total 12355took 0.13s

An optimal local model to practically emulate Bell inequalitiesFeb 08 2019We show how an adversary can emulate a Bell inequality using existing detector control methods if the Bell test is not loophole-free. For a Clauser-Horne-Shimony-Holt inequality, our model fakes a maximum violation predicted by quantum mechanics for a ... More

Finite-key security analysis of quantum key distribution with imperfect light sourcesApr 30 2015In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily awed optical receivers. The status for QKD systems with imperfect light sources is however ... More

Finite-key analysis for measurement-device-independent quantum key distributionJul 03 2013May 20 2015Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect ... More

Detector-device-independent QKD: security analysis and fast implementationJul 19 2016One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side- channel attacks. To overcome this problem, researchers proposed an elegant "time-reversal" QKD protocol called measurement-device-independent QKD (MDI-QKD), ... More

Reconfigurable generation and measurement of mutually unbiased bases for time-bin quditsJan 31 2018We propose a new method for implementing mutually unbiased generation and measurement of time-bin qudits using a cascade of electro-optic phase modulator -- coded fiber Bragg grating pairs. Our approach requires only a single spatial mode and can switch ... More

Detector-Device-Independent Quantum Key DistributionOct 07 2014Oct 15 2014Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass all detector side-channel attacks. While mdiQKD is conceptually elegant and offers a supreme level ... More

Security of distributed-phase-reference quantum key distributionJul 23 2012Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. Since many years, a full security proof of these schemes in a realistic setting has been elusive. For the first time, we solve this ... More

Concise Security Bounds for Practical Decoy-State Quantum Key DistributionNov 27 2013Due to its ability to tolerate high channel loss, decoy-state quantum key distribution (QKD) has been one of the main focuses within the QKD community. Notably, several experimental groups have demonstrated that it is secure and feasible under real-world ... More

Device-Independent Quantum Key Distribution with Local Bell TestJul 31 2012Dec 27 2013Device-independent quantum key distribution (DIQKD) in its current design requires a violation of Bell's inequality between two honest parties, Alice and Bob, who are connected by a quantum channel. However, in reality, quantum channels are lossy, and ... More

Scalable high-rate, high-dimensional quantum key distributionFeb 02 2019We propose and experimentally demonstrate a new scheme for measuring high-dimensional phase states using a two-photon interference technique, which we refer to as quantum-controlled measurement. Using this scheme, we implement a $d$-dimensional time-phase ... More

Random Variation of Detector Efficiency: A Countermeasure against Detector Blinding Attacks for Quantum Key DistributionAug 27 2014Jan 30 2015In the recent decade, it has been discovered that QKD systems are extremely vulnerable to side-channel attacks. In particular, by exploiting the internal working knowledge of practical detectors, it is possible to bring them to an operating region whereby ... More

Loss-tolerant quantum secure positioning with weak laser sourcesJul 27 2016Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming ... More

A self-testing quantum random number generatorOct 10 2014Jan 18 2016The generation of random numbers is a task of paramount importance in modern science. A central problem for both classical and quantum randomness generation is to estimate the entropy of the data generated by a given device. Here we present a protocol ... More

Security of quantum key distribution with iterative siftingOct 20 2016Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. The quantum phase of the ... More

Provably Secure and Practical Quantum Key Distribution over 307 km of Optical FibreJul 28 2014Proposed in 1984, quantum key distribution (QKD) allows two users to exchange provably secure keys via a potentially insecure quantum channel. Since then, QKD has attracted much attention and significant progress has been made in both theory and practice. ... More

Optimality of semiquantum nonlocality in the presence of high inconclusive ratesNov 02 2015Jun 15 2016Quantum nonlocality is a counterintuitive phenomenon that lies beyond the purview of causal influences. Recently, Bell inequalities have been generalized to the case of quantum inputs, leading to a powerful family of semi-quantum Bell inequalities that ... More

