total 4116took 0.11s

Energy-Efficient Data Collection and Wireless Power Transfer Using A MIMO Full-Duplex UAVNov 22 2018In this paper, we propose a novel energy-efficient data collection and wireless power transfer (WPT) framework for internet of things (IoT) applications, via a multiple-input multiple-output (MIMO) full-duplex (FD) unmanned aerial vehicle (UAV). To exploit ... More

Cache Placement in Two-Tier HetNets with Limited Storage Capacity: Cache or Buffer?Jun 06 2018In this paper, we aim to minimize the average file transmission delay via bandwidth allocation and cache placement in two-tier heterogeneous networks with limited storage capacity, which consists of cache capacity and buffer capacity. For average delay ... More

A Neural Network Prediction Based Adaptive Mode Selection Scheme in Full-Duplex Cognitive NetworksApr 12 2019We propose a neural network (NN) predictor and an adaptive mode selection scheme for the purpose of both improving secondary user's (SU's) throughput and reducing collision probability to the primary user (PU) in full-duplex (FD) cognitive networks. SUs ... More

Evaluation of Availability of Initial-segments of Video Files in Device-to-Device (D2D) NetworkOct 19 2017We propose a new caching concept in which wireless nodes in Device-to-Device (D2D) network can cache the initial-segments of the popular video files and may share to users in their proximity upon request. We term this approach as Bootstrapping- D2D (B-D2D) ... More

Cross-layer Design in Cognitive Radio StandardsNov 26 2017The growing demand for wireless applications and services on the one hand, and limited available radio spectrum on the other hand have made cognitive radio (CR) a promising solution for future mobile networks. It has attracted considerable attention by ... More

Adaptive Full Duplex Communications in Cognitive Radio NetworksOct 16 2017In this paper we propose a novel adaptive scheme for full duplex communication of secondary users (SUs) in a cognitive radio network. The secondary network operates in three modes; Cooperative Sensing (CS), Full Duplex Transmit and Sensing (FDTS), and ... More

Transmission Capacity of Full-Duplex MIMO Ad-Hoc Network with Limited Self-Interference CancellationApr 29 2018Sep 09 2018In this paper, we propose a joint transceiver beamforming design to simultaneously mitigate self-interference (SI) and partial inter-node interference for full-duplex multiple-input and multiple-output ad-hoc network, and then derive the transmission ... More

Edge Computing and Dynamic Vision Sensing for Low Delay Access to Visual Medical InformationNov 10 2017A new method is proposed to decrease the transmission delay of visual and non-visual medical records by using edge computing and Dynamic Vision Sensing (DVS) technologies. The simulation results show that the proposed scheme can decrease the transmission ... More

Joint Time-Frequency Splitting for Multiuser SWIPT OFDM NetworksFeb 08 2019In this paper, we propose a joint time-frequency splitting (TFS) strategy for a multiuser orthogonal frequency division multiplexing (OFDM) system with simultaneous wireless information and power transfer (SWIPT). In TFS, the time sharing factors for ... More

Energy Efficient Resource Allocation for Mobile-Edge Computation Networks with NOMASep 04 2018Feb 14 2019This paper investigates an uplink non-orthogonal multiple access (NOMA)-based mobile-edge computing (MEC) network. Our objective is to minimize the total energy consumption of all users including transmission energy and local computation energy subject ... More

Resource Allocation in Full-Duplex Mobile-Edge Computing Systems with NOMA and Energy HarvestingJul 31 2018This paper considers a full-duplex (FD) mobile-edge computing (MEC) system with non-orthogonal multiple access (NOMA) and energy harvesting (EH), where one group of users simultaneously offload task data to the base station (BS) via NOMA and the BS simultaneously ... More

Optimization of Rate Allocation and Power Control for Rate Splitting Multiple Access (RSMA)Mar 19 2019In this paper, the sum-rate maximization problem is studied for wireless networks that use downlink rate splitting multiple access (RSMA). In the considered model, each base station (BS) divides the messages that must be transmitted to its users into ... More

