total 4942took 0.10s

A comparison between Faraday Tomography and Synchrotron Polarization GradientsJan 23 2019Mar 02 2019Observations of synchrotron polarization at multiple frequencies in the presence of Faraday rotation can provide a way to reconstruct the 3D magnetic field distribution. In this paper we compare the well known Faraday Tomography (FT, Burn 1966) technique ... More

Tracing Magnetic Field with Synchrotron Polarization Gradients: Parameter StudyApr 26 2019We employ synthetic observations obtained with MHD simulations to study how to trace the distribution of turbulent magnetic fields using the synchrotron polarization gradient techniques suggested by Lazarian \& Yuen (2018). Both synchrotron polarization ... More

Comment on Clark et al. (2019) "The Physical Nature of Neutral Hydrogen Intensity Structure"Apr 05 2019A recent publication by Clark et.al (2019, CX19) uses both GALFA-HI observational data and numerical simulations to address the nature of intensity fluctuations in Position-Position-Velocity (PPV) space. The study questions the validity and applicability ... More

Distribution of velocity gradient orientations: Mapping magnetization with the Velocity Gradient TechniqueFeb 08 2018Aug 01 2018Recent developments of the Velocity Gradient Technique (VGT) show that the velocity gradients provide a reliable tracing of magnetic field direction in turbulent plasmas. In this paper, we explore the ability of velocity gradients to measure the magnetization ... More

Tracing magnetic field morphology using the Velocity Gradient Technique in the presence of CO self-absorptionSep 26 2018Jan 30 2019Probing magnetic fields in self-gravitating molecular clouds are generally difficult even with the use of the polarimetry. Based on the properties of magneto-hydrodynamic (MHD) turbulence and turbulent reconnection, Velocity Gradient Technique (VGT) provides ... More

Statistical tracing of magnetic fields: comparing and improving the techniquesApr 08 2018Aug 14 2018Magnetohydrodynamic(MHD) turbulence displays velocity anisotropies which reflect the direction of the magnetic field. This anisotropy has led to the development of a number of statistical techniques for studying magnetic fields in the interstellar medium. ... More

Asymptotic Behavior of Colored Jones polynomial and Turaev-Viro Invariant of figure eight knotNov 30 2017Jun 14 2018In this paper we investigate the asymptotic behavior of the colored Jones polynomial and the Turaev-Viro invariant for the figure eight knot. More precisely, we consider the $M$-th colored Jones polynomial evaluated at $(N+1/2)$-th root of unity with ... More

Tracing 3D distribution of magnetic fields with gradients of synchrotron polarizationJan 31 2018In this paper, we describe a new technique for probing galactic and extragalactic 2D and 3D distribution of magnetic field using synchrotron polarization. Fluctuations of magnetic field are elongated along the ambient magnetic field directions. As a result, ... More

The dimension of an amoebaDec 19 2018Answering a question by Nisse and Sottile, we derive a formula for the dimension of the amoeba of an irreducible algebraic variety.

Tilings of the Sphere by Geometrically Congruent Pentagons IOct 08 2013May 08 2014We show that there are no edge-to-edge tilings of the sphere by congruent pentagons beyond the minimal dodecahedron tiling, such that there is a tile with all vertices having degree 3 and the edge length combinations are three of the five possibilities. ... More

Diagnostics of turbulence properties through Velocity Gradient Amplitudes: Theory and ObservationsJan 31 2018Based on the properties of magneto-hydrodynamic (MHD) turbulence, the recent development of the Velocity Gradient Technique (VGT) allows observers to trace magnetic field directions using spectroscopic information. In this paper, we explore how the amplitudes ... More

Synchrotron intensity gradients as tracers of magnetic fieldJan 26 2017Feb 02 2018On the basis of the modern understanding of MHD turbulence, we propose a new way of using synchrotron radiation, namely using synchrotron intensity gradients for tracing astrophysical magnetic fields. We successfully test the new technique using synthetic ... More

