Still searching Arxiv, refresh for possibly better results.

total 25415took 0.12s

On the Capacity of Fractal Wireless Networks With Direct Social InteractionsMay 27 2017The capacity of a fractal wireless network with direct social interactions is studied in this paper. Specifically, we mathematically formulate the self-similarity of a fractal wireless network by a power-law degree distribution $ P(k) $, and we capture ... More

TACT: A Transfer Actor-Critic Learning Framework for Energy Saving in Cellular Radio Access NetworksNov 28 2012Apr 04 2014Recent works have validated the possibility of improving energy efficiency in radio access networks (RANs), achieved by dynamically turning on/off some base stations (BSs). In this paper, we extend the research over BS switching operations, which should ... More

Trajectory-driven Influential Billboard PlacementFeb 06 2018In this paper we propose and study the problem of trajectory-driven influential billboard placement: given a set of billboards $U$ (each associated with a location and a cost), a database of trajectories $\mathcal{T}$ and a budget $L$, the goal is to ... More

Topological Effect of Surface Plasmon Excitation in Gapped Isotropic Topological Insulator NanowiresSep 24 2013We present a theoretical investigation of the surface plasmon (SP) at the interface between topologically non-trivial cylindrical core and topological-trivial surrounding material, from the axion electrodynamics and modified constitutive relations. We ... More

The Learning and Prediction of Application-level Traffic Data in Cellular NetworksJun 15 2016Mar 28 2017Traffic learning and prediction is at the heart of the evaluation of the performance of telecommunications networks and attracts a lot of attention in wired broadband networks. Now, benefiting from the big data in cellular networks, it becomes possible ... More

Phase Diagram and Magnetic Excitations of Anisotropic Spin-One MagnetsJan 10 2013We use a generalized spin wave approach and large scale quantum Monte Carlo (QMC) simulations to study the quantum phase diagram and quasiparticle excitations of the S=1 Heisenberg model with an easy-plane single-ion anisotropy in dimensions d=2 and 3. ... More

Uncovering the influence of common nonmetal impurities on the stability and strength of a Σ5 (310) grain boundary in CuJun 18 2017Jan 30 2018Impurities are often driven to segregate to grain boundaries, which can significantly alter a material's thermal stability and mechanical behavior. To provide a comprehensive picture of this issue, the influence of a wide variety of common nonmetal impurities ... More

Supersymmetric microring laser arraysFeb 08 2019Coherent combination of emission power from an array of coupled semiconductor lasers operating on the same chip is of fundamental and technological importance. In general, the nonlinear competition among the array supermodes can entail incoherence and ... More

Entry effects of droplet in a micro confinement: implications for deformation-based CTC microfiltrationJan 08 2016Deformation based circulating tumor cell (CTC) microchips are a representative diagnostic device for early cancer detection. This type of device usually involves a process of CTC trapping in a confined microgeometry. Further understanding of the CTC flow ... More

Joint Face Detection and Alignment using Multi-task Cascaded Convolutional NetworksApr 11 2016Face detection and alignment in unconstrained environment are challenging due to various poses, illuminations and occlusions. Recent studies show that deep learning approaches can achieve impressive performance on these two tasks. In this paper, we propose ... More

Self doping effect and successive magnetic transitions in superconducting Sr$_2$VFeAsO$_3$Jul 22 2010Sep 27 2010We have studied a quinary Fe-based superconductor Sr$_2$VFeAsO$_3$ by the measurements of x-ray diffraction, x-ray absorption, M\"{o}ssbauer spectrum, resistivity, magnetization and specific heat. This apparently undoped oxyarsenide is shown to be self ... More

Convex Optimization for Linear Query Processing under Approximate Differential PrivacyFeb 13 2016May 16 2016Differential privacy enables organizations to collect accurate aggregates over sensitive data with strong, rigorous guarantees on individuals' privacy. Previous work has found that under differential privacy, computing multiple correlated aggregates as ... More