A fast and versatile QKD system with hardware key distillation and wavelength multiplexingSep 10 2013Sep 11 2013We present a 625 MHz clocked coherent one-way quantum key distribution (QKD) system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows ... More

Statistical problem of ideal gas in general 2-dimensional regionsDec 19 2014In this paper, based on the conformal mapping method and the perturbation theory, we develop a method to solve the statistical problem within general 2-dimensional regions. We consider some examples and the numerical results and fitting results are given. ... More

Tight Finite-Key Analysis for Quantum CryptographyMar 21 2011Oct 17 2012Despite enormous progress both in theoretical and experimental quantum cryptography, the security of most current implementations of quantum key distribution is still not established rigorously. One of the main problems is that the security of the final ... More

A Novel Method for Stock Forecasting based on Fuzzy Time Series Combined with the Longest Common/Repeated Sub-sequenceJun 21 2015Stock price forecasting is an important issue for investors since extreme accuracy in forecasting can bring about high profits. Fuzzy Time Series (FTS) and Longest Common/Repeated Sub-sequence (LCS/LRS) are two important issues for forecasting prices. ... More

Testing galaxy formation models with galaxy stellar mass functionsAug 17 2016We compare predictions of a number of empirical models and numerical simulations of galaxy formation to the conditional stellar mass functions (CSMF) of galaxies in groups of different masses obtained recently by Lan et al. to test how well different ... More

Finite-temperature quantum criticality in a complex-parameter planeJun 18 2015Dec 08 2015A conventional quantum phase transition (QPT) occurs not only at zero temperature, but also exhibits finite-temperature quantum criticality. Motivated by the discovery of the pseudo-Hermiticity of non-Hermitian systems, we explore the finite-temperature ... More

Generation of Bell, W and GHZ states via exceptional points in non-Hermitian quantum spin systemsMar 20 2015We study quantum phase transitions in non-Hermitian XY and transverse-field Ising spin chains, in which the non-Hermiticity arises from the imaginary magnetic field. Analytical and numerical results show that at exceptional points, coalescing eigenstates ... More

Stimulated photon emission and two-photon Raman scattering in a coupled-cavity QED systemMar 02 2015Feb 16 2016We study the scattering problem of photon and polariton in a one-dimensional coupled-cavity system. Analytical approximate analysis and numerical simulation show that a photon can stimulate the photon emission from a polariton through polariton-photon ... More

Design and Implementation of the End System to Intermediate System (ES-IS) Routing Information Exchange Protocol as a Loadable Kernel Module in Linux Kernel 2.6Apr 19 2012This paper presents a partial implementation of the ES-IS Routing Information Exchange Protocol packet processing in Linux Kernel 2.6, which is for use in conjunction with the Connectionless Network Protocol (CLNP) in Aeronautical Telecommunication Network ... More

Role of Pyridine as a Biomimetic Organo-Hydride for Homogeneous Reduction of CO2 to MethanolAug 12 2014We use quantum chemical calculations to elucidate a viable homogeneous mechanism for pyridine-catalyzed reduction of CO2 to methanol. In the first component of the catalytic cycle, pyridine (Py) undergoes a H+ transfer (PT) to form pyridinium (PyH+) followed ... More

Prevalence of Tidal Interactions among Local Seyfert Galaxies: The Control ExperimentFeb 28 2008Apr 15 2008We test whether there is a relation between the observed tidal interactions and Seyfert activity by imaging in HI twenty inactive galaxies at the same spatial resolution and detection threshold as the Seyfert sample. This control sample of inactive galaxies ... More

Prevalence of Tidal Interactions among Local Seyfert GalaxiesFeb 27 2008Mar 04 2008No mechanisms have hitherto been conclusively demonstrated to be responsible for initiating optically-luminous nuclear (Seyfert) activity in local disk galaxies. Only a small minority of such galaxies are visibly disturbed in optical starlight, with the ... More

