Results for "Mahdi Imani"

total 724took 0.09s
Scalable optimal Bayesian classification of single-cell trajectories under regulatory model uncertaintyFeb 08 2019Single-cell gene expression measurements offer opportunities in deriving mechanistic understanding of complex diseases, including cancer. However, due to the complex regulatory machinery of the cell, gene regulatory network (GRN) model inference based ... More
Particle Filters for Partially-Observed Boolean Dynamical SystemsFeb 23 2017Partially-observed Boolean dynamical systems (POBDS) are a general class of nonlinear models with application in estimation and control of Boolean processes based on noisy and incomplete measurements. The optimal minimum mean square error (MMSE) algorithms ... More
Control of Gene Regulatory Networks with Noisy Measurements and Uncertain InputsFeb 24 2017This paper is concerned with the problem of stochastic control of gene regulatory networks (GRNs) observed indirectly through noisy measurements and with uncertainty in the intervention inputs. The partial observability of the gene states and uncertainty ... More
Optimization of Bloom Filter Parameters for Practical Bloom Filter Based Epidemic Forwarding in DTNsAug 19 2012Epidemic forwarding has been proposed as a forwarding technique to achieve opportunistic communication in Delay Tolerant Networks. Even if this technique is well known and widely referred, one has to first deal with several practical problems before using ... More
Improving Regression Performance with Distributional LossesJun 12 2018There is growing evidence that converting targets to soft targets in supervised learning can provide considerable gains in performance. Much of this work has considered classification, converting hard zero-one values to soft labels---such as by adding ... More
Sequential Experimental Design for Optimal Structural Intervention in Gene Regulatory Networks Based on the Mean Objective Cost of UncertaintyMay 30 2018Scientists are attempting to use models of ever increasing complexity, especially in medicine, where gene-based diseases such as cancer require better modeling of cell regulation. Complex models suffer from uncertainty and experiments are needed to reduce ... More
Modified Relay Selection and Circuit Selection for Faster TorAug 26 2016Users of the Tor anonymity system suffer from lessthan- ideal performance, in part because circuit building and selection processes are not tuned for speed. In this paper, we examine both the process of selecting among pre-built circuits and the process ... More
3 Dimensional N=8 Supersymmetric Field Theory RevisitedAug 12 2008Feb 24 2009Inspired by ideas regarding Hermitian NxN matrix fields obeying a non-associative algebra, 3-dimensional N=8 SUSic field theories are proposed to on-shell represent subalgebras of OSp(8|2) and OSp(8|4) groups of SUSY transformations. They are theories ... More
A note on a paper of Harris concerning the asymptotic approximation to the eigenvalues of $-y"+qy=λy$, with boundary conditions of general formFeb 17 2012In this paper, we derive an asymptotic approximation to the eigenvalues of the linear differential equation $$ -y"(x)+q(x)y(x)=\lambda y(x), x\in (a,b) $$ with boundary conditions of general form, when $q$ is a measurable function which has a singularity ... More
Coding-Theoretic Methods for Sparse RecoveryOct 03 2011Feb 09 2012We review connections between coding-theoretic objects and sparse learning problems. In particular, we show how seemingly different combinatorial objects such as error-correcting codes, combinatorial designs, spherical codes, compressed sensing matrices ... More
Application of Self-Organizing Map to Stellar Spectral ClassificationsAug 02 2011We present an automatic, fast, accurate and robust method of classifying astronomical objects. The Self Organizing Map (SOM) as an unsupervised Artificial Neural Network (ANN) algorithm is used for classification of stellar spectra of stars. The SOM is ... More
Derandomization and Group TestingOct 03 2010The rapid development of derandomization theory, which is a fundamental area in theoretical computer science, has recently led to many surprising applications outside its initial intention. We will review some recent such developments related to combinatorial ... More
3 Dimensional N=8 Supersymmetric Field Theory Revisited: A Superfield FormulationSep 04 2008Feb 24 2009In [arXiv:0808.1677] 3 dimensional field theories are proposed to on-shell represent N=8 SUSY algebra and SO(7) or SO(4)xSO(4) subgroups of full SO(8) automorphism. They are theories of 8 scalar and 8 spinor matrix fields with Yukawa, quartic and sextic ... More
