5775118470191956)]" 708,708,44,708_flocking behavior_hydrodynamics_flocking_hydrodynamic,"['flocking behavior', 'hydrodynamics', 'flocking', 'hydrodynamic', 'smale dynamics', 'solutions hydrodynamic', 'flocks', 'flock', 'hydrodynamic limit', 'kinetic fluid']","['Well-posedness and Long Time Behavior of the Euler Alignment System with\n Adaptive Communication Strength We study a new flocking model which has the versatility to capture the\nphysically realistic qualitative behavior of the Motsch-Tadmor model, while\nalso retaining the entropy law, which lends to a similar 1D global\nwell-posedness analysis to the Cucker-Smale model. This is an improvement to\nthe situation in the Cucker-Smale case, which may display the physically\nunrealistic behavior that large flocks overpower the dynamics of small, far\naway flocks; and it is an improvement in the situation in the Motsch-Tadmor\ncase, where 1D global well-posedness is not known. The new model was proposed\nin arXiv:2211.00117v3 and has a similar structure to the Cucker-Smale and\nMotsch-Tadmor hydrodynamic systems, but with a new feature: the communication\nstrength is not fixed, but evolves in time according to its own transport\nequation along the Favre-filtered velocity field. This transport of the\ncommunication strength is precisely what preserves the entropy law. A variety\nof phenomenological behavior can be obtained from various choices of the\ninitial communication strength, including the aforementioned Motsch-Tadmor-like\nbehavior. We develop the general well-posedness theory for the new model and\nstudy the long time behavior -- including alignment, strong flocking in 1D, and\nentropy estimates to estimate the distribution of the limiting flock, all of\nwhich extend the classical results of the Cucker-Smale case. In addition, we\nprovide numerical evidence to show the similar qualitative behavior\n', ""Swarming: hydrodynamic alignment with pressure We study the swarming behavior of hydrodynamic alignment. Alignment reflects\nsteering towards a weighted average heading. We consider the class of so-called\n$p$-alignment hydrodynamics, based on $2p$-Laplacians, and weighted by a\ngeneral family of symmetric communication kernels. The main new aspect here is\nthe long time emergence behavior for a general class of pressure tensors\nwithout a closure assumption, beyond the mere requirement that they form an\nenergy dissipative process. We refer to such pressure laws as `entropic', and\nprove the flocking of $p$-alignment hydrodynamics, driven by singular kernels\nwith general class of entropic pressure tensors. These results indicate the\nrigidity of alignment in driving long-time flocking behavior despite the lack\nof thermodynamic closure.\n"", 'Inevitable monokineticity of strongly singular alignment We prove that certain types of measure-valued mappings are monokinetic i.e.\nthe distribution of velocity is concentrated in a Dirac mass. These include\nweak measure-valued solutions to the strongly singular Cucker-Smale model with\nsingularity of order $\\alpha$ greater or equal to the dimension of the ambient\nspace. Consequently, we are able to answer a couple of open questions related\nto the singular Cucker-Smale model. First, we prove that weak measure-valued\nsolutions to the strongly singular Cucker-Smale kinetic equation are\nmonokinetic, under very mild assumptions that they are uniformly compactly\nsupported and weakly continuous in time. This can be interpreted as a rigorous\nderivation of the macroscopic fractional Euler-alignment system from kinetic\nCucker-Smale equation without the need to perform any hydrodynamical limit.\n This suggests superior suitability of the macroscopic framework to describe\nlarge-crowd limits of strongly singular Cucker-Smale dynamics.\n Second, we perform a direct micro- to macroscopic mean-field limit from the\nCucker-Smale particle system to the fractional Euler-alignment model. This\nleads to the final result -- existence of weak solutions to the fractional\nEuler-alignment system with almost arbitrary initial data in $\\mathbb{R}^1$,\nincluding the possibility of vacuum. Existence can be extended to\n$\\mathbb{R}^2$ under the a priori assumption that the density of the mean-field\nlimit has no atoms.\n']","[('flocking behavior', 0.5247926115989685), ('hydrodynamics', 0.450251042842865), ('flocking', 0.43959078192710876), ('hydrodynamic', 0.41765615344047546), ('smale dynamics', 0.416186660528183), ('solutions hydrodynamic', 0.39042773842811584), ('flocks', 0.3876889944076538), ('flock', 0.3851374089717865), ('hydrodynamic limit', 0.38260358572006226), ('kinetic fluid', 0.3415936231613159)]" 709,709,44,709_dimensional chaotic systems_dimensional chaotic_chaos theory_chaotic systems,"['dimensional chaotic systems', 'dimensional chaotic', 'chaos theory', 'chaotic systems', 'chaotic dynamical systems', 'chaotic dynamics', 'chaotic attractors', 'chaotic system', 'chaotic dynamical', 'chaotic behavior']","['A computable realization of Ruelle\'s formula for linear response of\n statistics in chaotic systems We present a computable reformulation of Ruelle\'s linear response formula for\nchaotic systems. The new formula, called Space-Split Sensitivity or S3,\nachieves an error convergence of the order ${\\cal O}(1/\\sqrt{N})$ using $N$\nphase points. The reformulation is based on splitting the overall sensitivity\ninto that to stable and unstable components of the perturbation. The unstable\ncontribution to the sensitivity is regularized using ergodic properties and the\nhyperbolic structure of the dynamics. Numerical examples of uniformly\nhyperbolic attractors are used to validate the S3 formula against a na\\""ive\nfinite-difference calculation; sensitivities match closely, with far fewer\nsample points required by S3.\n', ""Space-split algorithm for sensitivity analysis of discrete chaotic\n systems with unstable manifolds of arbitrary dimension Accurate approximations of the change of system's output and its statistics\nwith respect to the input are highly desired in computational dynamics.\nRuelle's linear response theory provides breakthrough mathematical machinery\nfor computing the sensitivity of chaotic dynamical systems, which enables a\nbetter understanding of chaotic phenomena. In this paper, we propose an\nalgorithm for sensitivity analysis of discrete chaos with an arbitrary number\nof positive Lyapunov exponents. We combine the concept of perturbation\nspace-splitting regularizing Ruelle's original expression together with\nmeasure-based parameterization of the expanding subspace. We use these tools to\nrigorously derive trajectory-following recursive relations that exponentially\nconverge, and construct a memory-efficient Monte Carlo scheme for derivatives\nof the output statistics. Thanks to the regularization and lack of simplifying\nassumptions on the behavior of the system, our method is immune to the common\nproblems of other popular systems such as the exploding tangent solutions and\nunphysicality of shadowing directions. We provide a ready-to-use algorithm,\nanalyze its complexity, and demonstrate several numerical examples of\nsensitivity computation of physically-inspired low-dimensional systems.\n"", ""Efficient computation of linear response of chaotic attractors with\n one-dimensional unstable manifolds This paper presents the space-split sensitivity or the S3 algorithm to\ntransform Ruelle's linear response formula into a well-conditioned\nergodic-averaging computation. We prove a decomposition of Ruelle's formula\nthat is differentiable on the unstable manifold, which we assume to be\none-dimensional. This decomposition of Ruelle's formula ensures that one of the\nresulting terms, the stable contribution, can be computed using a regularized\ntangent equation, similar to in a non-chaotic system. The remaining term, known\nas the unstable contribution, is regularized and converted into an efficiently\ncomputable ergodic average. In this process, we develop new algorithms, which\nmay be useful beyond linear response, to compute i) a fundamental statistical\nquantity we introduce called the density gradient, and ii) the unstable\nderivatives of the regularized tangent vector field and the unstable direction.