Cloud and the City: Facilitating Flexible Access Control over Data StreamsMay 29 2012May 31 2012The proliferation of sensing devices create plethora of data-streams, which in turn can be harnessed to carry out sophisticated analytics to support various real-time applications and services as well as long-term planning, e.g., in the context of intelligent ... More

Free-space reconfigurable quantum key distribution networkOct 16 2015We propose a free-space reconfigurable quantum key distribution (QKD) network to secure communication among mobile users. Depends on the trustworthiness of the network relay, the users can implement either the highly secure measurement-device-independent ... More

Sensible Functional Linear Discriminant AnalysisJun 13 2016Oct 17 2016The focus of this paper is to extend Fisher's linear discriminant analysis (LDA) to both densely recorded functional data and sparsely observed longitudinal data for general $c$-category classification problems. We propose an efficient approach to identify ... More

Sensible Functional Linear Discriminant AnalysisJun 13 2016Sep 06 2017The focus of this paper is to extend Fisher's linear discriminant analysis (LDA) to both densely re-corded functional data and sparsely observed longitudinal data for general $c$-category classification problems. We propose an efficient approach to identify ... More

Two robust nonconforming H$^2-$elements for linear strain gradient elasticityApr 07 2016We propose two nonconforming finite elements to approximate a boundary value problem arising from strain gradient elasticity, which is a higher-order perturbation of the linearized elastic system. Our elements are H$^2-$nonconforming while H$^1-$conforming. ... More

Equivalent spin-orbit interaction in two-polariton Jaynes-Cummings-Hubbard modelSep 25 2014A hybrid quantum system combines two or more distinct quantum components, exhibiting features not seen in these individual systems. In this work, we study the one-dimensional Jaynes-Cummings- Hubbard model in the two-excitation subspace. We find that ... More

Covariate adjusted functional principal components analysis for longitudinal dataMar 01 2010Classical multivariate principal component analysis has been extended to functional data and termed functional principal component analysis (FPCA). Most existing FPCA approaches do not accommodate covariate information, and it is the goal of this paper ... More

The geodesic form of light-ray trace in the inhomogeneous mediaMar 31 2009Jun 25 2009The canonical equations of the optical cloaking proposed by Shurig, Pendry and Smith has been proved to be equivalent to the geodesic in a 3-dimensional curved space. Carrying out the argument we extend to the 4-dimensional Riemannian space where the ... More

Sensible Functional Linear Discriminant AnalysisJun 13 2016The focus of this paper is to extend Fisher's linear discriminant analysis (LDA) to both densely recorded functional data and sparsely observed longitudinal data for general $c$-category classification problems. We propose an efficient approach to identify ... More

Effective and Efficient Similarity Index for Link Prediction of Complex NetworksMay 21 2009Aug 26 2009Predictions of missing links of incomplete networks like protein-protein interaction networks or very likely but not yet existent links in evolutionary networks like friendship networks in web society can be considered as a guideline for further experiments ... More

Solving the generalized Higgs model from the generalized CRS modelSep 23 2013Dec 17 2014In this paper, we reveal a direct relation between the generalized one-dimensional Carinena-Ranada-Santander (CRS) model and the radial part of two-dimensional generalized Higgs model. By this relation, we construct a series of quasi-exactly solutions ... More

New Nonconforming Elements for Linear Strain Gradient Elastic ModelSep 04 2018Based on a new H$^2-$Korn's inequality, we propose new nonconforming elements for the linear strain gradient elastic model. The first group of elements are H$^1-$conforming but H$^2-$nonconforming. The tensor product NTW element [Tai:2001] and the tensor ... More

Two robust nonconforming H$^2-$elements for linear strain gradient elasticityApr 07 2016Apr 25 2017We propose two nonconforming finite elements to approximate a boundary value problem arising from strain gradient elasticity, which is a higher-order perturbation of the linearized elastic system. Our elements are H$^2-$nonconforming while H$^1-$conforming. ... More