On the Time-Range Dependency of the Beampatterns Produced by Arbitrary Antenna Arrays: Discussions on the Misplaced Expectations from Frequency Diverse ArraysMar 07 2019In the recent years constructing time-invariant spatial-focusing beampatterns by using frequency diverse arrays (FDAs) is conveyed in several papers. Further than time-invariant spatial-focusing beampatterns, the unfeasibility of constructing range-dependent ... More
Probability Density Function Estimation in OFDM Transmitter and Receiver in Radio Cognitive Networks based on Recurrent Neural NetworkJul 18 2018The most important problem in telecommunication is bandwidth limitation due to the uncontrolled growth of wireless technology. Deploying dynamic spectrum access techniques is one of the procedures provided for efficient use of bandwidth. In recent years, ... More
Redundancy schemes for engineering coherent systems via a signature-based approachJul 30 2017This paper proposes a signature-based approach for solving redundancy allocation problems when component lifetimes are not only heterogeneous but also dependent. The two common schemes for allocations, that is active and standby redundancies, are considered. ... More
Accurate automatic segmentation of retina layers with emphasis on first layerJan 25 2015Feb 15 2015Quantification of intra-retinal boundaries in optical coherence tomography (OCT) is a crucial task for studying and diagnosing neurological and ocular diseases. Since manual segmentation of layers is usually a time consuming task and relay on user, a ... More
Orthogonal bases of Brauer relative symmetric polynomials for the the Dicyclic groupSep 12 2011Feb 20 2015In this paper, we discuss O-basis of symmetry classes of polynomials associated with the Brauer character of the Dicyclic group. Also, necessary and sufficient conditions are given for the existence of an orthogonal basis consisting of standard (decomposable) ... More
Automated Classification of ELODIE Stellar Spectral Library Using Probabilistic Artificial Neural NetworksApr 17 2008A Probabilistic Neural Network model has been used for automated classification of ELODIE stellar spectral library consisting of about 2000 spectra into 158 known spectro-luminosity classes. The full spectra with 561 flux bins and a PCA reduced set of ... More
Matrix Theory for the DLCQ of Type IIB String Theory on the AdS/Plane-waveJan 06 2007Jul 30 2007We propose a recipe to construct the DLCQ Hamiltonian of type IIB string theory on the AdS (and/or plane-wave) background. We consider a system of J number of coincident unstable non-BPS D0-branes of IIB theory in the light-cone gauge and on the plane-wave ... More
Cruise Missile Target Trajectory Movement Prediction based on Optimal 3D Kalman Filter with Firefly AlgorithmJul 18 2018It is hoped that there will never be a war in the world, but one of the defensive requirements of any country during the war is the missiles used for destruction and defense. Todays, missiles movement from origin to destination is an important problem ... More
MPS: An R package for modelling new families of distributionsSep 09 2018We introduce an \verb|R| package, called \verb|MPS|, for computing the probability density function, computing the cumulative distribution function, computing the quantile function, simulating random variables, and estimating the parameters of 24 new ... More
Statistical Inference for Stable Distribution Using EM algorithmNov 12 2018The class of $\alpha$-stable distributions with a wide range of applications in economics, telecommunications, biology, applied, and theoretical physics. This is due to the fact that it possesses both the skewness and heavy tails. Since $\alpha$-stable ... More
When Higgs Meets Starobinsky in the Early UniverseOct 07 2014Nov 20 2014The measurement of the Higgs mass at the LHC has confirmed that the Standard Model electroweak vacuum is a shallow local minimum and is not absolutely stable. In addition to a probable unacceptably fast tunneling to the deep true minimum, it is not clear ... More
The catenary and tame degree of numerical monoids generated by generalized arithmetic sequencesJan 11 2010Jan 14 2010Studying ceratin combinatorial properties of non-unique factorizations have been a subject of recent literatures. Little is known about two combinatorial invariants, namely the catenary degree and the tame degree, even in the case of numerical monoids. ... More
Applications of Derandomization Theory in CodingJul 23 2011Randomized techniques play a fundamental role in theoretical computer science and discrete mathematics, in particular for the design of efficient algorithms and construction of combinatorial objects. The basic goal in derandomization theory is to eliminate ... More