\nWe prove that the S3 algorithm, which combines these computational ingredients\nthat enter the stable and unstable contribution, converges like a Monte Carlo\napproximation of Ruelle's formula. The algorithm presented here is hence a\nfirst step toward full-fledged applications of sensitivity analysis in chaotic\nsystems, wherever such applications have been limited due to lack of\navailability of long-term sensitivities.\n""]","[('dimensional chaotic systems', 0.6392607092857361), ('dimensional chaotic', 0.5914725661277771), ('chaos theory', 0.5914402604103088), ('chaotic systems', 0.5848188996315002), ('chaotic dynamical systems', 0.5772156119346619), ('chaotic dynamics', 0.5464558601379395), ('chaotic attractors', 0.5389350652694702), ('chaotic system', 0.5334853529930115), ('chaotic dynamical', 0.5331636667251587), ('chaotic behavior', 0.5079637765884399)]" 710,710,44,710_discrete morse theory_homology morse_morse theoretic_discrete morse,"['discrete morse theory', 'homology morse', 'morse theoretic', 'discrete morse', 'morse complex', 'morse functions', 'morse theory', 'morse sequence', 'simplicial complexes', 'associated simplicial complexes']","[""The Connectedness Homomorphism between Discrete Morse Complexes Given two discrete Morse functions on a simplicial complex, we introduce the\n{\\em connectedness homomorphism} between the corresponding discrete Morse\ncomplexes. This concept leads to a novel framework for studying the\nconnectedness in discrete Morse theory at the chain complex level. In\nparticular, we apply it to describe a discrete analogy to `cusp-degeneration'\nof Morse complexes. A precise comparison between smooth case and our discrete\ncases is also given.\n"", ""Strong discrete Morse theory The purpose of this work is to develop a version of Forman's discrete Morse\ntheory for simplicial complexes, based on internal strong collapses. Classical\ndiscrete Morse theory can be viewed as a generalization of Whitehead's\ncollapses, where each Morse function on a simplicial complex $K$ defines a\nsequence of elementary internal collapses. This reduction guarantees the\nexistence of a CW-complex that is homotopy equivalent to $K$, with cells\ncorresponding to the critical simplices of the Morse function. However, this\napproach lacks an explicit combinatorial description of the attaching maps,\nwhich limits the reconstruction of the homotopy type of $K$. By restricting\ndiscrete Morse functions to those induced by total orders on the vertices, we\ndevelop a strong discrete Morse theory, generalizing the strong collapses\nintroduced by Barmak and Minian. We show that, in this setting, the resulting\nreduced CW-complex is regular, enabling us to recover its homotopy type\ncombinatorially. We also provide an algorithm to compute this reduction and\napply it to obtain efficient structures for complexes in the library of\ntriangulations by Benedetti and Lutz.\n"", 'Gradient Vector Fields of Discrete Morse Functions and Watershed-cuts In this paper, we study a class of discrete Morse functions, coming from\nDiscrete Morse Theory, that are equivalent to a class of simplicial stacks,\ncoming from Mathematical Morphology. We show that, as in Discrete Morse Theory,\nwe can see the gradient vector field of a simplicial stack (seen as a discrete\nMorse function) as the only relevant information we should consider. Last, but\nnot the least, we also show that the Minimum Spanning Forest of the dual graph\nof a simplicial stack is induced by the gradient vector field of the initial\nfunction. This result allows computing a watershed-cut from a gradient vector\nfield.\n']","[('discrete morse theory', 0.7448195815086365), ('homology morse', 0.7032551169395447), ('morse theoretic', 0.6960250735282898), ('discrete morse', 0.6809539794921875), ('morse complex', 0.6675131320953369), ('morse functions', 0.6510308384895325), ('morse theory', 0.6501314640045166), ('morse sequence', 0.6138629913330078), ('simplicial complexes', 0.5608404278755188), ('associated simplicial complexes', 0.5153635144233704)]" 711,711,44,711_kinetic transport_reaction diffusion systems_reaction diffusion_analysis kinetic,"['kinetic transport', 'reaction diffusion systems', 'reaction diffusion', 'analysis kinetic', 'kinetic', 'based kinetic', 'diffusion', 'nonlinear diffusion', 'aggregation diffusion', 'chemotaxis term']","[""Derivation of the bacterial run-and-tumble kinetic model : quantitative and strong convergence results During the past century, biologists and mathematicians investigated two mechanisms underlying bacteria motion: the run phase during which bacteria move in straight lines and the tumble phase in which they change their orientation. When surrounded by a chemical attractant, experiments show that bacteria increase their run time as moving up concentration gradients, leading to a biased random walk towards favorable regions. This observation raises the following question, which has drawn intense interest from both biological and mathematical communities: what cellular mechanisms enable bacteria to feel concentration gradients\\,? In this article, we investigate an asymptotic regime that was proposed to explain this ability thanks to internal mechanisms. More precisely, we derive the run-and-tumble kinetic equation with concentration's gradient dependent tumbling rate from a more comprehensive model, which incorporates internal cellular mechanisms. Our result improves on previous investigations, as we obtain strong convergence towards the gradient dependent kinetic model with quantitative and formally optimal convergence rates. The main ingredient consists in identifying a set of coordinates for the internal cellular dynamics in which concentration gradients arise explicitly. Then, we use relative entropy methods in order to capture quantitative measurement of the distance between the model incorporating cellular mechanisms and the one with concentration gradient dependent tumbling rate."", 'Effects of internal dynamics on chemotactic aggregation of bacteria The effects of internal adaptation dynamics on the self-organized aggregation\nof chemotactic bacteria are investigated by Monte Carlo (MC) simulations based\non a two-stream kinetic transport equation coupled with a reaction-diffusion\nequation of the chemoattractant that bacteria produce. A remarkable finding is\na nonmonotonic behavior of the peak aggregation density with respect to the\nadaptation time; more specifically, aggregation is the most enhanced when the\nadaptation time is comparable to or moderately larger than the mean run time of\nbacteria. Another curious observation is the formation of a trapezoidal\naggregation profile occurring at a very large adaptation time, where the biased\nmotion of individual cells is rather hindered at the plateau regimes due to the\nboundedness of the tumbling frequency modulation. Asymptotic analysis of the\nkinetic transport system is also carried out, and a novel asymptotic equation\nis obtained at the large adaptation-time regime while the Keller-Segel type\nequations are obtained when the adaptation time is moderate. Numerical\ncomparison of the asymptotic equations with MC results clarifies that\ntrapezoidal aggregation is well described by the novel asymptotic equation, and\nthe nonmonotonic behavior of the peak aggregation density is interpreted as the\ntransient of the asymptotic solutions between different adaptation time\nregimes.