UA-DETRAC: A New Benchmark and Protocol for Multi-Object Detection and TrackingNov 13 2015Sep 04 2016In recent years, numerous effective multi-object tracking (MOT) methods are developed because of the wide range of applications. Existing performance evaluations of MOT methods usually separate the object tracking step from the object detection step by ... More

Functional single index models for longitudinal dataMar 09 2011A new single-index model that reflects the time-dynamic effects of the single index is proposed for longitudinal and functional response data, possibly measured with errors, for both longitudinal and time-invariant covariates. With appropriate initial ... More

The Quasi-exact models in two-dimensional curved space based on the generalized CRS Harmonic OscillatorMar 23 2012In this paper, by searching the relation between the radial part of Higgs harmonic oscillator in the two-dimensional curved space and the generalized CRS harmonic oscillator model, we can find a series of quasi-exact models in two-dimensional curved space ... More

Multi-dimensional Functional Principal Component AnalysisOct 15 2015Mar 12 2016Functional principal component analysis is one of the most commonly employed approaches in functional and longitudinal data analysis and we extend it to analyze functional/longitudinal data observed on a general $d$-dimensional domain. The computational ... More

Unconventional Spin Density Waves in Dipolar Fermi GasesSep 12 2012Sep 13 2012The conventional spin density wave (SDW) phase (Overhauser, 1962), as found in antiferromagnetic metal for example (Fawcett 1988), can be described as a condensate of particle-hole pairs with zero angular momentum, $\ell=0$, analogous to a condensate ... More

Advantages of high-speed technique for quantum key distribution; reply to quant-ph/0407050Jul 18 2004We respond to a comment on our high-speed technique for the implementation of free-space quantum key distribution (QKD). The model used in the comment assigns inappropriately high link losses to the technique in question. We show that the use of reasonable ... More

Bond order solid of two-dimensional dipolar fermionsNov 11 2011Feb 29 2012Recent experimental realization of dipolar Fermi gases near or below quantum degeneracy provides opportunity to engineer Hubbard-like models with long range interactions. Motivated by these experiments, we chart out the theoretical phase diagram of interacting ... More

Parameter-free prediction of DNA dynamics in planar extensional flow of semidilute solutionsApr 22 2016Dec 01 2016The dynamics of individual DNA molecules in semidilute solutions undergoing planar extensional flow is simulated using a multi-particle Brownian dynamics algorithm, which incorporates hydrodynamic and excluded volume interactions in the context of a coarse-grained ... More

In-network Congestion-aware Load Balancing at Transport LayerNov 24 2018Load balancing at transport layer is an important function in data centers, content delivery networks, and mobile networks. This function has unique requirements and greatly impacts the end users' experience. Recent studies in the field have identified ... More

Mechanical Switching of Nanoscale Multiferroic Phase BoundariesSep 27 2017Tuning the lattice degree of freedom in nanoscale functional crystals is critical to exploit the emerging functionalities such as piezoelectricity, shape-memory effect, or piezomagnetism, which are attributed to the intrinsic lattice-polar or lattice-spin ... More

Large Strong Phases and CP Violation in the Annihilation Processes $\bar{B}^0\to K^+K^-$, $K^{*\pm}K^\mp$, $K^{*+}K^{*-}$Apr 10 2006Oct 17 2006The strong phases and CP violation in the rare $\bar{B}^0\to K^+K^-$, $K^{*\pm}K^\mp$, $K^{*+}K^{*-}$ decays are investigated. As these decays proceed only via annihilation type diagrams in the standard model (SM), a dynamical gluon mass is introduced ... More

Switchable metamaterial reflector/absorber for different polarized electromagnetic wavesOct 21 2010We demonstrate a controllable electromagnetic wave reflector/absorber for different polarizations with metamaterial involving electromagnetic resonant structures coupled with diodes. Through biasing at different voltages to turn ON and OFF the diodes, ... More

