Results for "Charles Ci Wen Lim"

total 16675took 0.16s
Noise analysis of simultaneous quantum key distribution and classical communication scheme using a true local oscillatorAug 29 2017Dec 19 2017Recently, we proposed a simultaneous quantum and classical communication (SQCC) protocol, where random numbers for quantum key distribution (QKD) and bits for classical communication are encoded on the \emph{same} weak coherent pulse, and decoded by the ... More
Securing quantum key distribution systems using fewer statesJan 10 2018May 02 2018Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually-unbiased bases: one to generate the key while the other monitors the presence ... More
Reconfigurable generation and measurement of mutually unbiased bases for time-bin quditsJan 31 2018We propose a new method for implementing mutually unbiased generation and measurement of time-bin qudits using a cascade of electro-optic phase modulator -- coded fiber Bragg grating pairs. Our approach requires only a single spatial mode and can switch ... More
Finite-key security analysis of quantum key distribution with imperfect light sourcesApr 30 2015In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily awed optical receivers. The status for QKD systems with imperfect light sources is however ... More
Finite-key analysis for measurement-device-independent quantum key distributionJul 03 2013May 20 2015Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect ... More
Detector-device-independent QKD: security analysis and fast implementationJul 19 2016One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side- channel attacks. To overcome this problem, researchers proposed an elegant "time-reversal" QKD protocol called measurement-device-independent QKD (MDI-QKD), ... More
Concise Security Bounds for Practical Decoy-State Quantum Key DistributionNov 27 2013Due to its ability to tolerate high channel loss, decoy-state quantum key distribution (QKD) has been one of the main focuses within the QKD community. Notably, several experimental groups have demonstrated that it is secure and feasible under real-world ... More
Practical measurement-device-independent entanglement quantificationSep 10 2017Nov 30 2018The robust estimation of entanglement is key to the validation of implementations of quantum systems. On the one hand, the evaluation of standard entanglement measures, either using quantum tomography or using quantitative entanglement witnesses requires ... More
Characterising the correlations of prepare-and-measure quantum networksMar 13 2018Aug 19 2018Prepare-and-measure (P&M) quantum networks are the basic building blocks of quantum communication and cryptography. These networks crucially rely on non-orthogonal quantum encodings to distribute quantum correlations, thus enabling superior communication ... More
Security of distributed-phase-reference quantum key distributionJul 23 2012Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. Since many years, a full security proof of these schemes in a realistic setting has been elusive. For the first time, we solve this ... More
Versatile security analysis of measurement-device-independent quantum key distributionJan 07 2019Jun 26 2019Measurement-device-independent quantum key distribution (MDI-QKD) is the only known QKD scheme that can completely overcome the problem of detection side-channel attacks. Yet, despite its practical importance, there is no standard approach towards proving ... More
Detector-Device-Independent Quantum Key DistributionOct 07 2014Oct 15 2014Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass all detector side-channel attacks. While mdiQKD is conceptually elegant and offers a supreme level ... More
Provably-Secure and High-Rate Quantum Key Distribution with Time-Bin QuditsSep 18 2017The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although ... More
Loss-tolerant quantum secure positioning with weak laser sourcesJul 27 2016Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming ... More
Random Variation of Detector Efficiency: A Countermeasure against Detector Blinding Attacks for Quantum Key DistributionAug 27 2014Jan 30 2015In the recent decade, it has been discovered that QKD systems are extremely vulnerable to side-channel attacks. In particular, by exploiting the internal working knowledge of practical detectors, it is possible to bring them to an operating region whereby ... More
Security of quantum key distribution with iterative siftingOct 20 2016May 30 2017Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. The quantum phase of the ... More
A self-testing quantum random number generatorOct 10 2014Jan 18 2016The generation of random numbers is a task of paramount importance in modern science. A central problem for both classical and quantum randomness generation is to estimate the entropy of the data generated by a given device. Here we present a protocol ... More