Time Evolution of 3D Disk Formation with Misaligned Magnetic Field and Rotation AxesDec 30 2018Distinguishing diagnostic observational signatures produced by MHD models is essential in understanding the physics for the formation of protostellar disks in the ALMA era. Developing suitable tools along with time evolution will facilitate better identification ... More

A comparison between Faraday Tomography and Synchrotron Polarization GradientsJan 23 2019Observations of synchrotron polarization at multiple frequencies in the presence of Faraday rotation can provide a way to reconstruct the 3D magnetic field distribution. In this paper we compare the well known Faraday Tomography (FT, Burn 1966) technique ... More

Determining neutron star masses and radii using energy-resolved waveforms of X-ray burst oscillationsApr 08 2013Simultaneous, precise measurements of the mass $M$ and radius $R$ of neutron stars can yield uniquely valuable information about the still uncertain properties of cold matter at several times the density of nuclear matter. One method that could be used ... More

Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart GridJul 24 2018Malicious attacks in the power system can eventually result in a large-scale cascade failure if not attended on time. These attacks, which are traditionally classified into \emph{physical} and \emph{cyber attacks}, can be avoided by using the latest and ... More

Local Cyber-physical Attack with Leveraging Detection in Smart GridAug 10 2017A well-designed attack in the power system can cause an initial failure and then results in large-scale cascade failure. Several works have discussed power system attack through false data injection, line-maintaining attack, and line-removing attack. ... More

Dispersion of velocity gradients: Mapping magnetization with the Velocity Gradient TechniqueFeb 08 2018Recent developments of the Velocity Gradient Technique (VGT) show that the velocity provides a robust measure of magnetic field direction. In this paper, we use velocity centroids as the measures of velocity and propose a new way of studying media magnetization. ... More

Origin of intermittent accretion-powered X-ray oscillations in neutron stars with millisecond spin periodsSep 24 2008Oct 05 2009We have shown previously that many of the properties of persistent accretion-powered millisecond pulsars can be understood if their X-ray emitting areas are near their spin axes and move as the accretion rate and structure of the inner disk vary. Here ... More

Tracing Multi-Scale Magnetic Field Structure Using Multiple Chemical Tracers in Giant Molecular CloudsApr 08 2019Apr 20 2019Probing magnetic fields in Giant Molecular Clouds is often challenging. Fortunately, it has recently been shown in simulations that analysis of velocity gradients (the Velocity Gradient Technique) can be used to map out the magnetic field morphology of ... More

Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key DistributionNov 10 2014Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error ... More

Fundamental Quantitative Security In Quantum Key DistributionAug 03 2010Dec 07 2010We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution ... More

Jet schemes of determinantal varietiesAug 25 2006This article studies the scheme structure of the jet schemes of determinantal varieties. We show that in general, these jet schemes are not irreducible. In the case of the determinantal variety $X$ of $r \times s$ matrices of rank at most one, we give ... More

Self-Similar Blowup Solutions to the 2-Component Degasperis-Procesi Shallow Water SystemAug 13 2010In this article, we study the self-similar solutions of the 2-component Degasperis-Procesi water system:% [c]{c}% \rho_{t}+k_{2}u\rho_{x}+(k_{1}+k_{2})\rho u_{x}=0 u_{t}-u_{xxt}+4uu_{x}-3u_{x}u_{xx}-uu_{xxx}+k_{3}\rho\rho_{x}=0. By the separation method, ... More

What The Trace Distance Security Criterion in Quantum Key Distribution Does And Does Not GuaranteeOct 25 2014Cryptographic security of quantum key distribution is currently based on a trace distance criterion. The widespread misinterpretation of the criterion as failure probability and also its actual scope have been discussed previously. Recently its distinguishability ... More