Brain-Inspired Stigmergy LearningNov 20 2018Stigmergy has proved its great superiority in terms of distributed control, robustness and adaptability, thus being regarded as an ideal solution for large-scale swarm control problems. Based on new discoveries on astrocytes in regulating synaptic transmission ... More

AI-based Two-Stage Intrusion Detection for Software Defined IoT NetworksJun 07 2018Software Defined Internet of Things (SD-IoT) Networks profits from centralized management and interactive resource sharing which enhances the efficiency and scalability of IoT applications. But with the rapid growth in services and applications, it is ... More

On the Capacity of Fractal D2D Social Networks With Hierarchical CommunicationsAug 11 2017Aug 11 2018The maximum capacity of fractal D2D (device-to-device) social networks with both direct and hierarchical communications is studied in this paper. Specifically, the fractal networks are characterized by the direct social connection and the self-similarity. ... More

Not Call Me Cellular Any More: The Emergence of Scaling Law, Fractal Patterns and Small-World in Wireless NetworksDec 02 2016In conventional cellular networks, for base stations (BSs) that are deployed far away from each other, it is general to assume them to be mutually independent. Nevertheless, after long-term evolution of cellular networks in various generations, the assumption ... More

Deformability-based circulating tumor cell separation with conical-shaped microfilters: concept, optimization and design criteriaJan 08 2016The ability of detecting and separating CTCs can play a key role in early cancer detection and treatment. In recent years, there has been growing interest in using deformability-based CTC separation microfilters due to their simplicity and low cost. Most ... More

The Stochastic Geometry Analyses of Cellular Networks with α-Stable Self-SimilaritySep 18 2017Nov 19 2018To understand the spatial deployment of base stations (BSs) is the first step to analyze the performance of cellular networks and further design efficient networking protocols. Poisson point process (PPP), which has been widely adopted to characterize ... More

Study on Base Station Topology in Cellular Networks: Take Advantage of Alpha Shapes, Betti Numbers, and Euler CharacteristicsAug 16 2018Faced with the ever-increasing trend of the cellular network scale, how to quantitatively evaluate the effectiveness of the large-scale deployment of base stations (BSs) has become a challenging topic. To this end, a deeper understanding of the cellular ... More

Fundamentals on Base Stations in Cellular Networks: From the Perspective of Algebraic TopologySep 18 2018In recent decades, the deployments of cellular networks have been going through an unprecedented expansion. In this regard, it is beneficial to acquire profound knowledge of cellular networks from the view of topology so that prominent network performances ... More

Range Loss for Deep Face Recognition with Long-tailNov 28 2016Convolutional neural networks have achieved great improvement on face recognition in recent years because of its extraordinary ability in learning discriminative features of people with different identities. To train such a well-designed deep network, ... More

Not Call Me Cellular Any More: The Emergence of Scaling Law, Fractal Patterns and Small-World in Wireless NetworksDec 02 2016Dec 15 2016In conventional cellular networks, for base stations (BSs) that are deployed far away from each other, it is general to assume them to be mutually independent. Nevertheless, after long-term evolution of cellular networks in various generations, this assumption ... More

Multiplicity formula and stable trace formulaJul 30 2016Let $G$ be a connected reductive group over $\mathbb{Q}$. In this paper, we will stabilize the local trace formula, in particular, we construct the explicit form of the spectral side of stable local trace formula in the Archimedean case, when one component ... More

Multiplicity formula and stable trace formulaJul 30 2016Jun 05 2018Let $G$ be a connected reductive group over $\mathbb{Q}$. In this paper, we will stabilize the local trace formula, in particular, we construct the explicit form of the spectral side of stable local trace formula in the Archimedean case, when one component ... More

Strong spin-oscillation of small spin-1 condensates caused by an inclined weak magnetic fieldMar 14 2009When a magnetic field is applied along a direction deviated from the quantization $Z$-axis, the conservation of total magnetization holds no more. In this case the inclined field can cause a strong spin-evolution via the linear Zeeman term even the field ... More