Free-space reconfigurable quantum key distribution networkOct 16 2015We propose a free-space reconfigurable quantum key distribution (QKD) network to secure communication among mobile users. Depends on the trustworthiness of the network relay, the users can implement either the highly secure measurement-device-independent ... More
Provably Secure and Practical Quantum Key Distribution over 307 km of Optical FibreJul 28 2014Proposed in 1984, quantum key distribution (QKD) allows two users to exchange provably secure keys via a potentially insecure quantum channel. Since then, QKD has attracted much attention and significant progress has been made in both theory and practice. ... More
Optimality of semiquantum nonlocality in the presence of high inconclusive ratesNov 02 2015Jun 15 2016Quantum nonlocality is a counterintuitive phenomenon that lies beyond the purview of causal influences. Recently, Bell inequalities have been generalized to the case of quantum inputs, leading to a powerful family of semi-quantum Bell inequalities that ... More
A fast and versatile QKD system with hardware key distillation and wavelength multiplexingSep 10 2013Sep 11 2013We present a 625 MHz clocked coherent one-way quantum key distribution (QKD) system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows ... More
Statistical problem of ideal gas in general 2-dimensional regionsDec 19 2014In this paper, based on the conformal mapping method and the perturbation theory, we develop a method to solve the statistical problem within general 2-dimensional regions. We consider some examples and the numerical results and fitting results are given. ... More
Tight Finite-Key Analysis for Quantum CryptographyMar 21 2011Oct 17 2012Despite enormous progress both in theoretical and experimental quantum cryptography, the security of most current implementations of quantum key distribution is still not established rigorously. One of the main problems is that the security of the final ... More
An optimal local model to practically emulate Bell inequalitiesFeb 08 2019We show how an adversary can emulate a Bell inequality using existing detector control methods if the Bell test is not loophole-free. For a Clauser-Horne-Shimony-Holt inequality, our model fakes a maximum violation predicted by quantum mechanics for a ... More
A Novel Method for Stock Forecasting based on Fuzzy Time Series Combined with the Longest Common/Repeated Sub-sequenceJun 21 2015Stock price forecasting is an important issue for investors since extreme accuracy in forecasting can bring about high profits. Fuzzy Time Series (FTS) and Longest Common/Repeated Sub-sequence (LCS/LRS) are two important issues for forecasting prices. ... More
The Doubly Stochastic Single Eigenvalue Problem: A Computational ApproachAug 09 2019The problem of determining $DS_n$, the complex numbers that occur as an eigenvalue of an $n$-by-$n$ doubly stochastic matrix, has been a target of study for some time. The Perfect-Mirsky region, $PM_n$, is contained in $DS_n$, and is known to be exactly ... More
Almost-tight and versatile security analysis of measurement-device-independent quantum key distributionJan 07 2019Measurement-device-independent quantum key distribution (MDI-QKD) is the only known QKD scheme that can completely overcome the problem of detection side-channel attacks. Yet, despite its practical importance, there is no standard approach towards computing ... More
Device-Independent Quantum Key Distribution with Local Bell TestJul 31 2012Dec 27 2013Device-independent quantum key distribution (DIQKD) in its current design requires a violation of Bell's inequality between two honest parties, Alice and Bob, who are connected by a quantum channel. However, in reality, quantum channels are lossy, and ... More
Scalable high-rate, high-dimensional quantum key distributionFeb 02 2019We propose and experimentally demonstrate a new scheme for measuring high-dimensional phase states using a two-photon interference technique, which we refer to as quantum-controlled measurement. Using this scheme, we implement a $d$-dimensional time-phase ... More
Almost-tight and versatile security analysis of measurement-device-independent quantum key distributionJan 07 2019Mar 15 2019Measurement-device-independent quantum key distribution (MDI-QKD) is the only known QKD scheme that can completely overcome the problem of detection side-channel attacks. Yet, despite its practical importance, there is no standard approach towards proving ... More
Finite-temperature quantum criticality in a complex-parameter planeJun 18 2015Dec 08 2015A conventional quantum phase transition (QPT) occurs not only at zero temperature, but also exhibits finite-temperature quantum criticality. Motivated by the discovery of the pseudo-Hermiticity of non-Hermitian systems, we explore the finite-temperature ... More
Testing galaxy formation models with galaxy stellar mass functionsAug 17 2016We compare predictions of a number of empirical models and numerical simulations of galaxy formation to the conditional stellar mass functions (CSMF) of galaxies in groups of different masses obtained recently by Lan et al. to test how well different ... More