Stabilities for Euler-Poisson Equations with Repulsive Forces in R^NJan 03 2010This article extends the previous paper in "M.W. Yuen, \textit{Stabilities for Euler-Poisson Equations in Some Special Dimensions}, J. Math. Anal. Appl. \textbf{344} (2008), no. 1, 145--156.", from the Euler-Poisson equations for attractive forces to ... More

Perturbational Blowup Solutions to the 1-dimensional Compressible Euler EquationsDec 09 2010We study the construction of analytical non-radially solutions for the 1-dimensional compressible adiabatic Euler equations in this article. We could design the perturbational method to construct a new class of analytical solutions. In details, we perturb ... More

Rotational and Self-similar Solutions for the Compressible Euler Equations in R^3Sep 23 2014In this paper, we present rotational and self-similar solutions for the compressible Euler equations in R^3 using the separation method. These solutions partly complement Yuen's irrotational and elliptic solutions in R^3 [Commun. Nonlinear Sci. Numer. ... More

Perturbational Blowup Solutions to the 2-Component Camassa-Holm EquationsDec 08 2010In this article, we study the perturbational method to construct the non-radially symmetric solutions of the compressible 2-component Camassa-Holm equations. In detail, we first combine the substitutional method and the separation method to construct ... More

Security of Quantum Key DistributionFeb 24 2016The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed. It is demonstrated ... More

Quantum Mechanics in Technicolor; Analytic Expressions for a Spin-Half Particle Driven by Polychromatic LightMay 15 2018Jul 23 2018A vast collection of light-matter interactions are described by the single-frequency Rabi model. However, the physical world is polychromatic, and until now there is no general method to find analytic solutions to the multi-frequency Rabi model. We present ... More

Analytical Solutions to the Navier-Stokes EquationsNov 03 2008Feb 19 2009With the previous results for the analytical blowup solutions of the N-dimensional Euler-Poisson equations, we extend the similar structure to construct an analytical family of solutions for the isothermal Navier-Stokes equations and pressureless Navier-Stokes ... More

Exact, Rotational, Infinite Energy, Blowup Solutions to the 3-Dimensional Euler EquationsMay 21 2011In this paper, we construct a new class of blowup solutions with elementary functions to the 3-dimensional compressible or incompressible Euler and Navier-Stokes equations. In detail, we obtain a class of global rotational exact solutions for the compressible ... More

Tracing Multi-Scale Magnetic Field Structure Using Multiple Chemical Tracers in Giant Molecular CloudsApr 08 2019Probing magnetic fields in Giant Molecular Clouds is often challenging. Fortunately, it has recently been shown in simulations that analysis of velocity gradients (the Velocity Gradient Technique) can be used to map out the magnetic field morphology of ... More

Some Infinitary Paradoxes and Undecidable Sentences in Peano ArithmeticApr 12 2016According to Chaitin, G\"odel once told him "it doesn't matter which paradox you use [to prove the First Incompleteness Theorem]". In this paper I will present a few infinitary paradoxes and show how to "translate" them to some undecidable sentences in ... More

On geometric properties of the functors of positively homogenous and semiadditive functionalsMar 01 2010In this paper we investigate the functors of OH of positively homogenous functionals and OS of semiadditive functionals. We show that OH(X) is AR if and only if X is openly generated, and OS(X) is AR if and only if X is an openly generated compactum of ... More

ECG beats classification using waveform similarity and RR intervalJan 10 2011This paper present an electrocardiogram (ECG) beat classification method based on waveform similarity and RR interval. The purpose of the method is to classify six types of heart beats (normal beat, atrial premature beat, paced beat, premature ventricular ... More

A Helium nanodrop bouncing off a wallJul 25 2003Aug 10 2003We investigate numerically the quantum collision between a stable Helium nanodrop and an infinitely hard wall in one dimension. The scattering outcome is compared to the same event omitting the quantum pressure. Only the quantum process reflects the effect ... More