Applications of Polynomial Algebras to Deformed OscillatorSep 13 2009Oct 20 2009The polynomial algebra is a deformed SU(2) algebra. Here, we use polynomial algebra as a method to solve a series of deformed oscillators. Meanwhile, we find a series of physics systems corresponding with polynomial algebra with different maximal order. ... More

User-Guided Deep Anime Line Art Colorization with Conditional Adversarial NetworksAug 09 2018Aug 10 2018Scribble colors based line art colorization is a challenging computer vision problem since neither greyscale values nor semantic information is presented in line arts, and the lack of authentic illustration-line art training pairs also increases difficulty ... More

QCD Factorization Based on Six-Quark Operator Effective Hamiltonian from Perturbative QCD and Charmless Bottom Meson Decays $B_{(s)}\to ππ,πK, KK$Oct 20 2008Oct 23 2008The charmless bottom meson decays are systematically investigated based on an approximate six quark operator effective Hamiltonian from perturbative QCD. It is shown that within this framework the naive QCD factorization method provides a simple way to ... More

Charmless $B_s\to PP, PV, VV$ Decays Based on the six-quark Effective Hamiltonian with Strong Phase Effects IIJul 01 2011Mar 13 2012We provide a systematic study of charmless $B_s \to PP, PV, VV$ decays ($P$ and $V$ denote pseudoscalar and vector mesons, respectively) based on an approximate six-quark operator effective Hamiltonian from QCD. The calculation of the relevant hard-scattering ... More

ALMA Observations of the Spatial Distribution of three C$_2$H$_4$O$_2$ Isomers towards Sgr B2(N)Dec 17 2018Dec 21 2018The C$_2$H$_4$O$_2$ isomers have been previously investigated primarily via disparate sets of observations involving single dish and array measurements. The only attempt at using a uniform set of observations was performed with the IRAM 30 m observation ... More

First Confirmed Detection of a Bipolar Molecular Outflow from a Young Brown DwarfOct 15 2008Oct 30 2008Studying the earliest stages in the birth of stars is crucial for understanding how they form. Brown dwarfs with masses between that of stars and planets are not massive enough to maintain stable hydrogen-burning fusion reactions during most of their ... More

Open heavy flavor measurements in $d$$+$Au collisions at PHENIX experimentFeb 28 2014The heavy quarks produced in the early stage of heavy-ion collisions are very effective probes of the dense partonic medium produced at RHIC. PHENIX has the ability to measure heavy quark production through single electrons in the central arm spectrometers ... More

Extremal free energy in a simple Mean Field Theory for a Coupled Barotropic fluid - Rotating Sphere SystemAug 09 2006A family of spin-lattice models are derived as convergent finite dimensional approximations to the rest frame kinetic energy of a barotropic fluid coupled to a massive rotating sphere. In not fixing the angular momentum of the fluid component, there is ... More

Counting overlattices in automorphism groups of treesJun 11 2005We give an upper bound for the number of ``overlattices'' in the automorphism group of a tree, containing a fixed lattice with index n. For an example of a lattice in the automorphism group of a 2p-regular tree whose quotient is a loop, we obtain a lower ... More

A non-abelian Seiberg-Witten invariant for integral homology 3-spheresOct 25 2003Jan 04 2004A new diffeomorphism invariant of integral homology 3-spheres is defined using a non-abelian 'quaternionic' version of the Seiberg-Witten equations.