\n', 'Kinetic chemotaxis tumbling kernel determined from macroscopic\n quantities Chemotaxis is the physical phenomenon that bacteria adjust their motions\naccording to chemical stimulus. A classical model for this phenomenon is a\nkinetic equation that describes the velocity jump process whose\ntumbling/transition kernel uniquely determines the effect of chemical stimulus\non bacteria. The model has been shown to be an accurate model that matches with\nbacteria motion qualitatively. For a quantitative modeling, biophysicists and\npractitioners are also highly interested in determining the explicit value of\nthe tumbling kernel. Due to the experimental limitations, measurements are\ntypically macroscopic in nature. Do macroscopic quantities contain enough\ninformation to recover microscopic behavior? In this paper, we give a positive\nanswer. We show that when given a special design of initial data, the\npopulation density, one specific macroscopic quantity as a function of time,\ncontains sufficient information to recover the tumbling kernel and its\nassociated damping coefficient. Moreover, we can read off the chemotaxis\ntumbling kernel using the values of population density directly from this\nspecific experimental design. This theoretical result using kinetic theory\nsheds light on how practitioners may conduct experiments in laboratories.\n']","[('kinetic transport', 0.517693042755127), ('reaction diffusion systems', 0.5051084160804749), ('reaction diffusion', 0.49913233518600464), ('analysis kinetic', 0.48656484484672546), ('kinetic', 0.47584205865859985), ('based kinetic', 0.41171079874038696), ('diffusion', 0.40859243273735046), ('nonlinear diffusion', 0.38766199350357056), ('aggregation diffusion', 0.3747609257698059), ('chemotaxis term', 0.37174493074417114)]" 712,712,44,712_eigenfunctions laplace beltrami_laplacian eigenfunctions_smooth compact riemannian_compact riemannian,"['eigenfunctions laplace beltrami', 'laplacian eigenfunctions', 'smooth compact riemannian', 'compact riemannian', 'laplace beltrami operator', 'compact riemannian manifold', 'sub laplacians', 'beltrami operator compact', 'estimates laplace', 'eigenfunctions laplace']","['Growth of high $L^p$ norms for eigenfunctions: an application of\n geodesic beams This work concerns $L^p$ norms of high energy Laplace eigenfunctions,\n$(-\\Delta_g-\\lambda^2)\\phi_\\lambda=0$, $\\|\\phi_\\lambda\\|_{L^2}=1$. In 1988,\nSogge gave optimal estimates on the growth of $\\|\\phi_\\lambda\\|_{L^p}$ for a\ngeneral compact Riemannian manifold. The goal of this article is to give\ngeneral dynamical conditions guaranteeing quantitative improvements in $L^p$\nestimates for $p>p_c$, where $p_c$ is the critical exponent. We also apply\nprevious results of the authors to obtain quantitative improvements in concrete\ngeometric settings including all product manifolds. These are the first results\nimproving estimates for the $L^p$ growth of eigenfunctions that only require\ndynamical assumptions. In contrast with previous improvements, our assumptions\nare local in the sense that they depend only on the geodesics passing through a\nshrinking neighborhood of a given set in $M$. Moreover, the article gives a\nstructure theorem for eigenfunctions which saturate the quantitatively improved\n$L^p$ bound. Modulo an error, the theorem describes these eigenfunctions as\nfinite sums of quasimodes which, roughly, approximate zonal harmonics on the\nsphere scaled by $1/\\sqrt{\\log \\lambda}$.\n', ""Fourier coefficients of restrictions of eigenfunctions Let $\\{e_j\\}$ be an orthonormal basis of Laplace eigenfunctions of a compact\nRiemannian manifold $(M,g)$. Let $H \\subset M$ be a submanifold and let\n$\\{\\psi_k\\}$ be an orthonormal basis of Laplace eigenfunctions of $H$ with the\ninduced metric. We obtain joint asymptotics for the Fourier coefficients \\[\n \\langle \\gamma_H e_j, \\psi_k \\rangle_{L^2(H)} = \\int_H e_j \\overline \\psi_k\n\\, dV_H, \\] of restrictions $\\gamma_H e_j$ of $e_j$ to $H$. In particular, we\nobtain asymptotics for the sums of the norm-squares of the Fourier coefficients\nover the joint spectrum $\\{(\\mu_k, \\lambda_j)\\}_{j,k - 0}^{\\infty}$ of the\n(square roots of the) Laplacian $\\Delta_M$ on $M$ and the Laplacian $\\Delta_H$\non $H$ in a family of suitably `thick' regions in $\\mathbb R^2$. Thick regions\ninclude (1) the truncated cone $\\mu_k/\\lambda_j \\in [a,b] \\subset (0,1)$ and\n$\\lambda_j \\leq \\lambda$, and (2) the slowly thickening strip $|\\mu_k -\nc\\lambda_j| \\leq w(\\lambda)$ and $\\lambda_j \\leq \\lambda$, where $w(\\lambda)$\nis monotonic and $1 \\ll w(\\lambda) \\lesssim \\lambda^{1 - 1/n}$. Key tools for\nobtaining these asymptotics include the composition calculus of Fourier\nintegral operators and a new multidimensional Tauberian theorem.\n"", 'Improvements for eigenfunction averages: An application of geodesic\n beams Let $(M,g)$ be a smooth, compact Riemannian manifold and $\\{\\phi_\\lambda \\}$\nan $L^2$-normalized sequence of Laplace eigenfunctions, $-\\Delta_g\\phi_\\lambda\n=\\lambda^2 \\phi_\\lambda$. Given a smooth submanifold $H \\subset M$ of\ncodimension $k\\geq 1$, we find conditions on the pair $(M,H)$, even when\n$H=\\{x\\}$, for which $$ \\Big|\\int_H\\phi_\\lambda\nd\\sigma_H\\Big|=O\\Big(\\frac{\\lambda^{\\frac{k-1}{2}}}{\\sqrt{\\log\n\\lambda}}\\Big)\\qquad \\text{or}\\qquad |\\phi_\\lambda(x)|=O\\Big(\\frac{\\lambda\n^{\\frac{n-1}{2}}}{\\sqrt{\\log \\lambda}}\\Big), $$ as $\\lambda\\to \\infty$. These\nconditions require no global assumption on the manifold $M$ and instead relate\nto the structure of the set of recurrent directions in the unit normal bundle\nto $H$. Our results extend all previously known conditions guaranteeing\nimprovements on averages, including those on sup-norms. For example, we show\nthat if $(M,g)$ is a surface with Anosov geodesic flow, then there are\nlogarithmically improved averages for any $H\\subset M$. We also find weaker\nconditions than having no conjugate points which guarantee $\\sqrt{\\log\n\\lambda}$ improvements for the $L^\\infty$ norm of eigenfunctions. Our results\nare obtained using geodesic beam techniques, which yield a mechanism for\nobtaining general quantitative improvements for averages and sup-norms.\n']","[('eigenfunctions laplace beltrami', 0.5458252429962158), ('laplacian eigenfunctions', 0.516021192073822), ('smooth compact riemannian', 0.48253461718559265), ('compact riemannian', 0.4744422733783722), ('laplace beltrami operator', 0.4595477283000946), ('compact riemannian manifold', 0.45229968428611755), ('sub laplacians', 0.45047691464424133), ('beltrami operator compact', 0.4479421079158783), ('estimates laplace', 0.4447207450866699), ('eigenfunctions laplace', 0.4394318759441376)]" 713,713,43,713_difference galois theory_differential galois theory_difference galois_differential galois,"['difference galois theory', 'differential galois theory', 'difference galois', 'differential galois', 'differential galois group', 'difference equations', 'differential transcendence', 'galois theory linear', 'galois theory', 'linear difference equations']","['Hypertranscendence and linear difference equations After H\\""older proved his classical theorem about the Gamma function, there\nhas been a whole bunch of results showing that solutions to linear difference\nequations tend to be hypertranscendental i.e. they cannot be solution to an\nalgebraic differential equation). In this paper, we obtain the first complete\nresults for solutions to general linear difference equations associated with\nthe shift operator $x\\mapsto x+h$ ($h\\in\\mathbb{C}^*$), the $q$-difference\noperator $x\\mapsto qx$ ($q\\in\\mathbb{C}^*$ not a root of unity), and the Mahler\noperator $x\\mapsto x^p$ ($p\\geq 2$ integer). The only restriction is that we\nconstrain our solutions to be expressed as (possibly ramified) Laurent series\nin the variable $x$ with complex coefficients (or in the variable $1/x$ in some\nspecial case associated with the shift operator). Our proof is based on the\nparametrized difference Galois theory initiated by Hardouin and Singer. We also\ndeduce from our main result a general statement about algebraic independence of\nvalues of Mahler functions and their derivatives at algebraic points.\n', 'Computing differential Galois groups of second-order linear\n $q$-difference equations We apply the differential Galois theory for difference equations developed by\nHardouin and Singer to compute the differential Galois group for a second-order\nlinear $q$-difference equation with rational function coefficients. This Galois\ngroup encodes the possible polynomial differential relations among the\nsolutions of the equation. We apply our results to compute the differential\nGalois groups of several concrete $q$-difference equations, including for the\ncolored Jones polynomial of a certain knot.