Geometric Bijections Between Spanning Trees and Break DivisorsSep 09 2015The Jacobian group ${\rm Jac}(G)$ of a finite graph $G$ is a group whose cardinality is the number of spanning trees of $G$. $G$ also has a tropical Jacobian which has the structure of a real torus; using the notion of break divisors, An et al. obtained ... More

Quantum bit commitment and unconditional securityJul 16 2002Aug 20 2002It is generally believed that unconditionally secure quantum bit commitment is impossible, due to widespread acceptance of an impossibility proof that utilizes quantum entaglement cheating. In this paper, we delineate how the impossibiliy proof formulation ... More

BQP_p = PP for integer p > 2Jun 03 2011Jun 22 2011There's something really strange about quantum mechanics. It's not just that cats can be dead and alive at the same time, and that entanglement seems to violate the principle of locality; quantum mechanics seems to be what Aaronson calls "an island in ... More

Impossibility Proofs and Quantum Bit CommitmentAug 14 2008The nature and scope of various impossibility proofs as they relate to real-world situations are discussed. In particular, it is shown in words without technical symbols how secure quantum bit commitment protocols may be obtained with testing that exploits ... More

Direct Use of Secret Key in Quantum CryptographyMar 29 2006May 09 2006For single-photon quantum key generation between two users, it is shown that the use of a shared secret key extended via a pseudo-random number generator may simultaneously enhance the security and efficiency of the cryptosystem. This effect arises from ... More

How unconditionally secure quantum bit commitment is possibleSep 13 2001Nov 20 2001Bit commitment involves the submission of evidence from one party to another so that the evidence can be used to confirm a later revealed bit value by the first party, while the second party cannot determine the bit value from the evidence alone. It is ... More

Spin representations of real reflection groups of non-crystallographic root systemsApr 12 2012Jul 02 2014A uniform parametrization for the irreducible spin representations of Weyl groups in terms of nilpotent orbits is recently achieved by Ciubotaru (2011). This paper is a generalization of this result to other real reflection groups. Let $(V_0, R, V_0^{\vee}, ... More

Similarity reductions and new nonlinear exact solutions for the 2D incompressible Euler equationsJan 26 2014For the 2D and 3D Euler equations, their existing exact solutions are often in linear form with respect to variables x,y,z. In this paper, the Clarkson-Kruskal reduction method is applied to reduce the 2D incompressible Euler equations to a system of ... More

A vanishing theorem for Dirac cohomology of standard modulesOct 01 2016Dec 02 2017This paper studies the Dirac cohomology of standard modules in the setting of graded Hecke algebras with geometric parameters. We prove that the Dirac cohomology of a standard module vanishes if and only if the module is not twisted-elliptic tempered. ... More

Homological branching law for $(\mathrm{GL}_{n+1}(F), \mathrm{GL}_n(F))$: projectivity and indecomposabilityMay 05 2019This paper studies homological properties of irreducible representations restricted from $\mathrm{GL}_{n+1}(F)$ to $\mathrm{GL}_n(F)$. We establish the following: (1) classify irreducible smooth representations of $\mathrm{GL}_{n+1}(F)$ which are projective ... More

Duality for Ext-groups and extensions of discrete series for graded Hecke algebrasOct 06 2014Oct 03 2016In this paper, we study extensions of graded affine Hecke algebra modules. In particular, based on an explicit projective resolution on graded affine Hecke algebra modules, we prove a duality result for Ext-groups. This duality result with an Ind-Res ... More

Self-similar Fragmentation Regulated by Magnetic Fields in a Massive Star Forming FilamentOct 24 2015Most molecular clouds are filamentary or elongated. Among those forming low-mass stars, their long axes tend to be either parallel or perpendicular to the large-scale (10-100 pc) magnetic field (B-field) in the surrounding inter cloud medium. This arises ... More