Nuclear Density Functional Theory and the Equation of StateApr 06 2011A nuclear density functional can be used to find the binding energy and shell structure of nuclei and the energy gap in superconducting nuclear matter. In this paper, we study the possible application of a nuclear density functional theory to nuclear ... More

Measurement of electrons from heavy-flavor decays from $p$+$p$, $d$+Au, and Cu+Cu collisions in the PHENIX experimentAug 18 2014Charm and bottom quarks are formed predominantly by gluon fusion in the initial hard scatterings at RHIC, making them good probes of the full medium evolution. Previous measurements at RHIC have shown large suppression and azimuthal anisotropy of open ... More

Equivariant Derived Categories Associated to a Sum of Two PotentialsNov 09 2016Suppose $f,g$ are homogeneous polynomials of degree $d$ defining smooth hypersurfaces $X_f = V(f)\subset \mathbb{P}^{m-1}$ and $X_g = V(g)\subset\mathbb{P}^{n-1}$. Then the sum $f(x)+g(y)$ defines a smooth hypersurface $X=V(f(x)+g(y))\subset\mathbb{P}^{m+n-1}$ ... More

QCD Approach to B->D πDecays and CP ViolationMay 11 2007Nov 14 2007The branching ratios and CP violations of the $B\to D\pi$ decays, including both the color-allowed and the color-suppressed modes, are investigated in detail within QCD framework by considering all diagrams which lead to three effective currents of two ... More

Decoherence of two qubits coupled with one-mode cavity without rotating-wave approximationJun 24 2008Jul 13 2008The decoherence of two qubits, coupled with one-mode cavity separately, has been investigated exactly. The results show that, for the resonant case, the decoherence behavior of system is similar to Markovian case when the coupling strength is weak, while ... More

Vacuum Rabi oscillation of an atom without rotating-wave approximationJun 24 2008Jul 16 2008We have investigated vacuum Rabi oscillation of an atom coupled with single-mode cavity field exactly, and compared the results with that of J-C model. The results show that, there is damping Rabi oscillation for an atom, even in strong coupling regime. ... More

A functional approach to deconvolve dynamic neuroimaging dataNov 07 2014Positron Emission Tomography (PET) is an imaging technique which can be used to investigate chemical changes in human biological processes such as cancer development or neurochemical reactions. Most dynamic PET scans are currently analyzed based on the ... More

Inverse regression for longitudinal dataMay 23 2014Oct 23 2015Sliced inverse regression (Duan and Li [Ann. Statist. 19 (1991) 505-530], Li [J. Amer. Statist. Assoc. 86 (1991) 316-342]) is an appealing dimension reduction method for regression models with multivariate covariates. It has been extended by Ferr\'{e} ... More

Implications of new data in charmless B decaysSep 01 2006Based on the latest experimental data of $B \to \pi\pi$ and $\pi K$ modes, a model-independent analytical analysis is presented. The CP-averaged branching ratio difference $\Delta R = R_c - R_n$ in $B\to \pi K$ decays with $R_c = 2Br(\pi^0K^-)/Br(\pi^-\bar{K}^0)$ ... More

Experimental signatures of phase interference and sub-femtosecond time dynamics on the incident energy axis of resonant inelastic X-ray scatteringDec 03 2016Core hole resonance is used in X-ray spectroscopy to incisively probe the local electronic states of many-body systems. Here, resonant inelastic X-ray scattering (RIXS) is studied as a function of incident photon energy on Mott insulators SrCuO2 and NiO ... More

Constraining Charming Penguins in Charmless B DecaysDec 18 2007Dec 23 2007We discuss the correlations of charming penguin contributions to $B\to\pi\pi$, $\pi K$ and KK using approximate flavor SU(3) symmetry. Strong constraints are found from the direct CP asymmetries especially in $\pi K$ modes. We make a global fit to the ... More

The SPOCA-suite: a software for extraction and tracking of Active Regions and Coronal Holes on EUV imagesAug 07 2012Precise localisation and characterization of active regions and coronal holes as observed by EUV imagers are crucial for a wide range of solar and helio-physics studies. We describe a segmentation procedure, the SPOCA-suite, that produces catalogs of ... More

Minimal volume entropy on graphsJun 11 2005Among the normalized metrics on a graph, we show the existence and the uniqueness of an entropy-minimizing metric, and give explicit formulas for the minimal volume entropy and the metric realizing it.