Low-Rank Mechanism: Optimizing Batch Queries under Differential PrivacyAug 01 2012Differential privacy is a promising privacy-preserving paradigm for statistical query processing over sensitive data. It works by injecting random noise into each query result, such that it is provably hard for the adversary to infer the presence or absence ... More

The Learning and Prediction of Application-level Traffic Data in Cellular NetworksJun 15 2016Traffic learning and prediction is at the heart of the evaluation of the performance of telecommunications networks and attracts a lot of attention in wired broadband networks. Now, benefiting from the big data in cellular networks, it becomes possible ... More

Traffic Prediction Based on Random Connectivity in Deep Learning with Long Short-Term MemoryNov 08 2017Apr 03 2018Traffic prediction plays an important role in evaluating the performance of telecommunication networks and attracts intense research interests. A significant number of algorithms and models have been put forward to analyse traffic data and make prediction. ... More

Characterizing Spatial Patterns of Base Stations in Cellular NetworksApr 04 2014Jun 19 2014The topology of base stations (BSs) in cellular networks, serving as a basis of networking performance analysis, is considered to be obviously distinctive with the traditional hexagonal grid or square lattice model, thus stimulating a fundamental rethinking. ... More

Two-tier Spatial Modeling of Base Stations in Cellular NetworksApr 04 2014Aug 01 2014Poisson Point Process (PPP) has been widely adopted as an efficient model for the spatial distribution of base stations (BSs) in cellular networks. However, real BSs deployment are rarely completely random, due to environmental impact on actual site planning. ... More

Combined effects of nonmetallic impurities and planned metallic dopants on grain boundary energy and strengthSep 06 2018Dec 12 2018Most research on nanocrystalline alloys has been focused on planned doping of metals with other metallic elements, but nonmetallic impurities are also prevalent in the real world. In this work, we report on the combined effects of metallic dopants and ... More

Convergence Analysis of the Dynamics of a Special Kind of Two-Layered Neural Networks with $\ell_1$ and $\ell_2$ RegularizationNov 19 2017In this paper, we made an extension to the convergence analysis of the dynamics of two-layered bias-free networks with one $ReLU$ output. We took into consideration two popular regularization terms: the $\ell_1$ and $\ell_2$ norm of the parameter vector ... More

WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn DevicesOct 22 2017The growing trend of using wearable devices for context-aware computing and pervasive sensing systems has raised its potentials for quick and reliable authentication techniques. Since personal writing habitats differ from each other, it is possible to ... More

Information Spreading in Dynamic NetworksDec 02 2011We study the fundamental problem of information spreading (also known as gossip) in dynamic networks. In gossip, or more generally, $k$-gossip, there are $k$ pieces of information (or tokens) that are initially present in some nodes and the problem is ... More

Repeating head-on collisions in an optical trap and the evaluation of spin-dependent interactions among neutral particlesAug 20 2009Jun 23 2010A dynamic process of repeating collisions of a pair of trapped neutral particles with weak spin-dependent interaction is designed and studied. Related theoretical derivation and numerical calculation have been performed to study the inherent coordinate-spin ... More

Effect of dynamical interactions on integrated properties of globular clustersJul 11 2014Nov 12 2014Globular Clusters (GCs) are generally treated as natural validators of simple stellar population (SSP) models. However, there are still some differences between real GCs and SSPs. In this work we use a direct $N$-body simulation code {\hf Nbody6} to study ... More

Null Zig-Zag Wilson Loops in N=4 SYMMay 07 2009In planar ${\cal N}=4$ supersymmetric Yang-Mills theory we have studied supersymmetric Wilson loops composed of a large number of light-like segments, i.e., null zig-zags. These contours oscillate around smooth underlying spacelike paths. At one-loop ... More