\n', 'Differential transcendence criteria for second-order linear difference\n equations and elliptic hypergeometric functions We develop general criteria that ensure that any non-zero solution of a given\nsecond-order difference equation is differentially transcendental, which apply\nuniformly in particular cases of interest, such as shift difference equations,\nq-dilation difference equations, Mahler difference equations, and elliptic\ndifference equations. These criteria are obtained as an application of\ndifferential Galois theory for difference equations. We apply our criteria to\nprove a new result to the effect that most elliptic hypergeometric functions\nare differentially transcendental.\n']","[('difference galois theory', 0.6130079627037048), ('differential galois theory', 0.5459491014480591), ('difference galois', 0.5059323310852051), ('differential galois', 0.5020899772644043), ('differential galois group', 0.4994033873081207), ('difference equations', 0.460208922624588), ('differential transcendence', 0.45734888315200806), ('galois theory linear', 0.43917325139045715), ('galois theory', 0.4332095980644226), ('linear difference equations', 0.4258568584918976)]" 714,714,43,714_compactifications moduli_compactification moduli space_compactification moduli_moduli space surfaces,"['compactifications moduli', 'compactification moduli space', 'compactification moduli', 'moduli space surfaces', 'elliptic k3 surfaces', 'surfaces moduli', 'toroidal compactification', 'k3 surfaces', 'compactifications', 'compact moduli']","['Compactifications of moduli spaces of K3 surfaces with a higher-order\n nonsymplectic automorphism We describe Baily-Borel, toroidal, and geometric -- using the KSBA stable\npairs -- compactifications of some moduli spaces of K3 surfaces with a\nnonsymplectic automorphism of order $3$ and $4$ for which the fixed locus of\nthe automorphism contains a curve of genus $\\ge2$. For order $3$, we treat all\nthe maximal-dimensional such families. We show that the toroidal and the KSBA\ncompactifications in these cases admit simple descriptions in terms of certain\n$ADE$ root lattices.\n', ""The KSBA compactification of the moduli space of $D_{1,6}$-polarized\n Enriques surfaces We describe a compactification by stable pairs (also known as KSBA\ncompactification) of the $4$-dimensional family of Enriques surfaces which\narise as the $\\mathbb{Z}_2^2$-covers of the blow up of $\\mathbb{P}^2$ at three\ngeneral points branched along a configuration of three pairs of lines. Up to a\nfinite group action, we show that this compactification is isomorphic to the\ntoric variety associated to the secondary polytope of the unit cube. We relate\nthe KSBA compactification considered to the Baily-Borel compactification of the\nsame family of Enriques surfaces. Part of the KSBA boundary has a toroidal\nbehavior, another part is isomorphic to the Baily-Borel compactification, and\nwhat remains is a mixture of these two. We relate the stable pair\ncompactification studied here with Looijenga's semitoric compactifications.\n"", ""Compactifications of moduli space of (quasi-)trielliptic K3 surfaces We study the moduli space $\\mathcal{F}_{T_1}$ of quasi-trielliptic K3\nsurfaces of type I, whose general member is a smooth bidegree\n$(2,3)$-hypersurface of $\\mathbb{P}^1\\times \\mathbb{P}^2$. Such moduli space\nplays an important role in the study of the Hassett-Keel-Looijenga program of\nthe moduli space of degree $8$ quasi-polarized K3 surfaces.\n In this paper, we consider several natural compactifications of\n$\\mathcal{F}_{T_1}$, such as the GIT compactification and arithmetic\ncompactifications. We give a complete analysis of GIT stability of\n$(2,3)$-hypersurfaces and provide a concrete description of the boundary of the\nGIT compactification. For the Baily--Borel compactification of the\nquasi-trielliptic K3 surfaces, we also compute the configurations of the\nboundary by classifying certain lattice embeddings. As an application, we show\nthat $(\\mathbb{P}^1\\times \\mathbb{P}^2,\\epsilon S)$ with small $\\epsilon$ is\nK-stable if $S$ is a K3 surface with at worst ADE singularities. This gives a\nconcrete description of the boundary of the K-stability compactification via\nthe identification of the GIT stability and the K-stability. We also discuss\nthe connection between the GIT, Baily--Borel compactification, and Looijenga's\ncompactifications by studying the projective models of quasi-trielliptic K3\nsurfaces.\n""]","[('compactifications moduli', 0.7279481291770935), ('compactification moduli space', 0.7078112959861755), ('compactification moduli', 0.7054637670516968), ('moduli space surfaces', 0.70524001121521), ('elliptic k3 surfaces', 0.6532180905342102), ('surfaces moduli', 0.6469427347183228), ('toroidal compactification', 0.6328083872795105), ('k3 surfaces', 0.6146141290664673), ('compactifications', 0.6125187873840332), ('compact moduli', 0.5994833111763)]" 715,715,43,715_pursuit evasion_strategies game_pursuit_differential game theory,"['pursuit evasion', 'strategies game', 'pursuit', 'differential game theory', 'optimal strategies', 'differential game', 'differential games', 'matrix game', 'attacker defender', 'defender']","['Pursuit-Evasion Game with Hybrid System of Dynamics We consider a pursuit-evasion differential game with a Hybrid system of\ndynamics in Hilbert space with integral constraints on the control functions of\nplayers. We show that the pursuer has a winning strategy.\n', 'Analytical Pursuit-Evasion Game Strategy in Arbitrary Keplerian\n Reference Orbits This paper develops an analytical strategy for solving the linear quadratic\npursuit-evasion game in arbitrary Keplerian reference orbits. The motion of the\npursuer and evader is described using the controlled Tschauner-Hempel\nequations, and the optimal game strategies of the pursuer and evader are\npresented by the solution of the differential Riccati equation.The analytical\nsolution of the differential Riccati equation is presented for elliptic,\nparabolic, and hyperbolic reference orbits, thereby enabling an analytical\npursuit-evasion game strategy. Then, the procedure to solve the pursuit-evasion\ngame using this analytical strategy is proposed. Simulations of pursuit-evasion\ngame in elliptic, parabolic, and hyperbolic reference orbits validate the\neffectiveness of the developed analytical strategy. Results indicates that the\nanalytical strategy saves the CPU time by more than 99.8$\\%$ compared to the\nnumerical one, highlighting the efficiency of the developed strategy. The\ndeveloped analytical strategy is also applicable to pursuit-evasion game\nscenarios considering orbital disturbances. Compared to the conventional\nstrategy, which succeed in only two out of six test scenarios, the developed\nstrategy achieves success in all six cases, particularly demonstrating its\neffectiveness in high-eccentricity cases.\n', ""An Introduction to Pursuit-evasion Differential Games Pursuit and evasion conflicts represent challenging problems with important\napplications in aerospace and robotics. In pursuit-evasion problems, synthesis\nof intelligent actions must consider the adversary's potential strategies.\nDifferential game theory provides an adequate framework to analyze possible\noutcomes of the conflict without assuming particular behaviors by the opponent.\nThis article presents an organized introduction of pursuit-evasion differential\ngames with an overview of recent advances in the area. First, a summary of the\nseminal work is outlined, highlighting important contributions. Next, more\nrecent results are described by employing a classification based on the number\nof players: one-pursuer-one-evader, N-pursuers-one-evader,\none-pursuer-M-evaders, and N-pursuer-M-evader games. In each scenario, a brief\nsummary of the literature is presented. Finally, two representative\npursuit-evasion differential games are studied in detail: the two-cutters and\nfugitive ship differential game and the active target defense differential\ngame. These problems provide two important applications and, more importantly,\nthey give great insight into the realization of cooperation between friendly\nagents in order to form a team and defeat the adversary.