Energy Efficient Resource Allocation in UAV-Enabled Mobile Edge Computing NetworksFeb 08 2019In this paper, we consider the sum power minimization problem via jointly optimizing user association, power control, computation capacity allocation and location planning in a mobile edge computing (MEC) network with multiple unmanned aerial vehicles ... More

Wireless Network Coding in Network MIMO: A New Design for 5G and BeyondJan 22 2018May 21 2018Physical layer network coding (PNC) has been studied to serve wireless network MIMO systems with much lower backhaul load than approaches such as Cloud Radio Access Network (Cloud-RAN) and coordinated multipoint (CoMP). In this paper, we present a design ... More

An Adaptive Optimal Mapping Selection Algorithm for PNC using Variable QAM ModulationMay 15 2018Fifth generation (5G) wireless networks will need to serve much higher user densities than existing 4G networks, and will therefore require an enhanced radio access network (RAN) infrastructure. Physical layer network coding (PNC) has been shown to enable ... More

A Physical Layer Network Coding Design for 5G Network MIMOMay 01 2018This paper presents a physical layer network coding (PNC) approach for network MIMO (N-MIMO) systems to release the heavy burden of backhaul load. The proposed PNC approach is applied for uplink scenario in binary systems, and the design guideline serves ... More

Multi-Antenna Assisted Virtual Full-Duplex Relaying with Reliability-Aware Iterative DecodingJul 13 2017Oct 18 2017In this paper, a multi-antenna assisted virtual full-duplex (FD) relaying with reliability-aware iterative decoding at destination node is proposed to improve system spectral efficiency and reliability. This scheme enables two half-duplex relay nodes, ... More

Energy Efficient Resource Allocation in UAV-Enabled Mobile Edge Computing NetworksFeb 08 2019Feb 13 2019In this paper, we consider the sum power minimization problem via jointly optimizing user association, power control, computation capacity allocation and location planning in a mobile edge computing (MEC) network with multiple unmanned aerial vehicles ... More

Square Deviation Based Symbol-Level Selection for Virtual Full-Duplex Relaying NetworksJul 14 2017Nov 02 2017In this paper, a symbol-level selective transmission for virtual full-duplex (FD) relaying networks is proposed, which aims to mitigate error propagation effects and improve system spectral efficiency. The idea is to allow two half-duplex relays, mimicked ... More

Joint Altitude, Beamwidth, Location and Bandwidth Optimization for UAV-Enabled CommunicationsJun 06 2018This letter investigates an uplink power control problem for unmanned aerial vehicles (UAVs) assisted wireless communications. We jointly optimize the UAV's flying altitude, antenna beamwidth, UAV's location and ground terminals' allocated bandwidth and ... More

Symbol-Level Selective Full-Duplex Relaying with Power and Location OptimizationDec 20 2017Jun 02 2018In this paper, a symbol-level selective transmission for full-duplex (FD) relaying networks is proposed to mitigate error propagation effects and improve system spectral efficiency. The idea is to allow the FD relay node to predict the correctly decoded ... More

Adaptive Modulation and Coding and Cooperative ARQ in a Cognitive Radio SystemSep 12 2017In this paper, a joint cross-layer design of adaptive modulation and coding (AMC) and cooperative automatic repeat request (C-ARQ) scheme is proposed for a secondary user in a shared-spectrum environment. First, based on the statistical descriptions of ... More

On skew cyclic codes over $F_q+vF_q+v^2F_q$Apr 16 2015In the present paper, we study skew cyclic codes over the ring $F_{q}+vF_{q}+v^2F_{q}$, where $v^3=v,~q=p^m$ and $p$ is an odd prime. We investigate the structural properties of skew cyclic codes over $F_{q}+vF_{q}+v^2F_{q}$ using decomposition method. ... More