Generation of Bell, W and GHZ states via exceptional points in non-Hermitian quantum spin systemsMar 20 2015We study quantum phase transitions in non-Hermitian XY and transverse-field Ising spin chains, in which the non-Hermiticity arises from the imaginary magnetic field. Analytical and numerical results show that at exceptional points, coalescing eigenstates ... More
Testing galaxy formation models with galaxy stellar mass functionsAug 17 2016Oct 09 2016We compare predictions of a number of empirical models and numerical simulations of galaxy formation to the conditional stellar mass functions (CSMF)of galaxies in groups of different masses obtained recently by Lan et al. to test how well different models ... More
Stimulated photon emission and two-photon Raman scattering in a coupled-cavity QED systemMar 02 2015Feb 16 2016We study the scattering problem of photon and polariton in a one-dimensional coupled-cavity system. Analytical approximate analysis and numerical simulation show that a photon can stimulate the photon emission from a polariton through polariton-photon ... More
Practical quantum key distribution with non-phase-randomized coherent statesMay 06 2019May 07 2019Quantum key distribution (QKD) based on coherent states is well known for its implementation simplicity, but it suffers from loss-dependent attacks based on optimal unambiguous state discrimination. Crucially, previous research has suggested that coherent-state ... More
Practical quantum key distribution with non-phase-randomized coherent statesMay 06 2019Quantum key distribution (QKD) based on coherent states is well known for its implementation simplicity, but it suffers from loss-dependent attacks based on optimal unambiguous state discrimination. Crucially, previous research has suggested that coherent-state ... More
Security of quantum key distribution with iterative siftingOct 20 2016Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. The quantum phase of the ... More
Prevalence of Tidal Interactions among Local Seyfert GalaxiesFeb 27 2008Mar 04 2008No mechanisms have hitherto been conclusively demonstrated to be responsible for initiating optically-luminous nuclear (Seyfert) activity in local disk galaxies. Only a small minority of such galaxies are visibly disturbed in optical starlight, with the ... More
Prevalence of Tidal Interactions among Local Seyfert Galaxies: The Control ExperimentFeb 28 2008Apr 15 2008We test whether there is a relation between the observed tidal interactions and Seyfert activity by imaging in HI twenty inactive galaxies at the same spatial resolution and detection threshold as the Seyfert sample. This control sample of inactive galaxies ... More
Cloud and the City: Facilitating Flexible Access Control over Data StreamsMay 29 2012May 31 2012The proliferation of sensing devices create plethora of data-streams, which in turn can be harnessed to carry out sophisticated analytics to support various real-time applications and services as well as long-term planning, e.g., in the context of intelligent ... More
Sensible Functional Linear Discriminant AnalysisJun 13 2016Sep 06 2017The focus of this paper is to extend Fisher's linear discriminant analysis (LDA) to both densely re-corded functional data and sparsely observed longitudinal data for general $c$-category classification problems. We propose an efficient approach to identify ... More
Coalescing Majorana edge modes in non-Hermitian PT-symmetric Kitaev chainOct 21 2017A single unit cell contains all the information about the bulk system, including the topological feature. The topological invariant can be extracted from a finite system, which consists of several unit cells under certain environment, such as a non-Hermitian ... More
Equivalent spin-orbit interaction in two-polariton Jaynes-Cummings-Hubbard modelSep 25 2014A hybrid quantum system combines two or more distinct quantum components, exhibiting features not seen in these individual systems. In this work, we study the one-dimensional Jaynes-Cummings- Hubbard model in the two-excitation subspace. We find that ... More
The geodesic form of light-ray trace in the inhomogeneous mediaMar 31 2009Jun 25 2009The canonical equations of the optical cloaking proposed by Shurig, Pendry and Smith has been proved to be equivalent to the geodesic in a 3-dimensional curved space. Carrying out the argument we extend to the 4-dimensional Riemannian space where the ... More
Covariate adjusted functional principal components analysis for longitudinal dataMar 01 2010Classical multivariate principal component analysis has been extended to functional data and termed functional principal component analysis (FPCA). Most existing FPCA approaches do not accommodate covariate information, and it is the goal of this paper ... More