Noise-Resilient Group Testing: Limitations and ConstructionsNov 17 2008Jul 22 2011We study combinatorial group testing schemes for learning $d$-sparse Boolean vectors using highly unreliable disjunctive measurements. We consider an adversarial noise model that only limits the number of false observations, and show that any noise-resilient ... More
Statistical Inference for Mixture of Cauchy DistributionsSep 15 2018The class of $\alpha$-stable distributions received much interest for modelling impulsive phenomena occur in engineering, economics, insurance, and physics. The lack of non-analytical form for probability density function is considered as the main obstacle ... More
Introduction to Experimental Quantum Measurement with Superconducting QubitsApr 19 2019Quantum technology has been rapidly growing due to its potential revolutionary applications. In particular, superconducting qubits provide a strong light-matter interaction as required for quantum computation and in principle can be scaled up to a high ... More
A Continuous Optimization Approach for the Financial Portfolio Selection under Discrete Asset Choice ConstraintsApr 12 2014In this paper we consider a generalization of the Markowitz's Mean-Variance model under linear transaction costs and cardinality constraints. The cardinality constraints are used to limit the number of assets in the optimal portfolio. The generalized ... More
Capacity Achieving Codes From Randomness CondensersJan 13 2009Jul 22 2011We establish a general framework for construction of small ensembles of capacity achieving linear codes for a wide range of (not necessarily memoryless) discrete symmetric channels, and in particular, the binary erasure and symmetric channels. The main ... More
Inclusion of $Λ^{\#} BV^{(p)}$ spaces in the classes $BV(q(n)\uparrow \infty)$Oct 03 2011Feb 20 2015The multivariable version of Waterman-Shiba classes and $BV(q(n)\uparrow \infty)$ are introduced. Also characterization of the inclusion of multivariable Waterman-Shiba classes into classes of functions multivariable $BV(q(n)\uparrow \infty)$ is given. ... More
Spectrum accessing optimization in congestion times in radio cognitive networks based on chaotic neural networksJul 18 2018Based on the theory of the Federal Communications Commission, the spectrum available on cognitive radio networks is limit and the non-optimal use of the spectrum necessitates the need for a telecommunications model, so that this pattern can exploit the ... More
Beyond AdS Space-times, New Holographic Correspondences and ApplicationsSep 14 2016To describe Lifshitz and hyperscaling violating (HSV) phenomena in CM one uses gauge fields on the gravity side which naturally realize the breaking of Lorentz invariance. These gravity constructions often contain naked singularities. In this thesis, ... More
Inclusion of $ΛBV^{(p)}$ spaces in the classes $H_ω^{q}$Oct 03 2012A characterization of the inclusion of Waterman-Shiba classes into classes of functions with given integral modulus of continuity is given. This corrects and extends an earlier result of a paper from 2005.
On Cosmological Implications of Holographic Entropy BoundAug 14 2012It is argued that the entropy bound places an upper limit of about 1 TeV on the temperature of the last reheating era in the early Universe. Implications for inflation and non-standard paradigms for beyond the standard model of hot cosmology are studied. ... More
Spinor classification of the Weyl tensor in five dimensionsAug 17 2010We investigate the spinor classification of the Weyl tensor in five dimensions due to De Smet. We show that a previously overlooked reality condition reduces the number of possible types in the classification. We classify all vacuum solutions belonging ... More
Improved Constructions for Non-adaptive Threshold Group TestingFeb 10 2010Jan 18 2013The basic goal in combinatorial group testing is to identify a set of up to $d$ defective items within a large population of size $n \gg d$ using a pooling strategy. Namely, the items can be grouped together in pools, and a single measurement would reveal ... More
Accurate Localization in Dense Urban Area Using Google Street View ImageDec 29 2014Accurate information about the location and orientation of a camera in mobile devices is central to the utilization of location-based services (LBS). Most of such mobile devices rely on GPS data but this data is subject to inaccuracy due to imperfections ... More