$(1+2u)$-constacyclic codes over $\mathbb{Z}_4+u\mathbb{Z}_4$Apr 14 2015Let $R=\mathbb{Z}_4+u\mathbb{Z}_4,$ where $\mathbb{Z}_4$ denotes the ring of integers modulo $4$ and $u^2=0$. In the present paper, we introduce a new Gray map from $R^n$ to $\mathbb{Z}_{4}^{2n}.$ We study $(1+2u)$-constacyclic codes over $R$ of odd lengths ... More

Tree property at successor of a singular limit of measurable cardinalsJan 16 2016Sep 26 2016Assume $\lambda$ is a singular limit of $\eta$ supercompact cardinals, where $\eta \leq \lambda$ is a limit ordinal. We present two forcing methods for making $\lambda^+$ the successor of the limit of the first $\eta$ measurable cardinals while the tree ... More

Lagrangian analysis of the laminar flat plate boundary layerApr 05 2016Sep 17 2016The flow properties at the leading edge of a flat plate represent a singularity to the Blasius laminar boundary layer equations, by applying the Lagrangian approach the leading edge velocity profiles of the laminar boundary layer over a flat plate are ... More

A Game-Theoretic Framework for Studying Dynamics of Multi Decision-maker SystemsDec 24 2014System Dynamics (SD) main aim is to study dynamic behavior of systems based on causal relations. The other purpose of the science is to design policies, both in initial values and causal relation, to change system behavior as we desire. Especially we ... More

HOD, V and the GCHDec 19 2015Starting from large cardinals we construct a model of $ZFC$ in which the $GCH$ fails everywhere, but such that $GCH$ holds in its $HOD$. The result answers a question of Sy Friedman. Also, relative to the existence of large cardinals, we produce a model ... More

An Easton like theorem in the presence of Shelah CardinalsMar 08 2016Sep 27 2016We show that Shelah cardinals are preserved under the canonical $GCH$ forcing notion. We also show that if $GCH$ holds and $F:REG\rightarrow CARD$ is an Easton function which satisfies some weak properties, then there exists a cofinality preserving generic ... More

Minimal regular models of quadratic twists of genus two curvesNov 08 2015Let $K$ be a complete discrete valuation field with ring of integers $R$ and residue field $k$ of characteristic $p>2$. We assume moreover that $k$ is algebraically closed. Let $C$ be a smooth projective geometrically connected curve of genus $2$. If ... More

On solubility of groups with finitely many centralizersMay 03 2012For any group G, let C(G) denote the set of centralizers of G. We say that a group G has n centralizers (G is a Cn-group) if |C(G)| = n. In this note, we prove that every finite Cn-group with n ? 21 is soluble and this estimate is sharp. Moreover, we ... More

On Representation Theory of Total (Co)IntegralsFeb 08 2014Feb 18 2014In this paper, we show that total integrals and cointegrals are new sources of stable anti Yetter-Drinfeld modules. We explicitly show that how special types of total (co)integrals can be used to provide both (stable) anti Yetter-Drinfeld and Yetter- ... More

Quartic Quasi-Topological-Born-Infeld GravityMar 30 2015Sep 08 2015In this paper, quartic quasi-topological black holes in the presence of a nonlinear electromagnetic Born-Infeld field is presented. By using the metric parameters, the charged black hole solutions of quasi-topological Born-Infeld gravity is considered. ... More

Measuring topological invariants in photonic systemsOct 29 2013Motivated by the recent theoretical and experimental progress in implementing topological orders with photons, we analyze photonic systems with different topologies and present a scheme to probe their topological features. Specifically, we propose a scheme ... More

A Note on Derivations of Lie AlgebrasNov 07 2010In this note, we will prove that a finite dimensional Lie algebra $L$ of characteristic zero, admitting an abelian algebra of derivations $D\leq Der(L)$ with the property $$ L^n\subseteq \sum_{d\in D}d(L) $$ for some $n\geq 1$, is necessarily solvable. ... More