Essential lack of security proof in quantum key distributionOct 02 2013Oct 22 2013All the currently available unconditional security proofs on quantum key distribution, in particular for the BB84 protocol and its variants including continuous-variable ones, are invalid or incomplete at many points. In this paper we discuss some of ... More

Problems of Security Proofs and Fundamental Limit on Key Generation Rate in Quantum Key DistributionMay 16 2012May 21 2012It is pointed out that treatments of the error correcting code in current quantum key distribution protocols of the BB84 type are not correct under joint attack, and the general interpretation of the trace distance security criterion is also incorrect. ... More

Problems of Existing Unconditional Security Proofs in Quantum Key DistributionSep 06 2011Oct 15 2012It is repeatedly and persistently claimed in the literature that a specific trace criterion $d$ would guarantee universal composition security in quantum cryptography. Currently that is the sole basis of unconditional security claim in quantum key distribution. ... More

Another simple unconditionally secure quantum bit commitment protocol -- beating entanglement with entanglementMay 23 2003Jan 14 2004It is shown how the evidence state space in quantum bit commitment may be made to depend on the bit value 0 or 1 with split entangled pairs. As a consequence, one can obtain a protocol that is perfectly concealing, but is also $\epsilon$-binding because ... More

An Unconditionally Secure Quantum Bit Commitment ProtocolDec 05 2012This article describes a quantum bit commitment protocol, QBC1, based on entanglement destruction via forced measurements and proves its unconditional security.

Fundamental Security Issues in Continuous Variable Quantum Key DistributionAug 29 2012Several fundamental issues in establishing security in continuous variable quantum key distribution are discussed, in particular on reverse reconciliation and security under heterodyne attack. It appears difficult to derive quantum advantage in a concrete ... More

Unconditionally Secure Quantum Bit CommitmentMay 18 2005The ``impossibility proof'' on unconditionally secure quantum bit commitment is examined. It is shown that the possibility of juxtaposing quantum and classical randomness has not been properly taken into account. A specific protocol that beats entanglement ... More

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution ProtocolsMay 07 2014In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation ... More

Security Significance of the Trace Distance Criterion in Quantum Key DistributionSep 13 2011Nov 09 2011The security significance of the trace distance security criterion $d$ is analyzed in terms of operational probabilities of an attacker's success in identifying different subsets of the generated key, both during the key generation process and when the ... More

KCQ: A New Approach to Quantum Cryptography I. General Principles and Key GenerationNov 10 2003Jul 30 2004A new approach to quantum cryptography to be called KCQ, keyed communication in quantum noise, is developed on the basis of quantum detection and communication theory for classical information transmission. By the use of a shared secret key that determines ... More

How to Build Unconditionally Secure Quantum Bit Commitment ProtocolsMay 23 2003Jan 14 2004The ``impossibility proof'' on unconditionally secure quantum bit commitment is critically analyzed. Many possibilities for obtaining a secure bit commitment protocol are indicated, purely on the basis of two-way quantum communications, which are not ... More

Fundamental Insecurity of Multi-Photon Sources Under Photon-Number Splitting Attacks in Quantum Key DistributionJul 30 2012Aug 06 2012A simple photon-number splitting attack is described which works on any lossy quantum key distribution system with a multi-photon source independently of the mean source photon number, and with no induced error rate. In particular, it cannot be detected ... More

Uncertainty Principle and the Standard Quantum LimitsOct 10 2005The role of the Uncertainty Principle is examined through the examples of squeezing, information capacity, and position monitoring. It is suggested that more attention should be directed to conceptual considerations in quantum information science and ... More

A simple proof of Renner's exponential de Finetti theoremAug 17 2016Aug 20 2016We give a simple proof of the exponential de Finetti theorem due to Renner. Like Renner's proof, ours combines the post-selection de Finetti theorem, the Gentle Measurement lemma, and the Chernoff bound, but avoids virtually all calculations, including ... More