The perturbation theory of higher dimensional spacetimes a la TeukolskyOct 26 2011We consider the possibility of deriving a decoupled equation in terms of Weyl tensor components for gravitational perturbations of the Schwarzschild-Tangherlini solution. We find a particular gauge invariant component of the Weyl tensor does decouple ... More
The Locality Axiom in Quantum Field Theory and Tensor Products of $C^*$-algebrasJun 24 2012The prototype of mutually independent systems are systems which are localized in spacelike separated regions. In the framework of locally covariant quantum field theory we show that the commutativity of observables in spacelike separated regions can be ... More
The calculation of the effective interaction parameter in LDA+U method by linear response approach for Fe(OH)2Dec 22 2008In this paper we have investigated the electronic properties of Fe(OH)2 hydroxide by using the LSDA+U as well as the generalized gradient approximation. Our calculations for the iron-hydroxide show that the LSDA results are greatly at variance with experimental ... More
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep LearningJan 07 2018Aug 20 2018Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website ... More
Toward an Efficient Website Fingerprinting DefenseDec 02 2015Jul 19 2016Website Fingerprinting attacks enable a passive eavesdropper to recover the user's otherwise anonymized web browsing activity by matching the observed traffic with prerecorded web traffic templates. The defenses that have been proposed to counter these ... More
Deep Neural Networks for Query Expansion using Word EmbeddingsNov 08 2018Query expansion is a method for alleviating the vocabulary mismatch problem present in information retrieval tasks. Previous works have shown that terms selected for query expansion by traditional methods such as pseudo-relevance feedback are not always ... More
On the adjoint L-function of the p-adic GSp(4)Mar 07 2007Oct 11 2007We explicitly compute the adjoint L-function of those L-packets of representations of the group GSp(4) over a p-adic field of characteristic zero that contain non-supercuspidal representations. As an application we verify a conjecture of Gross-Prasad ... More
Generalized Line Spectral Estimation via Convex OptimizationSep 26 2016Line spectral estimation is the problem of recovering the frequencies and amplitudes of a mixture of a few sinusoids from equispaced samples. However, in a variety of signal processing problems arising in imaging, radar, and localization we do not have ... More
User-Centric Optimization for Constraint Web Service Composition using a Fuzzy-guided Genetic Algorithm SystemOct 12 2012Service-Oriented Applications (SOA) are being regarded as the main pragmatic solution for distributed environments. In such systems, however each service responds the user request independently, it is essential to compose them for delivering a compound ... More
Electron-electron and spin-orbit interactions in armchair graphene ribbonsOct 29 2007The effects of intrinsic spin-orbit and Coulomb interactions on low-energy properties of finite width graphene armchair ribbons are studied by means of a Dirac Hamiltonian. It is shown that metallic states subsist in the presence of intrinsic spin-orbit ... More
Generic Transfer for General Spin GroupsNov 01 2004We prove Langlands functoriality for the generic spectrum of general spin groups (both odd and even). Contrary to other recent instances of functoriality, our resulting automorphic representations on the general linear group will not be self-dual. Together ... More
Gutman index of the Mycielskian and its complementFeb 05 2015In This Paper we determine the Gutman index of Mycielskian graphs and their complements.
Asymptotic analysis of a micropolar fluid flow in a thin domain with a free and rough boundarySep 19 2013Motivated by lubrication problems, we consider a micropolar uid ow in a 2D domain with a rough and free boundary. We assume that the thickness and the roughness are both of order 0 < " << 1. We prove the existence and uniqueness of a solution of this ... More
Multiple-Antenna Interference Channel with Receive Antenna Joint Processing and Real Interference AlignmentJan 27 2013We consider a constant $K$-user Gaussian interference channel with $M$ antennas at each transmitter and $N$ antennas at each receiver, denoted as a $(K,M,N)$ channel. Relying on a result on simultaneous Diophantine approximation, a real interference alignment ... More
Symmetry classes of tensors associated with the Semi-Dihedral groupsFeb 17 2012Dec 14 2012We discuss the existence of an orthogonal basis consisting of decomposable vectors for some symmetry classes of tensors associated with Semi-Dihedral groups $SD_{8n}$. The dimensions of these symmetry classes of tensors are also computed.