The Quasi-exact models in two-dimensional curved space based on the generalized CRS Harmonic OscillatorMar 23 2012In this paper, by searching the relation between the radial part of Higgs harmonic oscillator in the two-dimensional curved space and the generalized CRS harmonic oscillator model, we can find a series of quasi-exact models in two-dimensional curved space ... More
Sensible Functional Linear Discriminant AnalysisJun 13 2016The focus of this paper is to extend Fisher's linear discriminant analysis (LDA) to both densely recorded functional data and sparsely observed longitudinal data for general $c$-category classification problems. We propose an efficient approach to identify ... More
Solving the generalized Higgs model from the generalized CRS modelSep 23 2013Dec 17 2014In this paper, we reveal a direct relation between the generalized one-dimensional Carinena-Ranada-Santander (CRS) model and the radial part of two-dimensional generalized Higgs model. By this relation, we construct a series of quasi-exactly solutions ... More
New Nonconforming Elements for Linear Strain Gradient Elastic ModelSep 04 2018Based on a new H$^2-$Korn's inequality, we propose new nonconforming elements for the linear strain gradient elastic model. The first group of elements are H$^1-$conforming but H$^2-$nonconforming. The tensor product NTW element [Tai:2001] and the tensor ... More
Effective and Efficient Similarity Index for Link Prediction of Complex NetworksMay 21 2009Aug 26 2009Predictions of missing links of incomplete networks like protein-protein interaction networks or very likely but not yet existent links in evolutionary networks like friendship networks in web society can be considered as a guideline for further experiments ... More
Two robust nonconforming H$^2-$elements for linear strain gradient elasticityApr 07 2016Apr 25 2017We propose two nonconforming finite elements to approximate a boundary value problem arising from strain gradient elasticity, which is a higher-order perturbation of the linearized elastic system. Our elements are H$^2-$nonconforming while H$^1-$conforming. ... More
UA-DETRAC: A New Benchmark and Protocol for Multi-Object Detection and TrackingNov 13 2015Sep 04 2016In recent years, numerous effective multi-object tracking (MOT) methods are developed because of the wide range of applications. Existing performance evaluations of MOT methods usually separate the object tracking step from the object detection step by ... More
Advantages of high-speed technique for quantum key distribution; reply to quant-ph/0407050Jul 18 2004We respond to a comment on our high-speed technique for the implementation of free-space quantum key distribution (QKD). The model used in the comment assigns inappropriately high link losses to the technique in question. We show that the use of reasonable ... More
In-network Congestion-aware Load Balancing at Transport LayerNov 24 2018Load balancing at transport layer is an important function in data centers, content delivery networks, and mobile networks. This function has unique requirements and greatly impacts the end users' experience. Recent studies in the field have identified ... More
Direct observation of DNA dynamics in semi-dilute solutions in extensional flowApr 22 2016Dec 02 2016The dynamic behavior of semi-dilute polymer solutions is governed by an interplay between solvent quality, concentration, molecular weight, and flow type. Semi-dilute solutions are characterized by large fluctuations in concentration, wherein polymer ... More
In-network Congestion-aware Load Balancing at Transport LayerNov 24 2018Jun 14 2019Load balancing at transport layer is an important function in data centers, content delivery networks, and mobile networks, where per-connection consistency (PCC) has to be met for optimal performance. Cloud-native L4 load balancers are commonly deployed ... More
Parameter-free prediction of DNA dynamics in planar extensional flow of semidilute solutionsApr 22 2016Dec 01 2016The dynamics of individual DNA molecules in semidilute solutions undergoing planar extensional flow is simulated using a multi-particle Brownian dynamics algorithm, which incorporates hydrodynamic and excluded volume interactions in the context of a coarse-grained ... More
Bond order solid of two-dimensional dipolar fermionsNov 11 2011Feb 29 2012Recent experimental realization of dipolar Fermi gases near or below quantum degeneracy provides opportunity to engineer Hubbard-like models with long range interactions. Motivated by these experiments, we chart out the theoretical phase diagram of interacting ... More
User-Guided Deep Anime Line Art Colorization with Conditional Adversarial NetworksAug 09 2018Aug 10 2018Scribble colors based line art colorization is a challenging computer vision problem since neither greyscale values nor semantic information is presented in line arts, and the lack of authentic illustration-line art training pairs also increases difficulty ... More
Applications of Polynomial Algebras to Deformed OscillatorSep 13 2009Oct 20 2009The polynomial algebra is a deformed SU(2) algebra. Here, we use polynomial algebra as a method to solve a series of deformed oscillators. Meanwhile, we find a series of physics systems corresponding with polynomial algebra with different maximal order. ... More