Finite Groups Embeddable in Division RingsMay 03 2000Finite groups that are embeddable in the multiplicative groups of division rings $K$ were completely determined by S. A. Amitsur in 1955. In case $K$ has characteristic $p>0$, the only possible finite subgroups of $K^*$ are cyclic groups, according to ... More

First extensions and filtrations of standard modules for graded Hecke algebrasOct 19 2015Oct 03 2016In this paper, we establish connections between the first extensions of simple modules and certain filtrations of of standard modules in the setting of graded Hecke algebras. The filtrations involved are radical filtrations and Jantzen filtrations. Our ... More

Dirichlet forms and critical exponents on fractalsMar 21 2017Apr 19 2018Let $B^{\sigma}_{2, \infty}$ denote the Besov space defined on a compact set $K \subset {\Bbb R}^d$ which is equipped with an $\alpha$-regular measure $\mu$. The {\it critical exponent} $\sigma^*$ is the supremum of the $\sigma$ such that $B^{\sigma}_{2, ... More

Technological conditions of mobile learning in high schoolJul 31 2018This paper reviews the history of mobile learning, provides a definition of mobile learning. The properties, advantages and disadvantages of mobile learning, areas of its implementation at the Technical University and mobile learning tools were specified. ... More

A photonic transistor device based on photons and phonons in a cavity electromechanical systemSep 21 2012We present a scheme for photonic transistors based on photons and phonons in a cavity electromechanical system, which is consisted of a superconducting microwave cavity coupled to a nanomechanical resonator. Control of the propagation of photons is achieved ... More

A Robust and Efficient Detection Algorithm for The Photon-Counting Free-Space Optical SystemNov 13 2014We propose a Viterbi-type trellis-search algorithm to implement the FSO photon-counting sequence receiver proposed in [1] more efficiently and a selective-store strategy to overcome the error floor problem observed therein.

Periodic Solutions of 2D Isothermal Euler-Poisson Equations with Possible Applications to Spiral and Disk-like GalaxiesAug 04 2014Compressible Euler-Poisson equations are the standard self-gravitating models for stellar dynamics in classical astrophysics. In this article, we construct periodic solutions to the isothermal ($\gamma=1$) Euler-Poisson equations in $R^{2}$ with possible ... More

Line Solutions for the Euler and Euler-Poisson Equations with Multiple Gamma LawMay 20 2010In this paper, we study the Euler and Euler-Poisson equations in $R^{N}$, with multiple $\gamma$-law for pressure function: \begin{equation} P(\rho)=e^{s}\sum_{j=1}^{m}\rho^{\gamma_{j}}, \end{equation} where all $\gamma_{i+1}>\gamma_{i}\geq1$, is the ... More

Iwahori component of Bessel model spacesJun 11 2018Let $k_0$ be a $p$-adic field of odd residual characteristic, and $G$ a special orthogonal group defined as acting on a split $2n+1$-dimensional orthogonal space $V$ over $k_0$. Let $H$ be the Iwahori Hecke algebra of $G$. A purpose of this short article ... More

Bernstein-Zelevinsky derivatives, branching rules and Hecke algebrasMay 17 2016Let $G$ be a split reductive group over a $p$-adic field $F$. Let $B$ be a Borel subgroup and $U$ the maximal unipotent subgroup of $B$. Let $\psi$ be a Whittaker character of $U$. Let $I$ be an Iwahori subgroup of $G$. We describe the Iwahori-Hecke algebra ... More

Binary Forms and the Hyperelliptic Superstring AnsatzNov 24 2009We give a hyperelliptic formulation of the Ansatz of D'Hoker and Phong. We give an explicit family of binary invariants, one for each genus, that satisfies this hyperelliptic Ansatz. We also prove that this is the unique family of weight eight binary ... More