\n""]","[('pursuit evasion', 0.6632240414619446), ('strategies game', 0.5795261859893799), ('pursuit', 0.551235020160675), ('differential game theory', 0.5309648513793945), ('optimal strategies', 0.5017873048782349), ('differential game', 0.4896860122680664), ('differential games', 0.4797847270965576), ('matrix game', 0.45065176486968994), ('attacker defender', 0.43366119265556335), ('defender', 0.41593146324157715)]" 716,716,43,716_triangulation manifold_ideal triangulations_triangulated manifolds_triangulated manifold,"['triangulation manifold', 'ideal triangulations', 'triangulated manifolds', 'triangulated manifold', 'ideal triangulation', 'triangulations', 'triangulation', 'triangulation mathcal', 'graph triangulation', 'manifolds obtained']","['Essential loops in taut ideal triangulations In this note we combinatorialise a technique of Novikov. We use this to prove\nthat, in a three-manifold equipped with a taut ideal triangulation, any\nvertical or normal loop is essential in the fundamental group.\n', 'Poor ideal three-edge triangulations are minimal It is known that an ideal triangulation of a compact $3$-manifold with\nnonempty boundary is minimal if and only if it contains the minimum number of\nedges among all ideal triangulations of the manifold. Therefore, any ideal\none-edge triangulation (i.e., an ideal singular triangulation with exactly one\nedge) is minimal. Vesnin, Turaev, and the first author showed that an ideal\ntwo-edge triangulation is minimal if no $3$-$2$ Pachner move can be applied. In\nthis paper we show that any of the so-called poor ideal three-edge\ntriangulations is minimal. We exploit this property to construct minimal ideal\ntriangulations for an infinite family of hyperbolic $3$-manifolds with totally\ngeodesic boundary.\n', 'Efficient triangulations and boundary slopes For a compact, irreducible, $\\partial$-irreducible, an-annular bounded\n3-manifold $M\\ne\\mathbb{B}^3$, then any triangulation $\\mathcal{T}$ of $M$ can\nbe modified to an ideal triangulation $\\mathcal{T}^*$ of $\\stackrel{\\circ}{M}$.\nWe use the inverse relationship of crushing a triangulation along a normal\nsurface and that of inflating an ideal triangulation to introduce and study\nboundary-efficient triangulations and end-efficient ideal triangulations. We\nprove that the topological conditions necessary for a compact 3-manifold $M$\nadmitting an annular-efficient triangulation are sufficient to modify any\ntriangulation of $M$ to a boundary-efficient triangulation which is also\nannular-efficient. From the proof we have for any ideal triangulation $T^*$ and\nany inflation $\\mathcal{T}_{\\Lambda}$, there is a bijective correspondence\nbetween the closed normal surfaces in $\\mathcal{T}^*$ and the closed normal\nsurfaces in $\\mathcal{T}_{\\Lambda}$ with corresponding normal surfaces being\nhomeomorphic. It follows that for an ideal triangulation $\\mathcal{T}^*$ that\nis $0$-efficient, $1$-efficient, or end-efficient, then any inflation\n$\\mathcal{T}_{\\Lambda}$ of $\\mathcal{T}^*$ is $0$-efficient, $1$-efficient, or\n$\\partial$-efficient, respectively. There are algorithms to decide if a given\ntriangulation or ideal triangulation of a $3$-manifold is one of these\nefficient triangulations. Finally, it is shown that for an annular-efficient\ntriangulation, there are only a finite number of boundary slopes for normal\nsurfaces of a bounded Euler characteristic; hence, in a compact, orientable,\nirreducible, $\\partial$-irreducible, and an-annular $3$-manifold, there are\nonly finitely many boundary slopes for incompressible and\n$\\partial$-incompressible surfaces of a bounded Euler characteristic.\n']","[('triangulation manifold', 0.7209374308586121), ('ideal triangulations', 0.715854823589325), ('triangulated manifolds', 0.7069114446640015), ('triangulated manifold', 0.6837923526763916), ('ideal triangulation', 0.6788793206214905), ('triangulations', 0.6476038098335266), ('triangulation', 0.603480339050293), ('triangulation mathcal', 0.5683703422546387), ('graph triangulation', 0.5568545460700989), ('manifolds obtained', 0.5193361043930054)]" 717,717,43,717_stability viscous_shock waves_shock wave_compressible navier stokes,"['stability viscous', 'shock waves', 'shock wave', 'compressible navier stokes', 'dispersive shock', 'barotropic navier stokes', 'time asymptotic stability', 'rarefaction waves', 'rarefaction wave', 'navier stokes poisson']","['Time-asymptotic stability of generic Riemann solutions for compressible\n Navier-Stokes-Fourier equations We establish the time-asymptotic stability of solutions to the\none-dimensional compressible Navier-Stokes-Fourier equations, with initial data\nperturbed from Riemann data that forms a generic Riemann solution. The Riemann\nsolution under consideration is composed of a viscous shock, a viscous contact\nwave, and a rarefaction wave. We prove that the perturbed solution of\nNavier-Stokes-Fourier converges, uniformly in space as time goes to infinity,\nto a viscous ansatz composed of viscous shock with time-dependent shift, a\nviscous contact wave and an inviscid rarefaction wave.\n This is a first resolution of the challenging open problem associated with\nthe generic Riemann solution. Our approach relies on the method of\na-contraction with shifts, specifically applied to both the shock wave and the\ncontact discontinuity wave. It enables the application of a global energy\nmethod for the generic combination of three waves.\n', 'Stability of composite Wave of Planar Viscous Shock and Rarefaction for\n 3D Barotropic Navier-Stokes Equations We prove the nonlinear time-asymptotic stability of the composite wave\nconsisting of a planar rarefaction wave and a planar viscous shock for the\nthree-dimensional (3D) compressible barotropic Navier-Stokes equations under\ngeneric perturbations, in particular, without zero-mass conditions. It is shown\nthat if the composite wave strength and the initial perturbations are suitably\nsmall, then 3D Navier-Stokes system admits a unique global-in-time strong\nsolution which time-asymptotically converges to the corresponding composite\nwave up to a time-dependent shift for planar viscous shock. Our proof is based\non the $a$-contraction method with time-dependent shift and suitable weight\nfunction.\n', 'Time-asymptotic stability of composite waves of degenerate Oleinik shock\n and rarefaction for non-convex conservation laws We are concerned with the large-time behavior of the solution to\none-dimensional (1D) cubic non-convex scalar viscous conservation laws. Due to\nthe inflection point of the cubic non-convex flux, the solution to the\ncorresponding inviscid Riemann problem can be the composite wave of a\ndegenerate Oleinik shock and a rarefaction wave and these two nonlinear waves\nare always attached together. We give a first proof of the time-asymptotic\nstability of this composite wave, up to a time-dependent shift to the viscous\nOleinik shock, for the viscous equation. The Oleinik shock wave strength can be\narbitrarily large. The main difficulty is due to the incompatibility of the\ntime-asymptotic stability proof framework of individual viscous shock by the\nso-called anti-derivative method and the direct $L^2$-energy method to\nrarefaction wave. Here we develop a new type of $a$-contraction method with\nsuitable weight function and the time-dependent shift to the viscous shock,\nwhich is motivated by [9,12]. Another difficulty comes from that the Oleinik\nshock and rarefaction wave are always attached together and their wave\ninteractions are very subtle. Therefore, the same time-dependent shift needs to\nbe equipped to both Oleinik shock and rarefaction wave such that the wave\ninteractions can be treated in our stability proof. Time-asymptotically, this\nshift function grows strictly sub-linear with respect to the time and then the\nshifted rarefaction wave is equivalent to the original self-similar rarefaction\nwave.