Switchable metamaterial reflector/absorber for different polarized electromagnetic wavesOct 21 2010We demonstrate a controllable electromagnetic wave reflector/absorber for different polarizations with metamaterial involving electromagnetic resonant structures coupled with diodes. Through biasing at different voltages to turn ON and OFF the diodes, ... More
ALMA Observations of the Spatial Distribution of three C$_2$H$_4$O$_2$ Isomers towards Sgr B2(N)Dec 17 2018Dec 21 2018The C$_2$H$_4$O$_2$ isomers have been previously investigated primarily via disparate sets of observations involving single dish and array measurements. The only attempt at using a uniform set of observations was performed with the IRAM 30 m observation ... More
Topological nodal points in two coupled SSH chainsApr 14 2017We study two coupled Su-Schrieffer-Heeger (SSH) chains system, which is shown to contain rich quantum phases associated with topological invariants protected by symmetries. In the weak coupling region, the system supports two non-trivial topological insulating ... More
Mechanical Switching of Nanoscale Multiferroic Phase BoundariesSep 27 2017Tuning the lattice degree of freedom in nanoscale functional crystals is critical to exploit the emerging functionalities such as piezoelectricity, shape-memory effect, or piezomagnetism, which are attributed to the intrinsic lattice-polar or lattice-spin ... More
Globular Clusters As Tracers of Fine Structure in the Dramatic Shell Galaxy NGC 474Dec 13 2016Globular clusters (GCs) are some of the most visible tracers of the merging and accretion history of galaxy halos. Metal-poor GCs, in particular, are thought to arrive in massive galaxies largely through dry, minor merging events, but it is rare to see ... More
A functional approach to deconvolve dynamic neuroimaging dataNov 07 2014Positron Emission Tomography (PET) is an imaging technique which can be used to investigate chemical changes in human biological processes such as cancer development or neurochemical reactions. Most dynamic PET scans are currently analyzed based on the ... More
Inverse regression for longitudinal dataMay 23 2014Oct 23 2015Sliced inverse regression (Duan and Li [Ann. Statist. 19 (1991) 505-530], Li [J. Amer. Statist. Assoc. 86 (1991) 316-342]) is an appealing dimension reduction method for regression models with multivariate covariates. It has been extended by Ferr\'{e} ... More
On-chip Rotated Polarization Directional Coupler Fabricated by Femtosecond Laser Direct WritingDec 19 2018We present a rotated polarization directional coupler (RPDC) on a photonic chip. We demonstrate a double-track approach to modify the distribution of refractive index between adjacent tracks and form a single waveguide with arbitrary birefringent optical ... More
Signal of New Physics and Test of Isospin-SU(3) Relations and CP Violation in Charmless B DecaysJun 02 2006A model-independent analytical analysis for charmless B decays is presented. It is demonstrated that the CP-averaging branching ratio difference $\Delta R = R_c - R_n$ in $B\to \pi K$ decays with $R_c = 2Br(\pi^0K^-)/Br(\pi^-\bar{K}^0)$ and $R_n =Br(\pi^+K^-)/2Br(\pi^0\bar{K}^0)$ ... More
Dynamical symmetries of two-dimensional systems in relativistic quantum mechanicsApr 25 2008Oct 13 2008The two-dimensional Dirac Hamiltonian with equal scalar and vector potentials has been proved commuting with the deformed orbital angular momentum $L$. When the potential takes the Coulomb form, the system has an SO(3) symmetry, and similarly the harmonic ... More
All-dielectric active photonics driven by bound states in the continuumMar 06 2018Recently emerged dielectric resonators and metasurfaces offer a low-loss platform for efficient manipulation of electromagnetic waves from microwave to visible. Such flat meta-optics can focus electromagnetic waves, generate structured beams and vortices, ... More
First Confirmed Detection of a Bipolar Molecular Outflow from a Young Brown DwarfOct 15 2008Oct 30 2008Studying the earliest stages in the birth of stars is crucial for understanding how they form. Brown dwarfs with masses between that of stars and planets are not massive enough to maintain stable hydrogen-burning fusion reactions during most of their ... More
Polar and phase domain walls with conducting interfacial states in a Weyl semimetal MoTe2Aug 08 2019Much of the dramatic growth in research on topological materials has focused on topologically protected surface states. While the domain walls of topological materials such as Weyl semimetals with broken inversion or time-reversal symmetry can provide ... More
A non-abelian Seiberg-Witten invariant for integral homology 3-spheresOct 25 2003Jan 04 2004A new diffeomorphism invariant of integral homology 3-spheres is defined using a non-abelian 'quaternionic' version of the Seiberg-Witten equations.