Performance of Optimum and Suboptimum Combining Diversity Reception for Binary DPSK over Independent, Nonidentical Rayleigh Fading ChannelsAug 25 2010This paper is concerned with the error performance analysis of binary differential phase shift keying with differential detection over the nonselective, Rayleigh fading channel with combining diversity reception. Space antenna diversity reception is assumed. ... More

Wedderburn Polynomials over Division RingsAug 17 2000A Wedderburn polynomial over a division ring K is a minimal polynomial of an algebraic subset of K. Special cases of such polynomials include, for instance, the minimal polynomials (over the center F=Z(K)) of elements of K that are algebraic over F. In ... More

Exact joint laws associated with spectrally negative Levy processes and applications to insurance risk theoryJan 03 2011Feb 25 2014We consider the spectrally negative Levy processes and determine the joint laws for the quantities such as the first and last passage times over a fixed level, the overshoots and undershoots at first passage, the minimum, the maximum and the duration ... More

Pulsar Electrodynamics: an unsolved problemApr 13 2016Pulsar electrodynamics is reviewed emphasizing the role of the inductive electric field in an oblique rotator and the incomplete screening of its parallel component by charges, leaving `gaps' with $E_\parallel\ne0$. The response of the plasma leads to ... More

Bernstein-Zelevinsky derivatives: a Hecke algebra approachFeb 04 2017May 19 2017Let $G$ be a general linear group over a $p$-adic field. It is well known that Bernstein components of the category of smooth representations of $G$ are described by Hecke algebras arising from Bushnell-Kutzko types. We describe the Bernstein components ... More

A vanishing Ext-branching theorem for $(\mathrm{GL}_{n+1}(F), \mathrm{GL}_n(F))$Mar 24 2018We prove a conjecture of Dipendra Prasad on the Ext-branching problem from $\mathrm{GL}_{n+1}(F)$ to $\mathrm{GL}_n(F)$, where $F$ is a $p$-adic field.

Looking at Hands in Autonomous Vehicles: A ConvNet Approach using Part Affinity FieldsApr 03 2018In the context of autonomous driving, where humans may need to take over in the event where the computer may issue a takeover request, a key step towards driving safety is the monitoring of the hands to ensure the driver is ready for such a request. This ... More

Analytical Solutions to the Navier-Stokes-Poisson Equations with Density-dependent Viscosity and with PressureMay 05 2010We study some particular solutions to the Navier-Stokes-Poisson equations with density-dependent viscosity and with pressure, in radial symmetry. With extension of the previous known blowup solutions for the Euler-Poisson equations / pressureless Navier-Stokes-Poisson ... More

SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal NetworkSep 18 2015The EPCglobal network is a computer network which allows supply chain companies to search for their unknown partners globally and share information stored in product RFID tags with each other. Although there have been quite a number of recent research ... More

Asymptotic Behavior of Colored HOMFLY Polynomial of Figure Eight KnotNov 13 2017In this paper we investigate the asymptotic behavior of the colored HOMFLY polynomial of the figure eight knot associated with the symmetric representation. We establish an analogous asymptotic expansion for the colored HOMFLY polynomial. From the asymptotic ... More

The Edelstein effect in the presence of impurity spin-orbit scatteringOct 26 2016In this paper we study the current-induced spin polarization in a two-dimensional electron gas, known also as the Edelstein effect. Compared to previous treatments, we consider both the Rashba and Dresselhaus spin-orbit interaction as well as the spin-orbit ... More

GitHub and Stack Overflow: Analyzing Developer Interests Across Multiple Social Collaborative PlatformsAug 23 2017Aug 25 2017Increasingly, software developers are using a wide array of social collaborative platforms for software development and learning. In this work, we examined the similarities in developer's interests within and across GitHub and Stack Overflow. Our study ... More

On differential characteristic classesNov 15 2013Oct 16 2014In this paper we give explicit formulas of differential characteristic classes of principal $G$-bundles with connections and prove their expected properties. In particular, we obtain explicit formulas for differential Chern classes, differential Pontryagin ... More