\n']","[('stability viscous', 0.5291564464569092), ('shock waves', 0.4962676763534546), ('shock wave', 0.48060813546180725), ('compressible navier stokes', 0.4758514165878296), ('dispersive shock', 0.4705759882926941), ('barotropic navier stokes', 0.4659914970397949), ('time asymptotic stability', 0.4588632583618164), ('rarefaction waves', 0.4576541781425476), ('rarefaction wave', 0.44258785247802734), ('navier stokes poisson', 0.4409513771533966)]" 718,718,43,718_relu networks_neural networks relu_relu neural networks_mixed integer optimization,"['relu networks', 'neural networks relu', 'relu neural networks', 'mixed integer optimization', 'integer linear programming', 'integer optimization', 'mixed integer programming', 'trained neural', 'networks relu', 'robustness neural']","['Towards Optimal Branching of Linear and Semidefinite Relaxations for Neural Network Robustness Certification In this paper, we study certifying the robustness of ReLU neural networks against adversarial input perturbations. To diminish the relaxation error suffered by the popular linear programming (LP) and semidefinite programming (SDP) certification methods, we take a branch-and-bound approach to propose partitioning the input uncertainty set and solving the relaxations on each part separately. We show that this approach reduces relaxation error, and that the error is eliminated entirely upon performing an LP relaxation with a partition intelligently designed to exploit the nature of the ReLU activations. To scale this approach to large networks, we consider using a coarser partition whereby the number of parts in the partition is reduced. We prove that computing such a coarse partition that directly minimizes the LP relaxation error is NP-hard. By instead minimizing the worst-case LP relaxation error, we develop a closed-form branching scheme in the single-hidden layer case. We extend the analysis to the SDP, where the feasible set geometry is exploited to design a branching scheme that minimizes the worst-case SDP relaxation error. Experiments on MNIST, CIFAR-10, and Wisconsin breast cancer diagnosis classifiers demonstrate significant increases in the percentages of test samples certified. By independently increasing the input size and the number of layers, we empirically illustrate under which regimes the branched LP and branched SDP are best applied. Finally, we extend our LP branching method into a multi-layer branching heuristic, which attains comparable performance to prior state-of-the-art heuristics on large-scale, deep neural network certification benchmarks.', 'Feed-Forward Neural Networks as a Mixed-Integer Program Deep neural networks (DNNs) are widely studied in various applications. A DNN\nconsists of layers of neurons that compute affine combinations, apply nonlinear\noperations, and produce corresponding activations. The rectified linear unit\n(ReLU) is a typical nonlinear operator, outputting the max of its input and\nzero. In scenarios like max pooling, where multiple input values are involved,\na fixed-parameter DNN can be modeled as a mixed-integer program (MIP). This\nformulation, with continuous variables representing unit outputs and binary\nvariables for ReLU activation, finds applications across diverse domains. This\nstudy explores the formulation of trained ReLU neurons as MIP and applies MIP\nmodels for training neural networks (NNs). Specifically, it investigates\ninteractions between MIP techniques and various NN architectures, including\nbinary DNNs (employing step activation functions) and binarized DNNs (with\nweights and activations limited to $-1,0,+1$). The research focuses on training\nand evaluating proposed approaches through experiments on handwritten digit\nclassification models. The comparative study assesses the performance of\ntrained ReLU NNs, shedding light on the effectiveness of MIP formulations in\nenhancing training processes for NNs.\n', 'Optimal training of integer-valued neural networks with mixed integer\n programming Recent work has shown potential in using Mixed Integer Programming (MIP)\nsolvers to optimize certain aspects of neural networks (NNs). However the\nintriguing approach of training NNs with MIP solvers is under-explored.\nState-of-the-art-methods to train NNs are typically gradient-based and require\nsignificant data, computation on GPUs, and extensive hyper-parameter tuning. In\ncontrast, training with MIP solvers does not require GPUs or heavy\nhyper-parameter tuning, but currently cannot handle anything but small amounts\nof data. This article builds on recent advances that train binarized NNs using\nMIP solvers. We go beyond current work by formulating new MIP models which\nimprove training efficiency and which can train the important class of\ninteger-valued neural networks (INNs). We provide two novel methods to further\nthe potential significance of using MIP to train NNs. The first method\noptimizes the number of neurons in the NN while training. This reduces the need\nfor deciding on network architecture before training. The second method\naddresses the amount of training data which MIP can feasibly handle: we provide\na batch training method that dramatically increases the amount of data that MIP\nsolvers can use to train. We thus provide a promising step towards using much\nmore data than before when training NNs using MIP models. Experimental results\non two real-world data-limited datasets demonstrate that our approach strongly\noutperforms the previous state of the art in training NN with MIP, in terms of\naccuracy, training time and amount of data. Our methodology is proficient at\ntraining NNs when minimal training data is available, and at training with\nminimal memory requirements -- which is potentially valuable for deploying to\nlow-memory devices.\n']","[('relu networks', 0.5187464952468872), ('neural networks relu', 0.5122368931770325), ('relu neural networks', 0.5121045708656311), ('mixed integer optimization', 0.5017260313034058), ('integer linear programming', 0.47655394673347473), ('integer optimization', 0.466467022895813), ('mixed integer programming', 0.46300581097602844), ('trained neural', 0.4559173285961151), ('networks relu', 0.44430607557296753), ('robustness neural', 0.44312193989753723)]" 719,719,43,719_curvature estimates_estimates curvature_curvature estimate_mean curvature operator,"['curvature estimates', 'estimates curvature', 'curvature estimate', 'mean curvature operator', 'mean curvature flow', 'curvature general', 'estimate curvature', 'mean curvature', 'curvature equations', 'mean curvature type']","['Gradient estimates for the Lagrangian mean curvature equation with\n critical and supercritical phase In this paper, we prove interior gradient estimates for the Lagrangian mean\ncurvature equation, if the Lagrangian phase is critical and supercritical and\n$C^{2}$. Combined with the a priori interior Hessian estimates proved in\n[Bha21, Bha22], this solves the Dirichlet boundary value problem for the\ncritical and supercritical Lagrangian mean curvature equation with $C^0$\nboundary data. We also provide a uniform gradient estimate for lower regularity\nphases that satisfy certain additional hypotheses.\n', 'Hessian estimates for shrinkers, expanders, translators, and rotators of\n the Lagrangian Mean Curvature Flow In this paper, we prove interior Hessian estimates for shrinkers, expanders,\ntranslators, and rotators of the Lagrangian mean curvature flow under the\nassumption that the Lagrangian phase is hypercritical. We further extend our\nresults to a broader class of Lagrangian mean curvature type equations.\n', 'Hessian Estimates for Lagrangian mean curvature equation In this paper, we derive a priori interior Hessian estimates for Lagrangian\nmean curvature equation if the Lagrangian phase is supercritical and has\nbounded second derivatives.