Defining an SU(3)-Casson/U(2)-Seiberg-Witten integer invariant for integral homology 3-spheresNov 01 2004The SU(3)-Casson invariant for integral homology 3-spheres as studied by Boden-Herald possesses a 'spectral flow obstruction' to being an integer valued invariant which depends only on the non-degenerate (perturbed) moduli space of flat SU(3)-connections. ... More

Multi-martingale optimal transportNov 04 2016Beiglb\"ock-Juillet, Beiglb\"ock-Nutz-Touzi showed that the duality is attained in a suitable sense for the martingale optimal transport problem on the real line, that is, when there is one underlying martingale process. We generalize the duality result ... More

Optimal martingale transport between radially symmetric marginals in general dimensionsDec 11 2014May 17 2016We determine the optimal structure of couplings for the \emph{Martingale transport problem} between radially symmetric initial and terminal laws $\mu, \nu$ on $\R^d$ and show the uniqueness of optimizer. Here optimality means that such solutions will ... More

Instanton homology and the Alexander polynomialJul 24 2009Jul 25 2009We prove that the instanton knot homology KHI(K) as defined by Kronheimer and Mrowka (Knots, sutures and excision, preprint), recovers the Alexander polynomial for knots K in the 3-sphere.

Signal of New Physics and Test of Isospin-SU(3) Relations and CP Violation in Charmless B DecaysJun 02 2006A model-independent analytical analysis for charmless B decays is presented. It is demonstrated that the CP-averaging branching ratio difference $\Delta R = R_c - R_n$ in $B\to \pi K$ decays with $R_c = 2Br(\pi^0K^-)/Br(\pi^-\bar{K}^0)$ and $R_n =Br(\pi^+K^-)/2Br(\pi^0\bar{K}^0)$ ... More

Dynamical symmetries of two-dimensional systems in relativistic quantum mechanicsApr 25 2008Oct 13 2008The two-dimensional Dirac Hamiltonian with equal scalar and vector potentials has been proved commuting with the deformed orbital angular momentum $L$. When the potential takes the Coulomb form, the system has an SO(3) symmetry, and similarly the harmonic ... More

A Transport Model for Nuclear Reactions Induced by Radioactive BeamsApr 25 2005Major ingredients of an isospin and momentum dependent transport model for nuclear reactions induced by radioactive beams are outlined. Within the IBUU04 version of this model we study several experimental probes of the equation of state of neutron-rich ... More

Influence of the Fermi Surface Morphology on the Magnetic Field-Driven Vortex Lattice Structure Transitions in YBa$_{2}$Cu$_{3}$O$_{7-δ}:δ=$0, 0.15Mar 13 2015We report small-angle neutron scattering measurements of the vortex lattice (VL) structure in single crystals of the lightly underdoped cuprate superconductor YBa2Cu3O6.85. At 2 K, and for fields of up to 16 T applied parallel to the crystal c-axis, we ... More

HierLPR: Decision making in hierarchical multi-label classification with local precision ratesOct 18 2018In this article we propose a novel ranking algorithm, referred to as HierLPR, for the multi-label classification problem when the candidate labels follow a known hierarchical structure. HierLPR is motivated by a new metric called eAUC that we design to ... More

Projective affine Ossermann curvature modelsMar 07 2014A curvature model (V,A) is a real vector space V which is equipped with a "curvature operator" A(x,y)z that A has the same symmetries as an affine curvature operator; A(x,y)z=-A(y,x)z and A(x,y)z+A(y,z)x+A(z,x)y=0. Such a model is called projective affine ... More

Specht modules with abelian verticesFeb 12 2011May 26 2011In this article, we consider indecomposable Specht modules with abelian vertices. We show that the corresponding partitions are necessarily $p^2$-cores where $p$ is the characteristic of the underlying field. Furthermore, in the case of $p\geq 3$, or ... More