LQCD at non zero isospin chemical potentialNov 02 2012Systems of non-zero isospin chemical potential are studied from a canonical approach by computing correlation functions with the quantum numbers of $N \pi^+$'s ($C_{N \pi}$). In order to reduce the number of contractions required in calculating $C_{N ... More

Optimizing Batch Linear Queries under Exact and Approximate Differential PrivacyFeb 26 2015Differential privacy is a promising privacy-preserving paradigm for statistical query processing over sensitive data. It works by injecting random noise into each query result, such that it is provably hard for the adversary to infer the presence or absence ... More

Low Rank Mechanism for Optimizing Batch Queries under Differential PrivacyDec 11 2012Differential privacy is a promising privacy-preserving paradigm for statistical query processing over sensitive data. It works by injecting random noise into each query result, such that it is provably hard for the adversary to infer the presence or absence ... More

Deep Learning with Long Short-Term Memory for Time Series PredictionOct 24 2018Time series prediction can be generalized as a process that extracts useful information from historical records and then determines future values. Learning long-range dependencies that are embedded in time series is often an obstacle for most algorithms, ... More

Large-scale Spatial Distribution Identification of Base Stations in Cellular NetworksNov 10 2014The performance of cellular system significantly depends on its network topology, where the spatial deployment of base stations (BSs) plays a key role in the downlink scenario. Moreover, cellular networks are undergoing a heterogeneous evolution, which ... More

Deep Reinforcement Learning for Resource Management in Network SlicingMay 17 2018Nov 21 2018Network slicing is born as an emerging business to operators, by allowing them to sell the customized slices to various tenants at different prices. In order to provide better-performing and cost-efficient services, network slicing involves challenging ... More

Experimental Realization of Multiple Topological Edge States in a One-Dimensional Photonic LatticeDec 13 2018Topological photonic systems offer light transport that is robust against defects and disorder, promising a new generation of chip-scale photonic devices and facilitating energy-efficient on-chip information routing and processing. However, present quasi ... More

Global existence and exponential decay of the solution for a viscoelastic wave equation with a delayNov 06 2012Apr 19 2013In this paper, we consider initial-boundary value problem of viscoelastic wave equation with a delay term in the interior feedback. Namely, we study the following equation $$u_{tt}(x,t)-\Delta u(x,t)+\int_0^t g(t-s)\Delta u(x,s)ds +\mu_1 u_t(x,t)+ \mu_2 ... More

A hybrid evolutionary algorithm with importance sampling for multi-dimensional optimizationAug 23 2013A hybrid evolutionary algorithm with importance sampling method is proposed for multi-dimensional optimization problems in this paper. In order to make use of the information provided in the search process, a set of visited solutions is selected to give ... More

Metastable state involved resonant tunneling through single InAs/GaAs quantum dotAug 17 2007A scheme of resonant tunneling through the metastable state of semiconductor quantum dot is presented and implemented in the transport study of freestanding InAs quantum dots grown on GaAs(001) under illumination using conductive atomic force microscopy. ... More

Existence of Dyons in Minimally Gauged Skyrme Model via Constrained MinimizationJul 01 2011We prove the existence of electrically and magnetically charged particlelike static solutions, known as dyons, in the minimally gauged Skyrme model developed by Brihaye, Hartmann, and Tchrakian. The solutions are spherically symmetric, depend on two continuous ... More

Ghost imaging for an occluded objectApr 11 2018Sep 02 2018Imaging for an occluded object is usually a difficult problem, in this letter, we introduce an imaging scheme based on computational ghost imaging, which can obtain the image of a target object behind an obstacle. According to our theoretical analysis, ... More

Poisson Structures for Dispersionless Integrable Systems and Associated W-AlgebrasDec 04 1996Jan 13 1997In analogy to the KP theory, the second Poisson structure for the dispersionless KP hierarchy can be defined on the space of commutative pseudodifferential operators $L=p^n+\sum_{j=-\infty}^{n-1}u_j p^j$. The reduction of the Poisson structure to the ... More