The Capacity of Degraded Cognitive Interference Channel with Unidirectional Destination CooperationJan 22 2018Previous works established the capacity region for some special cases of discrete memoryless degraded cognitive interference channel (CIC) with unidirectional destination cooperation (UDC). In this letter, we characterize the capacity region of the general ... More

Semigroups of real functions with dense orbitsAug 23 2009Let ${\mathcal F}_I=\{f:I \to I| f(x)= (Ax+B)/(Cx+D); AD-BC \neq 0 \}$, where $I$ is an interval. For $x\in I$, let ${\Omega}_x$ be the orbit of $x$ under the action of the semigroup of functions generated by $f,g \in {\mathcal F}_I$. Our main result ... More

A Note on the Construction of Complex and Quaternionic Vector Fields on SpheresMay 16 2016A relationship between real, complex, and quaternionic vector fields on spheres is given by using a relationship between the corresponding standard inner products. The number of linearly independent complex vector fields on the standard $(4n-1)$-sphere ... More

Boundary torsion and convex caps of locally convex surfacesJan 29 2015Sep 11 2015We prove that the torsion of any closed space curve which bounds a simply connected locally convex surface vanishes at least 4 times. This answers a question of Rosenberg related to a problem of Yau on characterizing the boundary of positively curved ... More

The length, width, and inradius of space curvesMay 04 2016Jan 16 2018The width $w$ of a curve $\gamma$ in Euclidean space $R^n$ is the infimum of the distances between all pairs of parallel hyperplanes which bound $\gamma$, while its inradius $r$ is the supremum of the radii of all spheres which are contained in the convex ... More

Relative symmetric polynomials and money change problemDec 14 2010This article is devoted to the number of non-negative solutions of the linear Diophantine equation $$ a_1t_1+a_2t_2+... a_nt_n=d, $$ where $a_1, ..., a_n$, and $d$ are positive integers. We obtain a relation between the number of solutions of this equation ... More

Cosmography of interacting generalized QCD ghost dark energyDec 18 2012Aug 24 2013Exploring the accelerated expansion of the universe, we investigate the generalized ghost dark energy (GGDE) model from the statefinder diagnosis analysis in a flat FRW universe. First we calculate the cosmological evolution and statefinder trajectories ... More

Maximally transitive semigroups of $n\times n$ matricesDec 30 2011We prove that, in both real and complex cases, there exists a pair of matrices that generates a dense subsemigroup of the set of $n\times n$ matrices.

A Collatz-type conjecture on the set of rational numbersOct 18 2010Define $\theta(x)=(x-1)/3$ if $x\geq 1$, and $\theta(x)=2x/(1-x)$ if $x<1$. We conjecture that the orbit of every positive rational number ends in 0. In particular, there does not exist any positive rational fixed point for a map in the semigroup $\Omega$ ... More

Means refinements via convexityJun 22 2016The main goal of this article is to find the exact difference between a convex function and its secant, as a limit of positive quantities. This idea will be expressed as a convex inequality that leads to refinements and reversals of well established inequalities ... More

On dependence of rational points on elliptic curvesMay 10 2016Let $E$ be an elliptic curve defined over $\mathbb Q$. Let $\Gamma$ be a subgroup of $E(\mathbb Q)$ and $P\in E(\mathbb Q)$. In [1], it was proved that if $E$ has no nontrivial rational torsion points, then $P\in\Gamma$ if and only if $P\in \Gamma$ mod ... More

Optimal initial condition of passive tracers for their maximal mixing in finite timeApr 05 2016The efficiency of a fluid mixing device is often limited by fundamental laws and/or design constraints, such that a perfectly homogeneous mixture cannot be obtained in finite time. Here, we address the natural corollary question: Given the best available ... More

Optimal regularity for variational problems with nonsmooth non-strictly convex gradient constraintsFeb 10 2016May 19 2016We prove the optimal regularity for variational problems with nonsmooth gradient constraints. Furthermore, we obtain the optimal regularity in two dimensions without assuming the strict convexity of the constraints. We also characterize the set of singular ... More