Counting overlattices in automorphism groups of treesJun 11 2005We give an upper bound for the number of ``overlattices'' in the automorphism group of a tree, containing a fixed lattice with index n. For an example of a lattice in the automorphism group of a 2p-regular tree whose quotient is a loop, we obtain a lower ... More
Analytic Pontryagin DualityJun 25 2019Let $X$ be a smooth compact manifold. We propose a geometric model for the group $K^0(X,\mathbb{R}/\mathbb{Z}).$ We study a well-defined and non-degenerate analytic duality pairing between $K^0(X,\mathbb{R}/\mathbb{Z})$ and its Pontryagin dual group, ... More
Equivariant Derived Categories Associated to a Sum of Two PotentialsNov 09 2016Oct 30 2017Suppose $f,g$ are homogeneous polynomials of degree $d$ defining smooth hypersurfaces $X_f = V(f)\subset \mathbb{P}^{m-1}$ and $X_g = V(g)\subset\mathbb{P}^{n-1}$. Then the sum $f(x)+g(y)$ defines a smooth hypersurface $X=V(f(x)+g(y))\subset\mathbb{P}^{m+n-1}$ ... More
Analytic Pontryagin DualityJun 25 2019Aug 15 2019Let $X$ be a smooth compact manifold. We propose a geometric model for the group $K^0(X,\mathbb{R}/\mathbb{Z}).$ We study a well-defined and non-degenerate analytic duality pairing between $K^0(X,\mathbb{R}/\mathbb{Z})$ and its Pontryagin dual group, ... More
Defining an SU(3)-Casson/U(2)-Seiberg-Witten integer invariant for integral homology 3-spheresNov 01 2004The SU(3)-Casson invariant for integral homology 3-spheres as studied by Boden-Herald possesses a 'spectral flow obstruction' to being an integer valued invariant which depends only on the non-degenerate (perturbed) moduli space of flat SU(3)-connections. ... More
Minimal volume entropy on graphsJun 11 2005Among the normalized metrics on a graph, we show the existence and the uniqueness of an entropy-minimizing metric, and give explicit formulas for the minimal volume entropy and the metric realizing it.
MIMO Z Channel Interference ManagementMar 31 2012MIMO Z Channel is investigated in this paper. We focus on how to tackle the interference when different users try to send their codewords to their corresponding receivers while only one user will cause interference to the other. We assume there are two ... More
Nuclear Density Functional Theory and the Equation of StateApr 06 2011A nuclear density functional can be used to find the binding energy and shell structure of nuclei and the energy gap in superconducting nuclear matter. In this paper, we study the possible application of a nuclear density functional theory to nuclear ... More
Measurement of electrons from heavy-flavor decays from $p$+$p$, $d$+Au, and Cu+Cu collisions in the PHENIX experimentAug 18 2014Charm and bottom quarks are formed predominantly by gluon fusion in the initial hard scatterings at RHIC, making them good probes of the full medium evolution. Previous measurements at RHIC have shown large suppression and azimuthal anisotropy of open ... More
Optimal martingale transport between radially symmetric marginals in general dimensionsDec 11 2014Feb 16 2018We determine the optimal structure of couplings for the \emph{Martingale transport problem} between radially symmetric initial and terminal laws $\mu, \nu$ on $\R^d$ and show the uniqueness of optimizer. Here optimality means that such solutions will ... More
Diffraction at HERAMay 30 2008Precision measurements of diffraction have been performed by the H1 and ZEUS experiments at the HERA collider with high statistics for a wide kinematic range of photon virtuality $Q^2$. The diffractive parton densities are extracted by performing the ... More
Exclusive $B \to VV $ Decays and CP Violation in the General two-Higgs-doublet ModelJan 17 2008Jan 22 2008Using the general factorization approach, we present a detailed investigation for the branching ratios, CP asymmetries and longitudinal polarization fractions in all charmless hadronic $B \to VV$ decays (except for the pure annihilation processes) within ... More
The Fredhom Approach to Charactize Gravitational Wave EchoesAug 01 2019Gravitational waves are a sensitive probe into the structure of compact astronomical objects and the nature of gravity in the strong regime. Modifications of near-horizon physics can imprint on the late time ringdown waveform, leaving behind a train of ... More