\n']","[('curvature estimates', 0.6733543872833252), ('estimates curvature', 0.6632091999053955), ('curvature estimate', 0.6460289359092712), ('mean curvature operator', 0.639062762260437), ('mean curvature flow', 0.6253466010093689), ('curvature general', 0.6212789416313171), ('estimate curvature', 0.6190338730812073), ('mean curvature', 0.6189190745353699), ('curvature equations', 0.6076040863990784), ('mean curvature type', 0.6025235652923584)]" 720,720,43,720_residuated lattices_residuated lattice_distributive lattice_lattices,"['residuated lattices', 'residuated lattice', 'distributive lattice', 'lattices', 'lattice', 'lattice ordered', 'residuated', 'algebras variety', 'boolean algebras', 'heyting algebras']","['Gluing residuated lattices We introduce and characterize various gluing constructions for residuated\nlattices that intersect on a common subreduct, and which are subalgebras, or\nappropriate subreducts, of the resulting structure. Starting from the 1-sum\nconstruction (also known as ordinal sum for residuated structures), where\nalgebras that intersect only in the top element are glued together, we first\nconsider the gluing on a congruence filter, and then add a lattice ideal as\nwell. We characterize such constructions in terms of (possibly partial)\noperators acting on (possibly partial) residuated structures. As particular\nexamples of gluing constructions, we obtain the non-commutative version of some\nrotation constructions, and an interesting variety of semilinear residuated\nlattices that are 2-potent. This study also serves as a first attempt toward\nthe study of amalgamation of non-commutative residuated lattices, by\nconstructing an amalgam in the special case where the common subalgebra in the\nV-formation is either a special (congruence) filter or the union of a filter\nand an ideal.\n', 'Unilinear residuated lattices: axiomatization, varieties and FEP We characterize all residuated lattices that have height equal to $3$ and\nshow that the variety they generate has continuum-many subvarieties. More\ngenerally, we study unilinear residuated lattices: their lattice is a union of\ndisjoint incomparable chains, with bounds added. We we give two general\nconstructions of unilinear residuated lattices, provide an axiomatization and a\nproof-theoretic calculus for the variety they generate, and prove the finite\nmodel property for various subvarieties.\n', 'Residuated lattices do not have the amalgamation property We show that the variety of residuated lattices does not have the\namalgamation property.\n']","[('residuated lattices', 0.7975441813468933), ('residuated lattice', 0.7735671401023865), ('distributive lattice', 0.6480589509010315), ('lattices', 0.6314364075660706), ('lattice', 0.5854841470718384), ('lattice ordered', 0.5373907089233398), ('residuated', 0.47451725602149963), ('algebras variety', 0.4404121935367584), ('boolean algebras', 0.34431174397468567), ('heyting algebras', 0.34363672137260437)]" 721,721,43,721_polynomial systems_sparse polynomial_systems polynomials_solving systems polynomial,"['polynomial systems', 'sparse polynomial', 'systems polynomials', 'solving systems polynomial', 'sparse systems', 'systems polynomial equations', 'systems polynomial', 'polynomial system', 'system polynomial equations', 'sparse system']","['Decomposable sparse polynomial systems The Macaulay2 package DecomposableSparseSystems implements methods for\nstudying and numerically solving decomposable sparse polynomial systems. We\ndescribe the structure of decomposable sparse systems and explain how the\nmethods in this package may be used to exploit this structure, with examples.\n', 'Khovanskii bases for semimixed systems of polynomial equations -- a case\n of approximating stationary nonlinear Newtonian dynamics We provide an approach to counting roots of polynomial systems, where each\npolynomial is a general linear combination of prescribed, fixed polynomials.\nOur tools rely on the theory of Khovanskii bases, combined with toric geometry,\nthe Bernstein-Khovanskii-Kushnirenko (BKK) Theorem, and fiber products.\n As a direct application of this theory, we solve the problem of counting the\nnumber of approximate stationary states for coupled driven nonlinear\nresonators. We set up a system of polynomial equations that depends on three\nnumbers $N, n$ and $M$ and whose solutions model the stationary states. The\nparameter $N$ is the number of coupled resonators, $2n - 1$ is the degree of\nnonlinearity of the underlying differential equation, and $M$ is the number of\nfrequencies used in the approximation. We use our main theorems, that is, the\ngeneralized BKK Theorem and the Decoupling Theorem, to count the number of\n(complex) solutions of the polynomial system for an arbitrary degree of\nnonlinearity $2n - 1 \\geq 3$, any number of resonators $N \\geq 1$, and $M = 1$\nharmonic. We also solve the case $N = 1, n = 2$ and $M = 2$ and give a\ncomputational way to check the number of solutions for $N = 1, n = 2$ and $M\n\\geq 2$. This extends the results of arXiv:2208.08179.\n', 'Solving sparse polynomial systems using Groebner bases and resultants Solving systems of polynomial equations is a central problem in nonlinear and\ncomputational algebra. Since Buchberger\'s algorithm for computing Gr\\""obner\nbases in the 60s, there has been a lot of progress in this domain. Moreover,\nthese equations have been employed to model and solve problems from diverse\ndisciplines such as biology, cryptography, and robotics. Currently, we have a\ngood understanding of how to solve generic systems from a theoretical and\nalgorithmic point of view. However, polynomial equations encountered in\npractice are usually structured, and so many properties and results about\ngeneric systems do not apply to them. For this reason, a common trend in the\nlast decades has been to develop mathematical and algorithmic frameworks to\nexploit specific structures of systems of polynomials.\n Arguably, the most common structure is sparsity; that is, the polynomials of\nthe systems only involve a few monomials. Since Bernstein, Khovanskii, and\nKushnirenko\'s work on the expected number of solutions of sparse systems, toric\ngeometry has been the default mathematical framework to employ sparsity. In\nparticular, it is the crux of the matter behind the extension of classical\ntools to systems, such as resultant computations, homotopy continuation\nmethods, and most recently, Gr\\""obner bases. In this work, we will review these\nclassical tools, their extensions, and recent progress in exploiting sparsity\nfor solving polynomial systems.\n This manuscript complements its homonymous tutorial presented at the\nconference ISSAC 2022.\n']","[('polynomial systems', 0.6677108407020569), ('sparse polynomial', 0.6226873993873596), ('systems polynomials', 0.6219503283500671), ('solving systems polynomial', 0.6162289977073669), ('sparse systems', 0.6122798323631287), ('systems polynomial equations', 0.603123128414154), ('systems polynomial', 0.5880126953125), ('polynomial system', 0.5706866383552551), ('system polynomial equations', 0.5623836517333984), ('sparse system', 0.5622580051422119)]" 722,722,43,722_adaptive mesh refinement_mesh refinement_adaptive mesh_mesh refinement amr,"['adaptive mesh refinement', 'mesh refinement', 'adaptive mesh', 'mesh refinement amr', 'mesh optimization', 'unstructured meshes', 'mesh adaptation', 'refined meshes', 'mesh generation', 'hexahedral meshes']","['On mesh refinement procedures for polygonal virtual elements This work concerns adaptive refinement procedures for meshes of polygonal\nvirtual elements. Specifically, refinement procedures previously proposed by\nthe authors for structured meshes are generalized for the challenging case of\narbitrary element geometries arising in unstructured/Voronoi discretizations.\nHere, structured and unstructured meshes are considered and are created via\nVoronoi tessellation of sets of structured and unstructured seed points\nrespectively. The novel mesh refinement procedures for both structured and\nunstructured meshes allow for accurate and efficient application of the virtual\nelement method to challenging elastic problems in two-dimensions. The results\ndemonstrate that the high efficacy of the proposed refinement procedures on\nstructured meshes, as seen in previous work by the authors, is also achieved in\nthe case of unstructured/Voronoi meshes. The versatility and efficacy of the\nrefinement procedures demonstrated over a variety of mesh types indicates that\nthe procedures are well-suited to virtual element applications.