DataGrinder: Fast, Accurate, Fully non-Parametric Classification Approach Using 2D Convex HullsNov 11 2015It has been a long time, since data mining technologies have made their ways to the field of data management. Classification is one of the most important data mining tasks for label prediction, categorization of objects into groups, advertisement and ... More

An introdution to forcingMar 27 2015The aim of these lectures is to give a short introduction to forcing. We will avoid metamathematical issues as much as possible and similarly we will avoid performing the actual construction of forcing. We assume familiarity with basic predicate logic, ... More

Sequence Modeling using Gated Recurrent Neural NetworksJan 01 2015In this paper, we have used Recurrent Neural Networks to capture and model human motion data and generate motions by prediction of the next immediate data point at each time-step. Our RNN is armed with recently proposed Gated Recurrent Units which has ... More

Lower bounds for warping functions on warped-product AHE manifoldsOct 14 2007Let $[\gamma]$ be the conformal boundary of a warped product $C^{3,\alpha}$ AHE metric $g=g_M+u^2h$ on $N=M \times F$, where $(F,h)$ is compact with unit volume and nonpositive curvature. We show that if $[\gamma]$ has positive Yamabe constant, then $u$ ... More

On Cyclic Cohomology of x-Hopf algebrasMar 12 2012Feb 20 2014In this paper we study the cyclic cohomology of certain x-Hopf algebras: universal enveloping algebras, quantum algebraic tori, the Connes-Moscovici x-Hopf algebroids and the Kadison bialgebroids. Introducing their stable anti Yetter-Drinfeld modules ... More

Separating detection and catalog productionNov 19 2016In the coming era of massive surveys (e.g. LSST, SKA), the role of the database designers and the algorithms they choose to adopt becomes the decisive factor in scientific progress. Systems that allow/encourage users/scientists to be more creative with ... More

On Izumi's theorem on comparison of valuationsOct 14 2008Mar 18 2010We prove that the sequence of MacLane key polynomials constructed in \cite{Mac1} and \cite{Sp2} for a valuation extension $(K,\nu)\subset (K(x),\mu)$ is finite, provided that both $\nu$ and $\mu$ are divisorial and $\mu$ is centered over an analytically ... More

Operateurs absolument continus et interpolationMay 10 2017In the first part of this work, we study the absolutely continuous operators which are defined on fuction spaces with wide sense. In the second part, we show some results concerning the absoltely continuous operators when the function spaces (with wide ... More

Tangent lines, inflections, and vertices of closed curvesJan 06 2012Mar 06 2013We show that every smooth closed curve C immersed in Euclidean 3-space satisfies the sharp inequality 2(P+I)+V >5 which relates the numbers P of pairs of parallel tangent lines, I of inflections (or points of vanishing curvature), and V of vertices (or ... More

Representations of Finite Polyadic GroupsNov 03 2010We prove that there is a one-one correspondence between sets of irreducible representations of a polyadic group and its Post's cover. Using this correspondence, we generalize some well-known properties of irreducible characters in finite groups to the ... More

Deformations of unbounded convex bodies and hypersurfacesDec 15 2009May 02 2010We study the topology of the space $\d\K^n$ of complete convex hypersurfaces of $\R^n$ which are homeomorphic to $\R^{n-1}$. In particular, using Minkowski sums, we construct a deformation retraction of $\d\K^n$ onto the Grassmannian space of hyperplanes. ... More

A Novel Square Wave Generator Based on the Translinear Circuit Scheme of Second Generation Current Controlled Current Conveyor-CCCIINov 06 2018Mar 08 2019A robust square wave generator employing a sole capacitor and two resistors has been presented in this study. Low power and popular translinear circuit scheme of Second generation current controlled current conveyor-CCCII has been taken as an active element ... More