Generative Adversarial Networks with Inverse Transformation UnitSep 27 2017In this paper we introduce a new structure to Generative Adversarial Networks by adding an inverse transformation unit behind the generator. We present two theorems to claim the convergence of the model, and two conjectures to nonideal situations when ... More

Investigations of QCD at non-zero isospin densityNov 07 2011We investigate the QCD phase diagram as a function of isospin chemical potential at a fixed temperature by directly putting large numbers of \pi^+s into the system. Correlation functions of N \pi^+s systems involves N!N! contractions, and become extremely ... More

Hierarchical Generative Modeling for Controllable Speech SynthesisOct 16 2018Dec 27 2018This paper proposes a neural sequence-to-sequence text-to-speech (TTS) model which can control latent attributes in the generated speech that are rarely annotated in the training data, such as speaking style, accent, background noise, and recording conditions. ... More

Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech SynthesisJun 12 2018Jan 02 2019We describe a neural network-based system for text-to-speech (TTS) synthesis that is able to generate speech audio in the voice of many different speakers, including those unseen during training. Our system consists of three independently trained components: ... More

GradiVeQ: Vector Quantization for Bandwidth-Efficient Gradient Aggregation in Distributed CNN TrainingNov 08 2018Dec 31 2018Data parallelism can boost the training speed of convolutional neural networks (CNN), but could suffer from significant communication costs caused by gradient aggregation. To alleviate this problem, several scalar quantization techniques have been developed ... More

The spectral side of stable local trace formula for real groupsAug 30 2017Dec 04 2018Let $G$ be a connected quasi-split reductive group over $\mathbb{R}$, and more generally, a quasi-split $K$-group over $\mathbb{R}$. Arthur had obtained the formal formula for the spectral side of the stable local trace formula, by using formal substitute ... More

Quarkonium at non-zero isospin densityNov 13 2012Apr 26 2013We calculate the energies of quarkonium bound states in the presence of a medium of nonzero isospin density using lattice QCD. The medium, created using a canonical (fixed isospin charge) approach, induces a reduction of the quarkonium energies. As the ... More

Group Regularized Estimation under Structural HierarchyNov 17 2014Nov 08 2016Variable selection for models including interactions between explanatory variables often needs to obey certain hierarchical constraints. The weak or strong structural hierarchy requires that the existence of an interaction term implies at least one or ... More

Integer-Squared Laws for Global Vortices in the Born--Infeld Wave EquationsMay 07 2018Nov 11 2018A series of quantization identities are established for static vortex solutions governed by the Born--Infeld type actions. These identities are of a universal nature which are indifferent to the details of the models and provide refined descriptions of ... More

Generation and Detection of Surface Plasmon Polaritons by Transition Metal Dichalcogenides for Chip-level Electronic-Photonic Integrated CircuitsJul 07 2015May 22 2016The monolithic integration of electronics and photonics has attracted enormous attention due to its potential applications. However, the realization of such hybrid circuits has remained a challenge because it requires optical communication at nanometer ... More

Switching based Spin Transfer Torque Oscillator with zero-bias field and large tuning-ratioNov 16 2016We propose a novel concept of obtaining oscillations with frequencies in very-high frequency (VHF) and ultra-high frequency (UHF) bands. A traditional spin torque nano-oscillator (STNO) has one or a set of pinned layers (PL) and one or more a set of locked ... More

Group Regularized Estimation under Structural HierarchyNov 17 2014Oct 20 2016Variable selection for models including interactions between explanatory variables often needs to obey certain hierarchical constraints. Weak or strong structural hierarchy requires that the existence of an interaction term implies at least one or both ... More

Effect of magnetic fields on the spin evolution of non-polarized 87Rb Bose-Einstein condensatesFeb 06 2008Feb 15 2008The spin mixing dynamics of spin-1 Bose-Einstein condensates with zero magnetization and under an external magnetic field is investigated. The time-dependent solutions are obtained via a diagonalization of the Hamiltonian, which has a simple form under ... More