Geometric Adaptive Control with Neural Networks for a Quadrotor UAV in Wind fieldsMar 05 2019This paper proposes a geometric adaptive controller for a quadrotor unmanned aerial vehicle with artificial neural networks. It is assumed that the dynamics of a quadrotor is disturbed by arbitrary, unstructured forces and moments caused by wind. To address ... More
Machine Learning Techniques for Intrusion DetectionDec 08 2013May 09 2015An Intrusion Detection System (IDS) is a software that monitors a single or a network of computers for malicious activities (attacks) that are aimed at stealing or censoring information or corrupting network protocols. Most techniques used in today's ... More
A Space-efficient Parameterized Algorithm for the Hamiltonian Cycle Problem by Dynamic AlgebraziationJan 21 2019An NP-hard graph problem may be intractable for general graphs but it could be efficiently solvable using dynamic programming for graphs with bounded width (or depth or some other structural parameter). Dynamic programming is a well-known approach used ... More
On additivity of local entropy under flat extensionsApr 06 2014Sep 08 2014Let $f\colon(R,\mathfrak{m})\rightarrow S$ be a local homomorphism of Noetherian local rings. Consider two endomorphisms \textit{of finite length} (i.e., with zero-dimensional closed fibers) $\varphi\colon R\rightarrow R$ and $\psi\colon S\rightarrow ... More
A Bound for the Locating Chromatic Numbers of TreesAug 25 2013Let $f$ be a proper $k$-coloring of a connected graph $G$ and $\Pi=(V_1,V_2,\ldots,V_k)$ be an ordered partition of $V(G)$ into the resulting color classes. For a vertex $v$ of $G$, the color code of $v$ with respect to $\Pi$ is defined to be the ordered ... More
Integrability of the Hide--Skeldon--Acheson dynamoApr 03 2014In this work we consider the Hide-Skeldon-Acheson dynamo model \[ \dot x=x(y-1)-\beta z, \quad \dot y =\alpha(1-x^2)-\kappa y, \quad \dot z =x-\lambda z, \] where $\alpha,\beta,\kappa$ and $\lambda$ are parameters. We contribute to the understanding of ... More
Towards moderate overparameterization: global convergence guarantees for training shallow neural networksFeb 12 2019Many modern neural network architectures are trained in an overparameterized regime where the parameters of the model exceed the size of the training dataset. Sufficiently overparameterized neural network architectures in principle have the capacity to ... More
Fast and Reliable Parameter Estimation from Nonlinear ObservationsOct 23 2016In this paper we study the problem of recovering a structured but unknown parameter ${\bf{\theta}}^*$ from $n$ nonlinear observations of the form $y_i=f(\langle {\bf{x}}_i,{\bf{\theta}}^*\rangle)$ for $i=1,2,\ldots,n$. We develop a framework for characterizing ... More
A probabilistic model to resolve diversity-accuracy challenge of recommendation systemsJan 08 2015Recommendation systems have wide-spread applications in both academia and industry. Traditionally, performance of recommendation systems has been measured by their precision. By introducing novelty and diversity as key qualities in recommender systems, ... More
MDS Codes with Progressive Engagement Property for Cloud Storage SystemsMay 23 2016Fast and efficient failure recovery is a new challenge for cloud storage systems with a large number of storage nodes. A pivotal recovery metric upon the failure of a storage node is repair bandwidth cost which refers to the amount of data that must be ... More
Capacity of Non-Malleable CodesSep 02 2013Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs (ICS 2010), encode messages $s$ in a manner so that tampering the codeword causes the decoder to either output $s$ or a message that is independent of $s$. While this is an impossible ... More
Almost-Uniform Sampling of Points on High-Dimensional Algebraic VarietiesFeb 07 2009We consider the problem of uniform sampling of points on an algebraic variety. Specifically, we develop a randomized algorithm that, given a small set of multivariate polynomials over a sufficiently large finite field, produces a common zero of the polynomials ... More
Analysis of the Main Factors Affecting M-Commerce Adoption in IraqFeb 15 2019The telecommunications sector in Iraq is one of the most dynamic and active industries. This sector has prime importance only next to oil & gas, as revealed by recent reports. This industry has grown in leaps and bounds with the rising demand for mobile ... More
Nonparametric estimation of the entropy using a ranked set sampleJan 25 2015Jun 14 2015This paper is concerned with non-parametric estimation of the entropy in ranked set sampling. Theoretical properties of the proposed estimator are studied. The proposed estimator is compared with the rival estimator in simple random sampling. The applications ... More
Sharp Analytical Capacity Upper Bounds for Sticky and Related ChannelsJun 16 2018Jul 18 2018We study natural examples of binary channels with synchronization errors. These include the duplication channel, which independently outputs a given bit once or twice, and geometric channels that repeat a given bit according to a geometric rule, with ... More
Structural Results and Improved Upper Bounds on the Capacity of the Discrete-Time Poisson ChannelJan 09 2018Jul 20 2018New capacity upper bounds are presented for the discrete-time Poisson channel with no dark current and an average-power constraint. These bounds are a simple consequence of techniques developed for the seemingly unrelated problem of upper bounding the ... More
Simple Codes and Sparse Recovery with Fast DecodingJan 09 2019Jan 17 2019Construction of error-correcting codes achieving a designated minimum distance parameter is a central problem in coding theory. A classical and algebraic family of error-correcting codes studied for this purpose are the BCH codes. In this work, we study ... More
Duality completion of higher derivative correctionsJun 20 2013Jul 22 2013We present a new method for completing higher derivative corrections for theories that exhibit duality symmetries under reduction. This proposal is based on the observation that duality symmetry in the reduced theory highly constrains the form of the ... More
Gutman index of the Mycielskian and its complementFeb 05 2015Mar 13 2017In This Paper we study the Gutman index of the Mycielskian graphs and their complements.