Isomorphismes entre des espaces de mesures à valeurs vectoriellesMar 29 2016Let $(\Omega_1, \mathcal{F}_1, \mu_1)$, $(\Omega_2, \mathcal{F}_2, \mu_2)$ be two probabilty spaces, $1\leq p\leq +\infty$ and $X$ a Banach space. In this work we show that $L^p(\mu_1, X)$, $VB^p (\mu_1,X),$ $cabv(\mu_{1},X)$ are isomorphic to $L^p(\mu_2, ... More

Vertices of closed curves in Riemannian surfacesJun 21 2010We uncover some connections between the topology of a complete Riemannian surface M and the minimum number of vertices, i.e., critical points of geodesic curvature, of closed curves in M. In particular we show that the space forms with finite fundamental ... More

The free boundary of variational inequalities with gradient constraintsJan 21 2015Aug 09 2015In this paper we prove that the free boundary of some variational inequalities with gradient constraints is as regular as the tangent bundle of the boundary of the domain. To this end, we study a generalized notion of ridge of a domain in the plane, which ... More

Global optimal regularity for variational problems with nonsmooth non-strictly convex gradient constraintsJul 02 2018Jan 18 2019We prove the optimal $W^{2,\infty}$ regularity for variational problems with convex gradient constraints. We do not assume any regularity of the constraints; so the constraints can be nonsmooth, and they need not be strictly convex. When the domain is ... More

Advanced refinements of Young and Heinz inequalitiesJun 22 2016Oct 08 2016In this article, we prove several multi-term refinements of Young type inequalities for both real numbers and operators improving several known results. Among other results, we prove \begin{eqnarray*} A\#_{\nu}B&+&\sum_{j=1}^{N}s_{j}(\nu)\left(A\#_{\alpha_j(\nu)}B+A\#_{2^{1-j}+\alpha_j(\nu)}B-2A\#_{2^{-j}+\alpha_j(\nu)}B\right)\leq ... More

Diamond can fail at the least inaccessible cardinalJul 04 2016Starting from suitable large cardinals, we force the failure of diamond at the least inaccessible cardinal. The result improves an unpublished theorem of Woodin.

Polytropic gas scalar field models of dark energyJun 04 2012Jul 16 2013In this work we investigate the polytropic gas dark energy model in the non flat universe. We first calculate the evolution of EoS parameter of the model as well as the cosmological evolution of Hubble parameter in the context of polytropic gas dark energy ... More

(Weak) diamond can fail at the least inaccessible cardinalJul 04 2016Oct 31 2016Starting from suitable large cardinals, we force the failure of (weak) diamond at the least inaccessible cardinal. The result improves an unpublished theorem of Woodin and a recent result of Ben-Neria, Garti and Hayut.

Almost Souslin Kurepa treesOct 10 2015We show that the existence of an almost Souslin Kurepa tree is consistent with $ZFC$. We also prove their existence in $L$. These results answer two questions from Zakrzewski.

Character Sums, Gaussian Hypergeometric Series, and a Family of Hyperelliptic CurvesJul 03 2015Dec 08 2015We study the character sums \[\phi_{(m,n)}(a,b)=\sum_{x\in\mathbb{F}_q}\phi\left(x(x^{m}+a)(x^{n}+b)\right),\textrm{ and, } \psi_{(m,n)}(a,b)=\sum_{x\in\mathbb{F}_q}\phi\left((x^{m}+a)(x^{n}+b)\right)\] where $\phi$ is the quadratic character defined ... More

On the notion of generic cut for models of ZFCJan 28 2015We define the notion of generic cut between models of ZFC and give some examples.

Hyperbolic Lagrangian coherent structures align with contours of path-averaged scalarsJan 21 2015Jul 26 2015While inequality (9) is mathematically correct, it does not imply alignment between path-averaged scalars and the hyperbolic LCSs.