Lattice QCD at non-zero isospin chemical potentialMay 18 2012Quantum chromodynamics (QCD) at non-zero isospin chemical potential is studied in a canonical approach by analyzing systems of fixed isospin number density. To construct these systems, we develop a range of new algorithms for performing the factorially ... More

A Machine Learning Based Intrusion Detection System for Software Defined 5G NetworkJul 10 2017As an inevitable trend of future 5G networks, Software Defined architecture has many advantages in providing central- ized control and flexible resource management. But it is also confronted with various security challenges and potential threats with ... More

Monitoring the Top-m Aggregation in a Sliding Window of Spatial QueriesOct 12 2016In this paper, we propose and study the problem of top-m rank aggregation of spatial objects in streaming queries, where, given a set of objects O, a stream of spatial queries (kNN or range), the goal is to report m objects with the highest aggregate ... More

Transport Properties of Ni, Co, Fe, Mn Doped Cu0.01Bi2Te2.7Se0.3 for Thermoelectric Device ApplicationsMay 29 2012Bi2Te3 based thermoelectric devices typically use a nickel layer as a diffusion barrier to block the diffusion of solder or copper atoms from the electrode into the thermoelectric material. Previous studies have shown degradation in the efficiency of ... More

Discovery through GossipFeb 09 2012We study randomized gossip-based processes in dynamic networks that are motivated by discovery processes in large-scale distributed networks like peer-to-peer or social networks. A well-studied problem in peer-to-peer networks is the resource discovery ... More

Thermoelectric Properties of Nanocomposite Heavy Fermion CeCu6Dec 11 2013Dec 13 2013Samples of heavy fermion compound CeCu6 were prepared by hot-press technique. Temperature-dependent (5-300 K) thermoelectric transport properties of the samples were measured. The dimensionless figure-of-merit (ZT) was optimized by varying the hot-pressing ... More

Efficient Face Alignment via Locality-constrained Representation for Robust RecognitionJul 25 2015Oct 31 2015Practical face recognition has been studied in the past decades, but still remains an open challenge. Current prevailing approaches have already achieved substantial breakthroughs in recognition accuracy. However, their performance usually drops dramatically ... More

Relay-Assisted Partial Packet Recovery with IDMA Method in CDMA Wireless NetworkApr 15 2010Automatic Repeat Request (ARQ) is an effective technique for reliable transmission of packets in wireless networks. In ARQ, however, only a few erroneous bits in a packet will cause the entire packet to be discarded at the receiver. In this case, it's ... More

State Transition Analysis of Time-Frequency Resource Conversion-based Call Admission Control for LTE-Type Cellular NetworkDec 02 2013To address network congestion stemmed from traffic generated by advanced user equipments, in [1] we propose a novel network resource allocation strategy, time-frequency resource conversion (TFRC), via exploiting user behavior, a specific kind of context ... More

Investigation on the reported superconductivity in intercalated black phosphorusDec 18 2017Superconductivity intrinsic to the intercalated black phosphorus (BP) with a transition temperature Tc of 3.8 K, independent of the intercalant, whether an alkali or an alkaline earth element, has been reported recently by R. Zhang et al. (2017). However, ... More

Global Information Sharing under Network DynamicsSep 27 2014We study how to spread $k$ tokens of information to every node on an $n$-node dynamic network, the edges of which are changing at each round. This basic {\em gossip problem} can be completed in $O(n + k)$ rounds in any static network, and determining ... More

Approximation Algorithms for Key Management in Secure MulticastApr 27 2009Many data dissemination and publish-subscribe systems that guarantee the privacy and authenticity of the participants rely on symmetric key cryptography. An important problem in such a system is to maintain the shared group key as the group membership ... More