End-to-end Learning of a Convolutional Neural Network via Deep Tensor DecompositionMay 16 2018In this paper we study the problem of learning the weights of a deep convolutional neural network. We consider a network where convolutions are carried out over non-overlapping patches with a single kernel in each layer. We develop an algorithm for simultaneously ... More
Non-Malleable Coding Against Bit-wise and Split-State TamperingSep 04 2013Aug 29 2014Non-malleable coding, introduced by Dziembowski, Pietrzak and Wichs (ICS 2010), aims for protecting the integrity of information against tampering attacks in situations where error-detection is impossible. Intuitively, information encoded by a non-malleable ... More
Disjoint LDPC Coding for Gaussian Broadcast ChannelsJun 15 2009Low-density parity-check (LDPC) codes have been used for communication over a two-user Gaussian broadcast channel. It has been shown in the literature that the optimal decoding of such system requires joint decoding of both user messages at each user. ... More
Generic transfer from GSp(4) to GL(4)Dec 27 2004Jan 03 2005We establish Langlands functoriality for the generic spectrum of GSp(4) and describe its transfer on GL(4). We apply this to prove results toward the generalized Ramanujan conjecture for generic representations of GSp(4).
Nearly Optimal Deterministic Algorithm for Sparse Walsh-Hadamard TransformApr 28 2015For every fixed constant $\alpha > 0$, we design an algorithm for computing the $k$-sparse Walsh-Hadamard transform of an $N$-dimensional vector $x \in \mathbb{R}^N$ in time $k^{1+\alpha} (\log N)^{O(1)}$. Specifically, the algorithm is given query access ... More
Orthogonal bases of Brauer symmetry classes of tensors for groups having cyclic support on non-linear Brauer charactersFeb 19 2015Jul 25 2015This paper provides some properties of Brauer symmetry classes of tensors. We derive a dimension formula for the orbital subspaces in the Brauer symmetry classes of tensors corresponding to the irreducible Brauer characters of the groups having cyclic ... More
Quantum spin Hall phase in neutral zigzag graphene ribbonsOct 11 2009We present a detailed description of the nature of the wavefunction and spin distribution of the zero energy modes of zigzag graphene ribbons (ZGRs) in the presence of the intrinsic spin_orbit (I-SO) interaction. These states characterize the quantum ... More
Existence result for a strongly coupled problem with heat convection term and Tresca's lawSep 19 2013We study a problem describing the motion of an incompressible, nonisothermal and non-Newtonian uid, taking into account the heat convection term. The novelty here is that uid viscosity depends on the temperature, the velocity of the uid, and also of the ... More
On linear ternary Intersection sequences and their propertiesSep 12 2017Let $D^+$ be the first octant of the Euclidean space and consider the integral cube grid $G$ in $D^+$. The intersections of each line with $G$ form an infinite sequence of three letters which can be considered as an extension of well-known Sturmian words. ... More
A Cuspidality Criterion for the Exterior Square Transfer of Cusp Forms on GL(4)Dec 28 2007For a cuspidal automorphic representation \Pi of GL(4,A), H. Kim proved that the exterior square transfer \wedge^2\Pi is an isobaric automorphic representation of GL(6,A). In this paper we characterize those representations \Pi for which \wedge^2\Pi is ... More
Efficient unimodality test in clustering by signature testingJan 09 2014This paper provides a new unimodality test with application in hierarchical clustering methods. The proposed method denoted by signature test (Sigtest), transforms the data based on its statistics. The transformed data has much smaller variation compared ... More
Multiple-Antenna Interference Network with Receive Antenna Joint Processing and Real Interference AlignmentApr 16 2013Feb 17 2014In this paper, the degrees of freedom (DoF) regions of constant coefficient multiple antenna interference channels are investigated. First, we consider a $K$-user Gaussian interference channel with $M_k$ antennas at transmitter $k$, $1\le k\le K$, and ... More
Orthogonal bases of Brauer relative symmetric polynomials for certain groupsSep 11 2011Feb 20 2015In this paper, we discuss O-basis of symmetry classes of polynomials associated with the Brauer character of the Semi-Dihedral groups and Dihedral groups. Also, necessary and sufficient conditions are given for the existence of an orthogonal basis consisting ... More