Convex functions and means of matricesJun 26 2016In this article, we prove that convex functions and log-convex functions obey certain general refinements that lead to several refinements and reverses of well known inequalities for matrices, including Young's inequality, Heinz inequality, the arithmetic-harmonic ... More

Power set at $\aleph_ω$: On a theorem of WoodinJan 16 2016We give Woodin's original proof that if there exists a $(\kappa+2)-$strong cardinal $\kappa,$ then there is a generic extension of the universe in which $\kappa=\aleph_\omega,$ $GCH$ holds below $\aleph_\omega$ and $2^{\aleph_\omega}=\aleph_{\omega+2}.$ ... More

K(X,Y) as subspace complemented of L(X,Y)Nov 09 2014Mar 23 2016Let X,Y be two Banach spaces ; in the first part of this work, we show that K(X,Y) contains a complemented copy of c0 if Y contains a copy of c0 and each bounded sequence in Y has a subsequece which is w* convergente. Afterward we obtain some results ... More

Clustering Fossils in Solid InflationSep 10 2014In solid inflation the single field non-Gaussianity consistency condition is violated. As a result, the long tensor perturbation induces observable clustering fossils in the form of quardupole anisotropy in large scale structure power spectrum. In this ... More

New Coefficients For Hopf Cyclic CohomologyFeb 15 2012Jan 03 2014In this note the categories of coefficients for Hopf cyclic cohomology of comodule algebras and comodule coalgebras are extended. We show that these new categories have two proper different subcategories where the smallest one is the known category of ... More

Estimation of mean vector in elliptical modelsMar 06 2012In this paper, we are basically discussing on a class of Baranchik type shrinkage estimators of the vector parameter in a location model, with errors belonging to a sub-class of elliptically contoured distributions. We derive conditions under Schwartz ... More

Colourful Language: Measuring Word-Colour AssociationsSep 20 2013Since many real-world concepts are associated with colour, for example danger with red, linguistic information is often complimented with the use of appropriate colours in information visualization and product marketing. Yet, there is no comprehensive ... More

Testing Linearity of Quantum Theory with a ThermometerJan 11 2018Jan 28 2018Collapse models postulate that space is filled with a collapse noise field, inducing quantum Brownian motions which are dominant during the measurement, thus causing collapse of the wave function. An important manifestation of collapse noise field, if ... More

Generalized injectivity of Banach modulesFeb 16 2015Feb 25 2015In this paper, we study the notion of $\phi$-injectivity in the special case that $\phi=0$. For an arbitrary locally compact group $G$, we characterize the 0-injectivity of $L^{1}(G)$ as a left $L^{1}(G)$ module. Also, we show that $L^{1}(G)^{**}$ and ... More

Non-equilibrium hydrodynamics of the quark-gluon plasmaApr 05 2019My dissertation is about the formulation and application of anisotropic hydrodynamics as a successful non-equilibrium hydrodynamics model for studying the QGP. For this purpose, I introduce the basic conformal anisotropic hydrodynamics formalism and then ... More

Azimuthally differential pion femtoscopy relative to the second and third harmonic in Pb-Pb 2.76 TeV collision from ALICEApr 20 2017Azimuthally differential femtoscopic measurements, being sensitive to spatio-temporal characteristics of the source as well as to the collective velocity fields at freeze-out, provide very important information on the nature and dynamics of the system ... More

On the shape of the free boundary of variational inequalities with gradient constraintsAug 09 2015In this paper we derive an estimate on the number of local maxima of the free boundary of some variational inequalities with pointwise gradient constraints. This also gives an estimate on the number of connected components of the free boundary.

A counterexample to Herzog's Conjecture on the number of involutionsFeb 20 2018In 1979, Herzog put forward the following conjecture: if two simple groups have the same number of involutions, then they are of the same order. We give a counterexample to this conjecture.