\n', 'Smart Adaptive Mesh Refinement with NEMoSys Adaptive mesh refinement (AMR) offers a practical solution to reduce the\ncomputational cost and memory requirement of numerical simulations that use\ncomputational meshes. In this work, we introduce a novel smart methodology for\nadaptive mesh refinement. Smart adaptive refinement blends classical AMR with\nmachine learning to address some of the known issues of the conventional\napproaches. We provide an algorithm for adaptive refinement. Subsequently, we\nintroduce a modular object-oriented structure for our smart AMR algorithm. Then\nwe present procedures used for the training of a smart AMR model. The study\nfollows with a demonstration of preliminary numerical studies indicating the\nfeasibility of performing adaptive mesh refinement on a few demonstrative\nproblems selected from the CFD domain. Finally, we conclude with a few comments\nabout future work.\n', 'A new quality preserving polygonal mesh refinement algorithm for Virtual\n Element Methods Mesh adaptivity is a useful tool for efficient solution to partial\ndifferential equations in very complex geometries. In the present paper we\ndiscuss the use of polygonal mesh refinement in order to tackle two common\nissues: first, adaptively refine a provided good quality polygonal mesh\npreserving quality, second, improve the quality of a coarse poor quality\npolygonal mesh during the refinement process on very complex domains. For\nfinite element methods and triangular meshes, convergence of a posteriori mesh\nrefinement algorithms and optimality properties have been widely investigated,\nwhereas convergence and optimality are still open problems for polygonal\nadaptive methods. In this article, we propose a new refinement method for\nconvex cells with the aim of introducing some properties useful to tackle\nconvergence and optimality for adaptive methods. The key issues in refining\nconvex general polygons are: a refinement dependent only on the marked cells\nfor refinement at each refinement step; a partial quality improvement, or, at\nleast, a non degenerate quality of the mesh during the refinement iterations; a\nbound of the number of unknowns of the discrete problem with respect to the\nnumber of the cells in the mesh. Although these properties are quite common for\nrefinement algorithms of triangular meshes, these issues are still open\nproblems for polygonal meshes\n']","[('adaptive mesh refinement', 0.8018457889556885), ('mesh refinement', 0.6981509327888489), ('adaptive mesh', 0.6964569091796875), ('mesh refinement amr', 0.6269924640655518), ('mesh optimization', 0.6093081831932068), ('unstructured meshes', 0.6035324335098267), ('mesh adaptation', 0.5950741171836853), ('refined meshes', 0.5902676582336426), ('mesh generation', 0.5695616602897644), ('hexahedral meshes', 0.5651450753211975)]" 723,723,43,723_fractal functions_fractal dimension_dimension fractal_fractals,"['fractal functions', 'fractal dimension', 'dimension fractal', 'fractals', 'non fractal', 'fractal', 'interpolation functions', 'solitons fractals', 'chaos solitons fractals', 'scaling functions']","['Box Dimension and Fractional Integrals of Multivariate Fractal\n Interpolation Functions In this article, we construct the multivariate fractal interpolation\nfunctions for a given data points and explore the existence of $\\alpha$-fractal\nfunction corresponding to the multivariate continuous function defined on\n$[0,1]\\times \\cdots \\times [0,1](q\\text{-times})$. The parameters are selected\nsuch that the corresponding fractal version preserves some of the original\nfunction\'s properties, for instance, if the given function is H\\""older\ncontinuous, then the corresponding $\\alpha$-fractal function is also H\\""older\ncontinuous. Moreover, we explore the restriction of the $\\alpha$-fractal\nfunction on the co-ordinate axis. Furthermore, the box dimension and Hausdorff\ndimension of the graph of the multivariate $\\alpha$-fractal function and its\nrestriction are investigated. In the last section, we prove that the mixed\nRiemann-Liouville fractional integral of fractal function satisfies a\nself-referential equation.\n', 'Fractal dimension for a class of complex-valued fractal interpolation\n functions There are many research papers dealing with fractal dimension of real-valued\nfractal functions in the recent literature. The main focus of the present paper\nis to study fractal dimension of complex-valued functions. This paper also\nhighlights the difference between dimensional results of the complex-valued and\nreal-valued fractal functions. In this paper, we study the fractal dimension of\nthe graph of complex-valued function $g(x)+i h(x)$, compare its fractal\ndimension with the graphs of functions $g(x)+h(x)$ and $(g(x),h(x))$ and also\nobtain some bounds. Moreover, we study the fractal dimension of the graph of\ncomplex-valued fractal interpolation function associated with a germ function\n$f$, base function $b$ and scaling functions $\\alpha_k$.\n', 'On Fractal Features and Fractal Linear Space About Fractal Continuous\n Functions This paper investigates fractal dimension of linear combination of fractal\ncontinuous functions with the same or different fractal dimensions. It has been\nproved that: (1) $BV_{I}$ all fractal continuous functions with bounded\nvariation is fractal linear space; (2) ${}^{1}D_{I}$ all fractal continuous\nfunctions with Box dimension one is a fractal linear space; (3) ${}^{s}D_{I}$\nall fractal continuous functions with identical Box dimension $s(12$. Our simulations show a\nnew and unexpected phase transition for the minimizers with respect to $p$.\n"", 'On energy ground states among crystal lattice structures with prescribed\n bonds We consider pairwise interaction energies and we investigate their minimizers\namong lattices with prescribed minimal vectors (length and coordination\nnumber), i.e. the one corresponding to the crystal\'s bonds. In particular, we\nshow the universal minimality -- i.e. the optimality for all completely\nmonotone interaction potentials -- of strongly eutactic lattices among these\nstructures. This gives new optimality results for the square, triangular,\nsimple cubic (SC), face-centred-cubic (FCC) and body-centred-cubic (BCC)\nlattices in dimensions 2 and 3 when points are interacting through completely\nmonotone potentials. We also show the universal maximality of the triangular\nand FCC lattices among all lattices with prescribed bonds. Furthermore, we\napply our results to Lennard-Jones type potentials, showing the minimality of\nany universal minimizer (resp. maximizer) for small (resp. large) bond lengths,\nwhere the ranges of optimality are easily computable. Finally, a numerical\ninvestigation is presented where a phase transition of type\n""square-rhombic-triangular"" (resp. ""SC-rhombic-BCC-rhombic-FCC"") in dimension\n$d=2$ (resp. $d=3$) among lattices with more than 4 (resp. 6) bonds is\nobserved.\n', 'Three-dimensional lattice ground states for Riesz and Lennard-Jones type\n energies The Riesz potential $f_s(r)=r^{-s}$ is known to be an important building\nblock of many interactions, including Lennard-Jones type potentials\n$f_{n,m}^{\\rm{LJ}}(r):=a r^{-n}-b r^{-m}$, $n>m$ that are widely used in\nMolecular Simulations. In this paper, we investigate analytically and\nnumerically the minimizers among three-dimensional lattices of Riesz and\nLennard-Jones energies. We discuss the minimality of the Body-Centred-Cubic\nlattice (BCC), Face-Centred-Cubic lattice (FCC), Simple Hexagonal lattices (SH)\nand Hexagonal Close-Packing structure (HCP), globally and at fixed density. In\nthe Riesz case, new evidence of the global minimality at fixed density of the\nBCC lattice is shown for $s<0$ and the HCP lattice is computed to have higher\nenergy than the FCC (for $s>3/2$) and BCC (for $s<3/2$) lattices. In the\nLennard-Jones case with exponents $3