Mixed-Membership Stochastic Block-Models for Transactional NetworksOct 07 2010Transactional network data can be thought of as a list of one-to-many communications(e.g., email) between nodes in a social network. Most social network models convert this type of data into binary relations between pairs of nodes. We develop a latent ... More
Finding Sequential Patterns from Large Sequence DataFeb 05 2010Data mining is the task of discovering interesting patterns from large amounts of data. There are many data mining tasks, such as classification, clustering, association rule mining, and sequential pattern mining. Sequential pattern mining finds sets ... More
Rash spin-orbit interaction in graphene and graphene zigzag nano-ribbonsJan 01 2009May 08 2009We investigate the effects of Rashba spin-orbit interactions on the electronic band-structure and corresponding wave-functions of graphene. By exactly solving a tight-binding model Hamiltonian we obtain the expected splitting of the bands -due to the ... More
Topological rigidity for holomorphic foliationsSep 13 2007We study analytic deformations and unfoldings of holomorphic foliations in complex projective plane $\mathbb{C}P(2)$. Let $\{\mathcal{F}_t\}_{t \in \mathbb{D}_{\epsilon}}$ be topological trivial (in $\mathbb{C}^2$) analytic deformation of a foliation ... More
Approximate global minimizers to pairwise interaction problems via convex relaxationNov 11 2015We present a new approach for systematically computing approximate global minimizers to a large class of pairwise interaction problems defined over probability distributions. The approach predicts candidate global minimizers, with a recovery guarantee, ... More
An Intelligent Fire Alert System using Wireless Mobile CommunicationAug 01 2013The system has come to light through the way of inspiration to develop a compact system, based on the fundamental ideas of safety, security and control. Once this system is installed to operation specifying temperature and smoke threshold, in case of ... More
Throughput-Optimal Random Access with Order-Optimal DelaySep 29 2010In this paper, we consider CSMA policies for scheduling of multihop wireless networks with one-hop traffic. The main contribution of this paper is to propose Unlocking CSMA (U-CSMA) policy that enables to obtain high throughput with low (average) packet ... More
$A_p$-$A_\infty$ estimates for general multilinear sparse operatorsAug 25 2015Dec 09 2015In this paper, we study the $A_p$-$A_\infty$ estimates for a class of multilinear dyadic positive operators. As applications, the $A_p$-$A_\infty$ estimates for different operators e.g. multilinear square functions and multilinear Fourier multipliers ... More
On Optimal Decision-Making in Ant ColoniesAug 19 2014Colonies of ants can collectively choose the best of several nests, even when many of the active ants who organize the move visit only one site. Understanding such a behavior can help us design efficient distributed decision making algorithms. Marshall ... More
On the noise prediction for serrated leading edgesJun 14 2017An analytical model is developed for the prediction of noise radiated by an aerofoil with leading edge serration in a subsonic turbulent stream. The model makes use of the Fourier Expansion and Schwarzschild techniques in order to solve a set of coupled ... More
Penrose quasi-local energy and Kerr-Schild metricsJul 17 2018Sep 26 2018Specialising to the case of Kerr-Schild spacetimes, which include the Kerr black hole and gravitational wave solutions, we propose a modification of the Penrose quasi-local energy. The modification relies on the existence of a natural Minkowski background ... More
Geometric Adaptive Control for a Quadrotor UAV with Wind Disturbance RejectionMar 16 2018May 17 2018This paper presents a geometric adaptive control scheme for a quadrotor unmanned aerial vehicle, where the effects of unknown, unstructured disturbances are mitigated by a multilayer neural network that is adjusted online. The stability of the proposed ... More
Ionic Electro active Polymer-Based Soft Actuators and Their Applications in Microfluidic Micropumps, Microvalves, and Micromixers: A ReviewApr 09 2019This paper provides a detailed review on applications of ionic electroactive polymer (i-EAP) soft actuators as active elements of microfluidic micropumps, microvalves, and micromixers. The related works that have so far been presented by various research ... More
On Zariski's multiplicity conjectureSep 02 2007We discuss some features of the so-called Zariski's multiplicity problem especially the application of the work of A'Campo on the zeta function of a monodromy of an isolated singularity of a complex hypersurface to the problem.