On the norm of the centralizers of a groupJul 14 2015For any group G, let C(G) denote the intersection of the normal- izers of centralizers of all elements of G. Set C0 = 1. Define Ci+1(G)=Ci(G) = C(G=Ci(G)) for i ? 0. By C1(G) denote the terminal term of the ascending series. In this paper, we show that ... More

Periodic continued fractions and elliptic curves over quadratic fieldsNov 22 2014Nov 25 2014Let $f(x)$ be a square free quartic polynomial defined over a quadratic field $K$ such that its leading coefficient is a square. If the continued fraction expansion of $\displaystyle \sqrt{f(x)}$ is periodic, then its period $n$ lies in the set \[\{1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,17,18,22,26,30,34\}.\] ... More

Searching Lattice Data Structures of Varying Degrees of SortednessMay 13 2016Lattice data structures are space efficient and cache-suitable data structures. The basic searching, insertion, and deletion operations are of time complexity $O(\sqrt{N})$. We give a jump searching algorithm of time complexity $O(J(L)\log(N))$, where ... More

Consistency in Distributed Data StoresApr 26 2016This paper focuses on the problem of consistency in distributed data stores.We define strong consistency model which provides a simple semantics for application programmers, but impossible to achieve with availability and partition-tolerance. We also ... More

Power Allocation and Effective Capacity of AF Successive RelaysSep 13 2016In the relay based telecommunications with $K$ relays between the source and destination, $K+1$ time or frequency slots are required for a single frame transmission. However, without the relays, only one time or frequency slot is used for a single frame ... More

Lagrangian analysis of the laminar flat plate boundary layerApr 05 2016Nov 06 2016The flow properties at the leading edge of a flat plate represent a singularity to the Blasius laminar boundary layer equations; by applying the Lagrangian approach the leading edge velocity profiles of the laminar boundary layer over a flat plate are ... More

Cryptanalysis of some protocols using matrices over group ringsMar 16 2015We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm problem on (semi) groups of matrices over a group ring. We can find the secret key and break entirely the protocols.

Definable tree property can hold at all uncountable regular cardinalsAug 24 2016Aug 31 2016Starting from a supercompact cardinal and a measurable above it, we construct a model of ZFC in which definable tree property holds at all uncountable regular cardinals. This answers a question from [1].

All uncountable regular cardinals can be inaccessible in HODAug 02 2016Assuming the existence of a supercompact cardinal and an inaccessible above it, we construct a model of ZFC, in which all uncountable regular cardinals are inaccessible in HOD.

Tree property at successor of a singular limit of measurable cardinalsJan 16 2016Oct 18 2016Assume $\lambda$ is a singular limit of $\eta$ supercompact cardinals, where $\eta \leq \lambda$ is a limit ordinal. We present two forcing methods for making $\lambda^+$ the successor of the limit of the first $\eta$ measurable cardinals while the tree ... More

Detecting Cognitive Appraisals from Facial Expressions for Interest RecognitionSep 30 2016Oct 10 2016Interest makes one hold her attention on the object of interest. Automatic recognition of interest has numerous applications in human-computer interaction. In this paper, we study the facial expressions associated with interest and its underlying and ... More

Notes on countably generated complete Boolean algebrasNov 08 2016We give a necessary and sufficient condition for an atomless Boolean algebra to be countably generated, and use it to give new proofs of some some know facts due to Gaifman-Hales and Solovay and also due to Jech, Kunen and Magidor. We also show that Jensen's ... More

On a property of plane curvesMay 08 2009Let $\gamma: [0,1] \to [0,1]^2$ be a continuous curve such that $\gamma(0)=(0,0)$, $\gamma(1)=(1,1)$, and $\gamma(t) \in (0,1)^2$ for all $t\in (0,1)$. We prove that, for each $n \in \mathbb{N}$, there exists a sequence of points $A_i$, $0\leq i \leq ... More

Semigroups of matrices with dense orbitsMay 08 2009Apr 09 2010We give examples of $n \times n$ matrices $A$ and $B$ over the filed $\mathbb{K}=\mathbb{R}$ or $\mathbb{C}$ such that for almost every column vector $x \in \mathbb{K}^n$, the orbit of $x$ under the action of the semigroup generated by $A$ and $B$ is ... More