Monitoring the Top-m Aggregation in a Sliding Window of Spatial QueriesOct 12 2016Oct 21 2016In this paper, we propose and study the problem of top-m rank aggregation of spatial objects in streaming queries, where, given a set of objects O, a stream of spatial queries (kNN or range), the goal is to report m objects with the highest aggregate ... More

Multiferroic materials and magnetoelectric physics: symmetry, entanglement, excitation, and topologyDec 12 2015Jan 16 2016Multiferroics are those materials with more than one ferroic order, and magnetoelectricity refers to the mutual coupling between magnetism and electricity. The discipline of multiferroicity has never been so highly active as that in the first decade of ... More

A note on the Hitchin-Thorpe inequality and Ricci flow on 4-manifoldsMar 14 2009Mar 06 2011In this short paper, we prove a Hitchin-Thorpe type inequality for closed 4-manifolds with non-positive Yamabe invariant, and admitting long time solutions of the normalized Ricci flow equation with bounded scalar curvature.

Gamma-Ray Burst Prompt Emission Light Curves and Power Density Spectra in the ICMART ModelDec 30 2013Feb 27 2014In this paper, we simulate the prompt emission light curves of gamma-ray bursts (GRBs) within the framework of the Internal-Collision-induced MAgnetic Reconnection and Turbulence (ICMART) model. This model applies to GRBs with a moderately-high magnetization ... More

Domain Adaptation Extreme Learning Machines for Drift Compensation in E-nose SystemsMay 24 2015This paper addresses an important issue, known as sensor drift that behaves a nonlinear dynamic property in electronic nose (E-nose), from the viewpoint of machine learning. Traditional methods for drift compensation are laborious and costly due to the ... More

Observability of Boolean control networks: A unified approach based on the theories of finite automataMay 27 2014Dec 09 2015The problem on how to determine the observability of Boolean control networks (BCNs) has been open for five years already. In this paper, we propose a unified approach to determine all the four types of observability of BCNs in the literature. We define ... More

Quantum teleportation and Birman-Murakami-Wenzl algebraJul 06 2016In this paper, we investigate the relationship of quantum teleportation in quantum information science and the Birman-Murakami-Wenzl (BMW) algebra in low-dimensional topology. For simplicity, we focus on the two spin-1/2 representation of the BMW algebra, ... More

Quantum optomechanical straight-twin engineOct 06 2016We propose a scheme to realize a quantum polariton heat engine in a hybrid microwave-opto-mechanical system. The engine transfers the heat obtained from the effective temperature difference between the microwave and optical cavity fields to the work extracted ... More

Imaging of locally rough surfaces from intensity-only far-field or near-field dataOct 19 2016This paper is concerned with a nonlinear imaging problem, which aims to reconstruct a locally perturbed, perfectly reflecting, infinite plane from intensity-only (or phaseless) far-field or near-field data. A recursive Newton iteration algorithm in frequencies ... More

Inequalities for Casorati curvatures of submanifolds in real space formsAug 21 2014Jun 15 2015By using T. Oprea's optimization methods on submanifolds, we give another proof of the inequalities relating the normalized $\delta-$Casorati curvature $\hat{\delta}_c(n-1)$ for submanifolds in real space forms. Also, inequalities relating the normalized ... More

A Newton method for simultaneous reconstruction of an interface and a buried obstacle from far-field dataNov 23 2012This paper is concerned with the inverse problem of scattering of time-harmonic acoustic waves from a penetrable and buried obstacles. By introducing a related transmission scattering problem, a Newton iteration method is proposed to simultaneously reconstruct ... More

Spatial-Spectral Boosting Analysis for Stroke Patients' Motor Imagery EEG in Rehabilitation TrainingOct 23 2013Current studies about motor imagery based rehabilitation training systems for stroke subjects lack an appropriate analytic method, which can achieve a considerable classification accuracy, at the same time detects gradual changes of imagery patterns during ... More

Some results on pointwise second-order necessary conditions for stochastic optimal controlsMay 28 2014The purpose of this paper is to derive some pointwise second-order necessary conditions for stochastic optimal controls in the general case that the control variable enters into both the drift and the diffusion terms. When the control region is convex, ... More