Anomalous Scaling on a Spatiotemporally Chaotic AttractorJun 01 2010The Nikolaevskiy model for pattern formation with continuous symmetry exhibits spatiotemporal chaos with strong scale separation. Extensive numerical investigations of the chaotic attractor reveal unexpected scaling behavior of the long-wave modes. Surprisingly, ... More

Spectrality of Self-Similar TilesSep 16 2013We call a set $K \subset {\mathbb R}^s$ with positive Lebesgue measure a {\it spectral set} if $L^2(K)$ admits an exponential orthonormal basis. It was conjectured that $K$ is a spectral set if and only if $K$ is a tile (Fuglede's conjecture). Despite ... More

Critical exponents of induced Dirichlet forms on self-similar setsDec 06 2016Apr 08 2018In a previous paper [arXiv:1604.05440], we studied certain random walks on the hyperbolic graphs $X$ associated with the self-similar sets $K$, and showed that the discrete energy ${\mathcal E}_X$ on $X$ has an induced energy form ${\mathcal E}_K$ on ... More

Tunable pulse delay and advancement in a coupled nanomechanical resonator-superconducting microwave cavity systemDec 16 2010We theoretically study the transmission of a weak probe field under the influence of a strong pump field in a coupled nanomechanical resonator-superconducting microwave cavity system. Using the standard input-output theory, we find that both pulse delay ... More

$H^2$--Convergence of least-squares kernel collocation methodsJan 02 2018The strong-form asymmetric kernel-based collocation method, commonly referred to as the Kansa method, is easy to implement and hence is widely used for solving engineering problems and partial differential equations despite the lack of theoretical support. ... More

Coarsening to Chaos-Stabilized FrontsJun 01 2010We investigate a model for pattern formation in the presence of Galilean symmetry proposed by Matthews and Cox [Phys.\ Rev.\ E \textbf{62}, R1473 (2000)], which has the form of coupled generalized Burgers and Ginzburg-Landau-type equations. With only ... More

Spin Glass Transition at Nonzero Temperature in a Disordered Dipolar Ising System: The Case of LiHoxY{1-x}F4Oct 05 2008Jul 20 2009The physics of the spin glass (SG) state, with magnetic moments (spins) frozen in random orientations, is one of the most intriguing problems in condensed matter physics. While most theoretical studies have focused on the Edwards-Anderson model of Ising ... More

The spin parameter of uniformly rotating compact starsNov 16 2010Jan 21 2011We study the dimensionless spin parameter $j (= c J/ (G M^2))$ of uniformly rotating neutron stars and quark stars in general relativity. We show numerically that the maximum value of the spin parameter of a neutron star rotating at the Keplerian frequency ... More

Friendship Maintenance and Prediction in Multiple Social NetworksMar 02 2017Due to the proliferation of online social networks (OSNs), users find themselves participating in multiple OSNs. These users leave their activity traces as they maintain friendships and interact with other users in these OSNs. In this work, we analyze ... More

Wisdom in Sum of Parts: Multi-Platform Activity Prediction in Social Collaborative SitesMay 09 2018In this paper, we proposed a novel framework which uses user interests inferred from activities (a.k.a., activity interests) in multiple social collaborative platforms to predict users' platform activities. Included in the framework are two prediction ... More

Local index theory and the Riemann-Roch-Grothendieck theorem for complex flat vector bundlesAug 01 2016Oct 12 2018The purpose of this paper is to give a proof of the real part of the Riemann-Roch-Grothendieck theorem for complex flat vector bundles at the differential form level in the even dimensional fiber case. The proof is, roughly speaking, an application of ... More

Remarks on flat and differential K-theoryMar 24 2012Jul 16 2014In this note we prove some results in flat and differential $K$-theory. The first one is a proof of the compatibility of the differential topological index and the flat topological index by a direct computation. The second one is the explicit isomorphisms ... More