Energy extremals and Nonlinear Stability in a Variational theory of Barotropic Fluid - Rotating Sphere SystemFeb 22 2006Aug 09 2006A new variational principle - extremizing the fixed frame kinetic energy under constant relative enstrophy - for a coupled barotropic flow - rotating solid sphere system is introduced with the following consequences. In particular, angular momentum is ... More

Solution of the multi-state voter model and application to strong neutrals in the naming gameJul 10 2015We consider the voter model with $M$ states initially in the system. Using generating functions, we pose the spectral problem for the Markov transition matrix and solve for all eigenvalues and eigenvectors exactly. With this solution, we can find all ... More

Implications of sigma models in the standard model and beyondOct 11 2000After a brief introduction to the sigma model in QCD, we discuss how the sigma model can be relevant in the Standard Model. It is shown to be useful in the analysis of weak processes, such as the study of $\Delta {I} = 1/2$ rule, and in the analysis of ... More

Quantum Information Processing with Single PhotonsSep 22 2005Photons are natural carriers of quantum information due to their ease of distribution and long lifetime. This thesis concerns various related aspects of quantum information processing with single photons. Firstly, we demonstrate N-photon entanglement ... More

On U-Statistics and Compressed Sensing II: Non-Asymptotic Worst-Case AnalysisOct 30 2012In another related work, U-statistics were used for non-asymptotic "average-case" analysis of random compressed sensing matrices. In this companion paper the same analytical tool is adopted differently - here we perform non-asymptotic "worst-case" analysis. ... More

Persuasive Teachable Agent for Intergenerational LearningJan 27 2016Teachable agents are computer agents based on the pedagogical concept of learning-by-teaching. During the tutoring process, where students take on the role of the tutor to teach a computer agent tutee, learners have been observed to gain deeper understanding ... More

Cohomological relation between Jacobi forms and skew-holomorphic Jacobi formsJan 16 2013Eichler and Zagier developed a theory of Jacobi forms to understand and extend Maass' work on the Saito-Kurokawa conjecture. Later Skoruppa introduced skew-holomorphic Jacobi forms, which play an important role in understanding liftings of modular forms ... More

An Extended Zel'dovich Model for the Halo Mass FunctionJun 23 2012Jan 01 2013A new way to construct a fitting formula for the halo mass function is presented. Our formula is expressed as a solution to the modified Jedamzik matrix equation that automatically satisfies the normalization constraint. The characteristic parameters ... More

An Analytic Formula for the Supercluster Mass FunctionJan 06 2012Jan 10 2014We present an analytic formula for the supercluster mass function which is constructed by modifying the extended Zel'dovich model for the halo mass function. The formula has two characteristic parameters whose best-fit values are determined by fitting ... More

Comparing the Selmer group of a $p$-adic representation and the Selmer group of the Tate dual of the representationMay 21 2014Dec 15 2015The main conjecture of Iwasawa theory is a conjecture on the relation between a Selmer group and a conjectural $p$-adic $L$-function. This conjectural $p$-adic $L$-function is expected to satisfy a conjectural functional equation in a certain sense. In ... More

A remark on the $\mathfrak{M}_H(G)$-conjecture and Akashi seriesSep 17 2013Jun 22 2014In this article, we give a criterion for the dual Selmer group of an elliptic curve which has either good ordinary reduction or multiplicative reduction at every prime above $p$ to satisfy the $\M_H(G)$-conjecture. As a by-product of our calculations, ... More

On the pseudo-nullity of the dual fine Selmer groupsSep 14 2013Oct 26 2015In this paper, we will study the pseudo-nullity of the fine Selmer group and its related question. Namely, we investigate certain situations, where one can deduce the pseudo-nullity of the dual fine Selmer group of a general Galois module over a admissible ... More

Notes on the fine Selmer groupsJun 09 2013Sep 06 2015In this paper, we study the fine Selmer groups attached to a Galois module defined over a commutative complete Noetherian ring with finite residue field of characteristic p. Namely, we are interested in its properties upon taking residual representation ... More