Pentavalent symmetric graphs of order four times an odd square-free integerFeb 19 2017A graph is said to be symmetric if its automorphism group is transitive on its arcs. Guo et al. (Electronic J. Combin. 18, \#P233, 2011) and Pan et al. (Electronic J. Combin. 20, \#P36, 2013) determined all pentavalent symmetric graphs of order $4pq$. ... More
The Fredholm Approach to Charactize Gravitational Wave EchoesAug 01 2019Aug 07 2019Gravitational waves are a sensitive probe into the structure of compact astronomical objects and the nature of gravity in the strong regime. Modifications of near-horizon physics can imprint on the late time ringdown waveform, leaving behind a train of ... More
Experimental signatures of phase interference and sub-femtosecond time dynamics on the incident energy axis of resonant inelastic X-ray scatteringDec 03 2016Core hole resonance is used in X-ray spectroscopy to incisively probe the local electronic states of many-body systems. Here, resonant inelastic X-ray scattering (RIXS) is studied as a function of incident photon energy on Mott insulators SrCuO2 and NiO ... More
Multi-martingale optimal transportNov 04 2016Beiglb\"ock-Juillet, Beiglb\"ock-Nutz-Touzi showed that the duality is attained in a suitable sense for the martingale optimal transport problem on the real line, that is, when there is one underlying martingale process. We generalize the duality result ... More
Optimal martingale transport between radially symmetric marginals in general dimensionsDec 11 2014May 17 2016We determine the optimal structure of couplings for the \emph{Martingale transport problem} between radially symmetric initial and terminal laws $\mu, \nu$ on $\R^d$ and show the uniqueness of optimizer. Here optimality means that such solutions will ... More
Two Embedding Theorems for Data with Equivalences under Finite Group ActionJul 30 2012Oct 15 2012There is recent interest in compressing data sets for non-sequential settings, where lack of obvious orderings on their data space, require notions of data equivalences to be considered. For example, Varshney & Goyal (DCC, 2006) considered multiset equivalences, ... More
Instanton homology and the Alexander polynomialJul 24 2009Jul 25 2009We prove that the instanton knot homology KHI(K) as defined by Kronheimer and Mrowka (Knots, sutures and excision, preprint), recovers the Alexander polynomial for knots K in the 3-sphere.
Convolutional Attention-based Seq2Seq Neural Network for End-to-End ASROct 12 2017This thesis introduces the sequence to sequence model with Luong's attention mechanism for end-to-end ASR. It also describes various neural network algorithms including Batch normalization, Dropout and Residual network which constitute the convolutional ... More
Influence of the Fermi Surface Morphology on the Magnetic Field-Driven Vortex Lattice Structure Transitions in YBa$_{2}$Cu$_{3}$O$_{7-δ}:δ=$0, 0.15Mar 13 2015We report small-angle neutron scattering measurements of the vortex lattice (VL) structure in single crystals of the lightly underdoped cuprate superconductor YBa2Cu3O6.85. At 2 K, and for fields of up to 16 T applied parallel to the crystal c-axis, we ... More
Dark Matter in Ultra-Diffuse Galaxies in the Virgo Cluster from their Globular Cluster PopulationsMar 26 2018We present Keck/DEIMOS spectroscopy of globular clusters (GCs) around the ultra-diffuse galaxies (UDGs) VLSB-B, VLSB-D, and VCC615 located in the central regions of the Virgo cluster. We spectroscopically identify 4, 12, and 7 GC satellites of these UDGs, ... More
Gauge-singlet dark matter in a left-right symmetric model with spontaneous CP violationNov 17 2008Nov 26 2008We propose a dark matter (DM) scenario in an extension of a left-right symmetric model with a gauge-singlet scalar field. The gauge-singlet scalar can automatically become a DM candidate, provided that both P and CP symmetries are only broken spontaneously. ... More
A Transport Model for Nuclear Reactions Induced by Radioactive BeamsApr 25 2005Major ingredients of an isospin and momentum dependent transport model for nuclear reactions induced by radioactive beams are outlined. Within the IBUU04 version of this model we study several experimental probes of the equation of state of neutron-rich ... More