Molecular dynamics studies on the NMR and X-ray structures of rabbit prion protein wild-type and mutantsApr 29 2013Aug 26 2013Prion diseases are invariably fatal and highly infectious neurodegenerative diseases that affect a wide variety of mammalian species such as sheep, goats, mice, humans, chimpanzees, hamsters, cattle, elks, deer, minks, cats, chicken, pigs, turtles, etc. ... More

Visual Understanding via Multi-Feature Shared Learning with Global ConsistencyMay 20 2015Sep 09 2015Image/video data is usually represented with multiple visual features. Fusion of multi-source information for establishing the attributes has been widely recognized. Multi-feature visual recognition has recently received much attention in multimedia applications. ... More

Evolutionary Cost-sensitive Extreme Learning MachineMay 17 2015Sep 22 2016Conventional extreme learning machines solve a Moore-Penrose generalized inverse of hidden layer activated matrix and analytically determine the output weights to achieve generalized performance, by assuming the same loss from different types of misclassification. ... More

Robust Visual Knowledge Transfer via EDAMay 17 2015Aug 09 2016We address the problem of visual knowledge adaptation by leveraging labeled patterns from source domain and a very limited number of labeled instances in target domain to learn a robust classifier for visual categorization. This paper proposes a new extreme ... More

Effective Hamiltonians for quasi-one-dimensional Fermi gases with spin-orbit couplingAug 21 2013We derive one-dimensional effective Hamiltonians for spin-orbit coupled Fermi gases confined in quasi-one-dimensional trapping potentials. For energy regime around the two-body bound state energy, the effective Hamiltonian takes a two-channel form, where ... More

An Improved Cooperative Repair Scheme for Reed-Solomon CodesJan 10 2019Dau et al. recently extend Guruswami and Wootters' scheme (STOC'2016) to cooperatively repair two or three erasures in Reed-Solomon (RS) codes. However, their scheme restricts to either the case that the characteristic of $F$ divides the extension degree ... More

Disjunctive Logic Programs versus Normal Logic ProgramsApr 02 2013This paper focuses on the expressive power of disjunctive and normal logic programs under the stable model semantics over finite, infinite, or arbitrary structures. A translation from disjunctive logic programs into normal logic programs is proposed and ... More

Hierarchical Bayesian Models with Factorization for Content-Based RecommendationDec 28 2014Most existing content-based filtering approaches learn user profiles independently without capturing the similarity among users. Bayesian hierarchical models \cite{Zhang:Efficient} learn user profiles jointly and have the advantage of being able to borrow ... More

Repetitive cluster-tilted algebrasFeb 18 2009Jan 29 2013Let $H$ be a finite dimensional hereditary algebra over an algebraically closed field $k$ and $\mathscr{C}_{F^m}$ be the repetitive cluster category of $H$ with $m\geq 1$. We investigate the properties of cluster tilting objects in $\mathscr{C}_{F^m}$ ... More

Expressiveness of Logic Programs under General Stable Model SemanticsDec 02 2014The stable model semantics had been recently generalized to non-Herbrand structures by several works, which provides a unified framework and solid logical foundations for answer set programming. This paper focuses on the expressiveness of normal and disjunctive ... More

Rectifier Neural Network with a Dual-Pathway Architecture for Image DenoisingSep 10 2016Recently deep neural networks based on tanh activation function have shown their impressive power in image denoising. However, much training time is needed because of their very large size. In this letter, we propose a dual-pathway rectifier neural network ... More

The continuity method on minimal elliptic Kähler surfacesOct 25 2016We prove that, on a minimal elliptic K\"ahler surface of Kodaira dimension one, the continuity method introduced by La Nave and Tian in \cite{LT} starting from any initial K\"{a}hler metric converges in Gromov-Hausdorff topology to the metric completion ... More